CVE-2022-24765 and safe.directory settings
Is Ubuntu security updates going to incorporate the changes in https:/
The security fix delivered in https:/
The fix in this USN is very broad and will break containers and deployment scripts also in environments that are tightly controlled but use git commands on directories that have ownership different from the executing effective id of those scripts. The safe.directory settings also doesn't provide any globbing options and requires also including explicitly any nested directories below a safe directory. This will require complete reworkings of deployments and containers.
The update published by git itself only days after the first update will at least allow administrators to disable the check . Also it corrects an error where directories set in other sections of the config could actually be interpreted as safe directories.
https:/
https:/
Question information
- Language:
- English Edit question
- Status:
- Solved
- For:
- Ubuntu git Edit question
- Assignee:
- No assignee Edit question
- Solved by:
- Gerrit Venema
- Solved:
- Last query:
- Last reply: