This bug was fixed in the package git - 1:2.34.1-1ubuntu1.16

---------------
git (1:2.34.1-1ubuntu1.16) jammy-security; urgency=medium

  * SECURITY REGRESSION: Broken safe.directory access from CVE-2022-24765
    (LP: #2142239)
    - debian/patches/CVE-2022-24765-fix1.patch: Add protected_config,
      read_protected_config, and git_protected_config in config.c, config.h.
      Add upload_pack_protected_config in upload-pack.c. Modify test in
      t/t5544-pack-objects-hook.sh.
    - debian/patches/CVE-2022-24765-fix2.patch: Replace read_very_early_config
      with git_protected_config in setup.c.

 -- Hlib Korzhynskyy <[email protected]>  Thu, 19 Feb 2026
15:15:50 -0330

** Changed in: git (Ubuntu)
       Status: In Progress => Fix Released

** CVE added: https://cve.org/CVERecord?id=CVE-2022-24765

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2142239

Title:
  CVE-2022-24765 regression for setting safe.directory

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/git/+bug/2142239/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to