A vulnerability has been found in Git that could allow a remote attacker to execute arbitrary code.
Package | dev-vcs/git on all architectures |
---|---|
Affected versions | < 2.26.3 |
Unaffected versions | >= 2.26.3 |
Git is a distributed version control system designed.
It was discovered that Git could be fooled into running remote code during a clone on case-insensitive file systems with support for symbolic links, if Git is configured globally to apply delay-capable clean/smudge filters (such as Git LFS).
A remote attacker could entice a user to clone a specially crafted repository, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All Git users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.26.3"
Release date
April 30, 2021
Latest revision
April 30, 2021: 1
Severity
normal
Exploitable
local
Bugzilla entries