--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2022-e99ae504f5
2022-05-08 01:04:53.137632
--------------------------------------------------------------------------------Name        : git
Product     : Fedora 36
Version     : 2.36.0
Release     : 1.fc36
URL         : https://git-scm.com/
Summary     : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

--------------------------------------------------------------------------------Update Information:

Update to 2.36.0 ([release notes](https://github.com/git/git/raw/v2.36.0/Documentation/RelNotes/2.36.0.txt))  Among the changes, this release includes changes
to address [CVE-2022-24765](https://bugzilla.redhat.com/CVE-2022-24765).  Per
the release announcement:  > On multi-user machines, Git users might find
themselves unexpectedly in a Git worktree, e.g. when another user created a
repository in `C:\.git`, in a mounted network drive or in a scratch space.
Merely having a Git-aware prompt that runs `git status` (or `git diff`) and
navigating to a directory which is supposedly not a Git worktree, or opening
such a directory in an editor or IDE such as VS Code or Atom, will potentially
run commands defined by that other user.  A broad "escape hatch" is available in
cases where all the repositories you may enter are considered safe, regardless
of their ownership.  Quoting another release announcement:  > `*` can be used as
the value for the `safe.directory` variable to signal that the user considers
that any directory is safe.
--------------------------------------------------------------------------------ChangeLog:

* Mon Apr 18 2022 Todd Zullinger  - 2.36.0-1
- update to 2.36.0
* Thu Apr 14 2022 Todd Zullinger  - 2.36.0-0.3.rc2
- usability improvements on top of CVE-2022-24765
* Wed Apr 13 2022 Todd Zullinger  - 2.36.0-0.2.rc2
- update to 2.36.0-rc2 (CVE-2022-24765)
- disable failing tests on s390x on EL8
* Fri Apr  8 2022 Todd Zullinger  - 2.36.0-0.1.rc1
- update to 2.36.0-rc1
* Tue Apr  5 2022 Todd Zullinger  - 2.36.0-0.0.rc0
- update to 2.36.0-rc0
- use httpd-core for tests on Fedora >= 37
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-e99ae504f5' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 36: git 2022-e99ae504f5

May 7, 2022
Update to 2.36.0 ([release notes](https://github.com/git/git/raw/v2.36.0/Documentation/RelNotes/2.36.0.txt)) Among the changes, this release includes changes to address [CVE-2022-2...

Summary

Git is a fast, scalable, distributed revision control system with an

unusually rich command set that provides both high-level operations

and full access to internals.

The git rpm installs common set of tools which are usually using with

small amount of dependencies. To install all git packages, including

tools for integrating with other SCMs, install the git-all meta-package.

Update to 2.36.0 ([release notes](https://github.com/git/git/raw/v2.36.0/Documentation/RelNotes/2.36.0.txt)) Among the changes, this release includes changes

to address [CVE-2022-24765](https://bugzilla.redhat.com/CVE-2022-24765). Per

the release announcement: > On multi-user machines, Git users might find

themselves unexpectedly in a Git worktree, e.g. when another user created a

repository in `C:\.git`, in a mounted network drive or in a scratch space.

Merely having a Git-aware prompt that runs `git status` (or `git diff`) and

navigating to a directory which is supposedly not a Git worktree, or opening

such a directory in an editor or IDE such as VS Code or Atom, will potentially

run commands defined by that other user. A broad "escape hatch" is available in

cases where all the repositories you may enter are considered safe, regardless

of their ownership. Quoting another release announcement: > `*` can be used as

the value for the `safe.directory` variable to signal that the user considers

that any directory is safe.

* Mon Apr 18 2022 Todd Zullinger - 2.36.0-1

- update to 2.36.0

* Thu Apr 14 2022 Todd Zullinger - 2.36.0-0.3.rc2

- usability improvements on top of CVE-2022-24765

* Wed Apr 13 2022 Todd Zullinger - 2.36.0-0.2.rc2

- update to 2.36.0-rc2 (CVE-2022-24765)

- disable failing tests on s390x on EL8

* Fri Apr 8 2022 Todd Zullinger - 2.36.0-0.1.rc1

- update to 2.36.0-rc1

* Tue Apr 5 2022 Todd Zullinger - 2.36.0-0.0.rc0

- update to 2.36.0-rc0

- use httpd-core for tests on Fedora >= 37

su -c 'dnf upgrade --advisory FEDORA-2022-e99ae504f5' at the command

line. For more information, refer to the dnf documentation available at

http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/keys

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

FEDORA-2022-e99ae504f5 2022-05-08 01:04:53.137632 Product : Fedora 36 Version : 2.36.0 Release : 1.fc36 URL : https://git-scm.com/ Summary : Fast Version Control System Description : Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. The git rpm installs common set of tools which are usually using with small amount of dependencies. To install all git packages, including tools for integrating with other SCMs, install the git-all meta-package. Update to 2.36.0 ([release notes](https://github.com/git/git/raw/v2.36.0/Documentation/RelNotes/2.36.0.txt)) Among the changes, this release includes changes to address [CVE-2022-24765](https://bugzilla.redhat.com/CVE-2022-24765). Per the release announcement: > On multi-user machines, Git users might find themselves unexpectedly in a Git worktree, e.g. when another user created a repository in `C:\.git`, in a mounted network drive or in a scratch space. Merely having a Git-aware prompt that runs `git status` (or `git diff`) and navigating to a directory which is supposedly not a Git worktree, or opening such a directory in an editor or IDE such as VS Code or Atom, will potentially run commands defined by that other user. A broad "escape hatch" is available in cases where all the repositories you may enter are considered safe, regardless of their ownership. Quoting another release announcement: > `*` can be used as the value for the `safe.directory` variable to signal that the user considers that any directory is safe. * Mon Apr 18 2022 Todd Zullinger - 2.36.0-1 - update to 2.36.0 * Thu Apr 14 2022 Todd Zullinger - 2.36.0-0.3.rc2 - usability improvements on top of CVE-2022-24765 * Wed Apr 13 2022 Todd Zullinger - 2.36.0-0.2.rc2 - update to 2.36.0-rc2 (CVE-2022-24765) - disable failing tests on s390x on EL8 * Fri Apr 8 2022 Todd Zullinger - 2.36.0-0.1.rc1 - update to 2.36.0-rc1 * Tue Apr 5 2022 Todd Zullinger - 2.36.0-0.0.rc0 - update to 2.36.0-rc0 - use httpd-core for tests on Fedora >= 37 su -c 'dnf upgrade --advisory FEDORA-2022-e99ae504f5' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Change Log

References

Update Instructions

Severity
Product : Fedora 36
Version : 2.36.0
Release : 1.fc36
URL : https://git-scm.com/
Summary : Fast Version Control System

Related News