Git contains multiple vulnerabilities that allow for the remote execution of arbitrary code.
|Package||dev-vcs/git on all architectures|
|Affected versions||< 2.7.3-r1|
|Unaffected versions||>= 2.7.3-r1|
Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.
Git is vulnerable to the remote execution of arbitrary code by cloning repositories with large filenames or a large number of nested trees. Additionally, some protocols within Git, such as git-remote-ext, can execute arbitrary code found within URLs. These URLs that submodules use may come from arbitrary sources (e.g., .gitmodules files in a remote repository), and can effect those who enable recursive fetch. Restrict the allowed protocols to well known and safe ones.
Remote attackers could execute arbitrary code on both client and server.
There is no known workaround at this time.
All Git users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.7.3-r1"