Git has released new versions to address CVE-2021-21300, a security vulnerability in the delayed checkout mechanism used by Git LFS during clone operations, affecting versions 2.15 and newer. This vulnerability allows a specially crafted repository to execute code during a git clone on case-insensitive filesystems that support symbolic links, through the misuse of clean/smudge filters configured by Git LFS. To mitigate this risk, users are advised to upgrade to Git version 2.30.2, disable symbolic links and process filters, and avoid cloning untrusted repositories. GitHub is not affected by this vulnerability as they do not store checked-out copies of repositories on their servers, except for GitHub Pages, which does not use the vulnerable filters. The vulnerability was identified and resolved by Matheus Tavares and Johannes Schindelin, with Taylor Blau, a Principal Software Engineer at GitHub, providing further details and recommendations.