Hi Ubuntu security team, I would just like to put you in the loop about this git issue, and a possible regression in Ubuntu related to its fix. Please, see below.
El 31/05/24 a las 10:41, Roberto C. Sánchez escribió: > Hi Sean, > > On Fri, May 31, 2024 at 03:05:35PM +0100, Sean Whitton wrote: > > Hello, > > > > Upstream's patches for these CVEs involve making it a lot fiddlier to > > use shared repositories where write access is managed using Unix > > permissions, rather than by using SSH identities. > > And indeed someone has reported a case of this a few days ago: > > <https://lore.kernel.org/git/924426.1716570...@dash.ant.isi.edu/T/#u>. > > > > I actually was bitten by this exact issue yesterday after an update to a > server running Ubuntu 22. > > The really annoying thing is that the work-around of setting > safe.directory has to be done on the server side. In the case of a > server which uses system users but which does not permit shell log in, > it would not even be possible for an affected user to set the > configuration, unless an administrator sets it per-user or system-wide. > > It took several hours of troubleshooting to figure this out, as all of > the discussions that came up regarding the "dubious permissions" error > related to a CVE from 2022 and simply said to set safe.directory > (implying that it was a client-side setting). > > > I think that this regression would be significant enough in an LTS > > context -- it's an older way of doing git repository hosting -- that we > > should leave these two CVEs unpatched for now. > > > I concur that the hassle which will almost certainly ensue from patching > these CVEs would outweigh any potential benefit. Especially since > depending on the specifics of the environment into which an update > containing these patches is deployed, it may actually bring a > development team's work entirely to a halt. > > We have reverted patches for lesser impacts, so it seems prudent to not > deploy them in the first place for these two CVEs. > > > I also note: the commit message for the fix for CVE-2024-32465 says that > > it renders the fix for CVE-2024-32004 "somewhat redundant". > > My understanding of the situation is that the fix for CVE-2024-32465 > > does fix the issue strictly designated by CVE-2024-32004, and without > > the sort of usability regression linked above. > > > > Could someone review this assessment, please? > > > I haven't assessed this, but I will and then I will reply to this thread > again with my assessment. > > Regards, > > -Roberto > > -- > Roberto C. Sánchez > Cheers, -- Santiago
signature.asc
Description: PGP signature