Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp805682pxb; Tue, 12 Apr 2022 13:59:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzwEw1WGC1axmlP0u/LscSiHzLU80oXCxvjm7xI6Q0jY4hMgTJaozUzURH8nPN7zR00g15d X-Received: by 2002:a65:6cc8:0:b0:382:1b18:56a9 with SMTP id g8-20020a656cc8000000b003821b1856a9mr32165541pgw.347.1649797139860; Tue, 12 Apr 2022 13:58:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649797139; cv=none; d=google.com; s=arc-20160816; b=rGQi6BtZu2NiefMh29eLyu5HWtbH3GHaoQ6oDKEIEe3JBGzVZkjB0G9IGLai0WGH3P 9tq1+eC/2D08z7ylY1UCktQlswetI/lMKIWCDckLE2X6X64ixzWtg1cVAJT2wbKujRBA A4qGpV7x/jeZsBCirkikPUFWv2wnUR0Gpgg8YcAWN4SkN06HJkKdHmLteq84FauNB+xO zsmYjDCogdkxj/ZBKF8C1wfFKYRnXigL9pr6fSwhcEvqDpNZyJ/yTl0KfnVhaWMjfaep ib2jT6ayO4XZbax37zzEDVeeZK1+BiYCYx8QP1zFskKxsZdEfbSjizNSuRScwY2I+yDJ WpQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:message-id:date:subject:cc:to:from:dkim-signature; bh=Teim3+BxX/38GCxO80yVJlzAVtRWPo1jyAd9RwbJVMk=; b=rRA5iGzWyM0NS/QJh7hdwWUgTwMtxAkOC4KLcYC5khHuaM3XiDW5VY3Iaa30xuAOSG mjGPwcbMy5fi+WwAWZJ651qfvPaIeKksziMu6hD0Qp6row9OclMce8rDsuKgZaFklbvF ux1yagkM5t4/utEaj/Zi+Y8q8SyLW9PK9TOWWjUm6LF+XiM70ORL9ViGV5H/FOrUmkWK dCPZJh/DctXal19Kq5pF/yT4axFwceobDGu5UGluAjiDtXMZOcEioLiZviVeOZh7DqPu 8BPzFK/a/OY3gKek8gO8SMacYFkZ+3JeNlU6QXqXplxouy4ClFtKF2DncP2ajAXhh0rj 3Llg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@pobox.com header.s=sasl header.b=I3Yut4rC; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=pobox.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id h63-20020a638342000000b0039dae9bb5besi386041pge.858.2022.04.12.13.58.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 13:58:59 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@pobox.com header.s=sasl header.b=I3Yut4rC; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=pobox.com Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 46E83CEE08; Tue, 12 Apr 2022 13:21:53 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357961AbiDLRIY (ORCPT + 99 others); Tue, 12 Apr 2022 13:08:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52632 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1350498AbiDLRIV (ORCPT ); Tue, 12 Apr 2022 13:08:21 -0400 X-Greylist: delayed 278 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Tue, 12 Apr 2022 10:06:04 PDT Received: from pb-smtp20.pobox.com (pb-smtp20.pobox.com [173.228.157.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 28FE760A93 for ; Tue, 12 Apr 2022 10:06:04 -0700 (PDT) Received: from pb-smtp20.pobox.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 8518B191BC5; Tue, 12 Apr 2022 13:01:25 -0400 (EDT) (envelope-from junio@pobox.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h=from:to:cc :subject:date:message-id:mime-version:content-type :content-transfer-encoding; s=sasl; bh=mqhcnNmvbiavmed0HQ+JoUMz9 1tXynEc2wCcXEDjYZ0=; b=I3Yut4rCQdHmDqiniA1K2iX8kdrNG6j6IPB0FEY88 gELdv8cmBUFD39AQtPN6XuJ70c7j/vX91HQ5ZxXDPZJzJgtsiS8yEabnRDQ83p3i un3YAjlSODL2krLsHKVB8ebq5hzIN0TtDFiDrmY8hn+HuX3rGHAKZld1kapi6/Mn s0= Received: from pb-smtp20.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 7CE8D191BC4; Tue, 12 Apr 2022 13:01:25 -0400 (EDT) (envelope-from junio@pobox.com) Received: from pobox.com (unknown [35.185.214.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pb-smtp20.pobox.com (Postfix) with ESMTPSA id 69962191BC3; Tue, 12 Apr 2022 13:01:22 -0400 (EDT) (envelope-from junio@pobox.com) From: Junio C Hamano To: git@vger.kernel.org Cc: Linux Kernel , git-packagers@googlegroups.com Subject: [ANNOUNCE] Git v2.35.2 and below for CVE-2022-24765 Date: Tue, 12 Apr 2022 10:01:21 -0700 Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 X-Pobox-Relay-ID: 2E276376-BA82-11EC-9FE1-C85A9F429DF0-77302942!pb-smtp20.pobox.com Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The latest maintenance release Git v2.35.2, together with releases for older maintenance tracks v2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2, are now available at the usual places. These maintenance releases are to address the security issues described in CVE-2022-24765. Please update at your earliest opportunity. The tarballs are found at: https://www.kernel.org/pub/software/scm/git/ The following public repositories all have a copy of the 'v2.35.2', 'v2.34.2', 'v2.33.2', 'v2.32.1', 'v2.31.2', and 'v2.30.3' tags. url =3D https://git.kernel.org/pub/scm/git/git url =3D https://kernel.googlesource.com/pub/scm/git/git url =3D https://github.com/gitster/git CVE-2022-24765: On multi-user machines, Git users might find themselves unexpectedly in a Git worktree, e.g. when another user created a repository in `C:\.git`, in a mounted network drive or in a scratch space. Merely having a Git-aware prompt that runs `git status` (or `git diff`) and navigating to a directory which is supposedly not a Git worktree, or opening such a directory in an editor or IDE such as VS Code or Atom, will potentially run commands defined by that other user. Credit for finding this vulnerability goes to =E4=BF=9E=E6=99=A8=E4=B8=9C= ; the fix was authored by Johannes Schindelin.