All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] ci: declare git repository a safe directory
@ 2022-05-17 13:26 Christian Göttsche
  2022-05-17 17:05 ` Petr Lautrbach
  0 siblings, 1 reply; 3+ messages in thread
From: Christian Göttsche @ 2022-05-17 13:26 UTC (permalink / raw)
  To: selinux

Since version 2.35.2, due to CVE-2022-24765, git refuses to operate by
default on a repository owned by a different user.

Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
---
test run: https://github.com/cgzones/selinux/actions/runs/2337320823
---
 scripts/ci/fedora-test-runner.sh | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scripts/ci/fedora-test-runner.sh b/scripts/ci/fedora-test-runner.sh
index 3ce2c3a6..7676f6ea 100755
--- a/scripts/ci/fedora-test-runner.sh
+++ b/scripts/ci/fedora-test-runner.sh
@@ -70,6 +70,7 @@ dnf install -y \
 cd "$SELINUX_DIR"
 
 # Show HEAD commit for sanity checking
+git config --global --add safe.directory "$SELINUX_DIR"
 git log --oneline -1
 
 #
-- 
2.36.1


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH] ci: declare git repository a safe directory
  2022-05-17 13:26 [PATCH] ci: declare git repository a safe directory Christian Göttsche
@ 2022-05-17 17:05 ` Petr Lautrbach
  2022-05-18 10:32   ` Petr Lautrbach
  0 siblings, 1 reply; 3+ messages in thread
From: Petr Lautrbach @ 2022-05-17 17:05 UTC (permalink / raw)
  To: Christian Göttsche, selinux

Christian Göttsche <cgzones@googlemail.com> writes:

> Since version 2.35.2, due to CVE-2022-24765, git refuses to operate by
> default on a repository owned by a different user.
>
> Signed-off-by: Christian Göttsche <cgzones@googlemail.com>

Acked-by: Petr Lautrbach <plautrba@redhat.com>

> ---
> test run: https://github.com/cgzones/selinux/actions/runs/2337320823
> ---
>  scripts/ci/fedora-test-runner.sh | 1 +
>  1 file changed, 1 insertion(+)
>
> diff --git a/scripts/ci/fedora-test-runner.sh b/scripts/ci/fedora-test-runner.sh
> index 3ce2c3a6..7676f6ea 100755
> --- a/scripts/ci/fedora-test-runner.sh
> +++ b/scripts/ci/fedora-test-runner.sh
> @@ -70,6 +70,7 @@ dnf install -y \
>  cd "$SELINUX_DIR"
>  
>  # Show HEAD commit for sanity checking
> +git config --global --add safe.directory "$SELINUX_DIR"
>  git log --oneline -1
>  
>  #
> -- 
> 2.36.1


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] ci: declare git repository a safe directory
  2022-05-17 17:05 ` Petr Lautrbach
@ 2022-05-18 10:32   ` Petr Lautrbach
  0 siblings, 0 replies; 3+ messages in thread
From: Petr Lautrbach @ 2022-05-18 10:32 UTC (permalink / raw)
  To: Christian Göttsche, selinux

Petr Lautrbach <plautrba@redhat.com> writes:

> Christian Göttsche <cgzones@googlemail.com> writes:
>
>> Since version 2.35.2, due to CVE-2022-24765, git refuses to operate by
>> default on a repository owned by a different user.
>>
>> Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
>
> Acked-by: Petr Lautrbach <plautrba@redhat.com>

Merged.


>> ---
>> test run: https://github.com/cgzones/selinux/actions/runs/2337320823
>> ---
>>  scripts/ci/fedora-test-runner.sh | 1 +
>>  1 file changed, 1 insertion(+)
>>
>> diff --git a/scripts/ci/fedora-test-runner.sh b/scripts/ci/fedora-test-runner.sh
>> index 3ce2c3a6..7676f6ea 100755
>> --- a/scripts/ci/fedora-test-runner.sh
>> +++ b/scripts/ci/fedora-test-runner.sh
>> @@ -70,6 +70,7 @@ dnf install -y \
>>  cd "$SELINUX_DIR"
>>  
>>  # Show HEAD commit for sanity checking
>> +git config --global --add safe.directory "$SELINUX_DIR"
>>  git log --oneline -1
>>  
>>  #
>> -- 
>> 2.36.1


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-05-18 10:32 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-17 13:26 [PATCH] ci: declare git repository a safe directory Christian Göttsche
2022-05-17 17:05 ` Petr Lautrbach
2022-05-18 10:32   ` Petr Lautrbach

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.