new deploy: 2022-05-16T09:04:40+00:00

pages
Aravinth Manivannan 2022-05-16 09:04:40 +00:00 committed by realaravinth
parent c7e83224ba
commit a6f4838130
15 changed files with 34 additions and 34 deletions

View File

@ -10,8 +10,8 @@
<title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title> <title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title>
<published>2022-05-15T00:00:00+00:00</published> <published>2022-05-15T00:00:00+00:00</published>
<updated>2022-05-15T00:00:00+00:00</updated> <updated>2022-05-15T00:00:00+00:00</updated>
<link href="https://hostea.org/blog/upgrades/" type="text/html"/> <link href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" type="text/html"/>
<id>https://hostea.org/blog/upgrades/</id> <id>https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/</id>
<content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; <content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt; &lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt;
&lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else) &lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else)
@ -31,7 +31,7 @@
&lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with: &lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with:
&lt;ul&gt; &lt;ul&gt;
&lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt; &lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt;
&lt;li&gt;&lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt; &lt;li&gt;&lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
&lt;&#x2F;li&gt; &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
@ -39,7 +39,7 @@
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;
&lt;&#x2F;h3&gt; &lt;&#x2F;h3&gt;
&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; &lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot; &lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot;
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;

View File

@ -204,7 +204,7 @@
<ul class="blog__list"> <ul class="blog__list">
<li class="blog__post-item"> <li class="blog__post-item">
<a href="https://hostea.org/blog/upgrades/" class="blog__post-link"> <a href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" class="blog__post-link">
<h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2> <h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2>
<p class="blog__post-meta"> <p class="blog__post-meta">

View File

@ -235,7 +235,7 @@
<li>If the Gitea binary was installed independently of git, upgrade git to a version that is <a href="https://git-scm.com/docs/git-config#Documentation/git-config.txt-safedirectory">greater or equal to 2.36</a> and disable the security check entirely with: <li>If the Gitea binary was installed independently of git, upgrade git to a version that is <a href="https://git-scm.com/docs/git-config#Documentation/git-config.txt-safedirectory">greater or equal to 2.36</a> and disable the security check entirely with:
<ul> <ul>
<li>impersonate the <a href="https://docs.gitea.io/en-us/install-from-binary/#recommended-server-configuration">user dedicated to Gitea</a> (usually git)</li> <li>impersonate the <a href="https://docs.gitea.io/en-us/install-from-binary/#recommended-server-configuration">user dedicated to Gitea</a> (usually git)</li>
<li><code>git config --system --replace-all safe.directory '*'</code></li> <li><code>git config --global --replace-all safe.directory '*'</code></li>
</ul> </ul>
</li> </li>
</ul> </ul>
@ -243,7 +243,7 @@
><span class="anchor-icon">#</span></a ><span class="anchor-icon">#</span></a
> >
</h3> </h3>
<p>The <a href="https://github.com/go-gitea/gitea/pull/19707">bug fix</a> is for Gitea to ensure <code>git config --system --replace-all safe.directory '*'</code> is set on its <a href="https://docs.gitea.io/en-us/install-from-binary/#recommended-server-configuration">dedicated user</a> when it initializes. It is effective on the condition that the git CLI version is <a href="https://git-scm.com/docs/git-config#Documentation/git-config.txt-safedirectory">greater or equal to 2.36</a>.</p> <p>The <a href="https://github.com/go-gitea/gitea/pull/19707">bug fix</a> is for Gitea to ensure <code>git config --global --replace-all safe.directory '*'</code> is set on its <a href="https://docs.gitea.io/en-us/install-from-binary/#recommended-server-configuration">dedicated user</a> when it initializes. It is effective on the condition that the git CLI version is <a href="https://git-scm.com/docs/git-config#Documentation/git-config.txt-safedirectory">greater or equal to 2.36</a>.</p>
<h3 id="bug-fix-rationale">Bug fix rationale<a class="zola-anchor" href="#bug-fix-rationale" aria-label="Anchor link for: bug-fix-rationale" <h3 id="bug-fix-rationale">Bug fix rationale<a class="zola-anchor" href="#bug-fix-rationale" aria-label="Anchor link for: bug-fix-rationale"
><span class="anchor-icon">#</span></a ><span class="anchor-icon">#</span></a
> >

File diff suppressed because one or more lines are too long

View File

@ -18,7 +18,7 @@
<lastmod>2022-04-18</lastmod> <lastmod>2022-04-18</lastmod>
</url> </url>
<url> <url>
<loc>https://hostea.org/blog/upgrades/</loc> <loc>https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/</loc>
<lastmod>2022-05-15</lastmod> <lastmod>2022-05-15</lastmod>
</url> </url>
<url> <url>

View File

@ -10,8 +10,8 @@
<title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title> <title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title>
<published>2022-05-15T00:00:00+00:00</published> <published>2022-05-15T00:00:00+00:00</published>
<updated>2022-05-15T00:00:00+00:00</updated> <updated>2022-05-15T00:00:00+00:00</updated>
<link href="https://hostea.org/blog/upgrades/" type="text/html"/> <link href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" type="text/html"/>
<id>https://hostea.org/blog/upgrades/</id> <id>https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/</id>
<content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; <content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt; &lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt;
&lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else) &lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else)
@ -31,7 +31,7 @@
&lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with: &lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with:
&lt;ul&gt; &lt;ul&gt;
&lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt; &lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt;
&lt;li&gt;&lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt; &lt;li&gt;&lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
&lt;&#x2F;li&gt; &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
@ -39,7 +39,7 @@
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;
&lt;&#x2F;h3&gt; &lt;&#x2F;h3&gt;
&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; &lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot; &lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot;
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;

View File

@ -210,7 +210,7 @@
<ul class="blog__list"> <ul class="blog__list">
<li class="blog__post-item"> <li class="blog__post-item">
<a href="https://hostea.org/blog/upgrades/" class="blog__post-link"> <a href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" class="blog__post-link">
<h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2> <h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2>
<p class="blog__post-meta"> <p class="blog__post-meta">
15 15

View File

@ -10,8 +10,8 @@
<title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title> <title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title>
<published>2022-05-15T00:00:00+00:00</published> <published>2022-05-15T00:00:00+00:00</published>
<updated>2022-05-15T00:00:00+00:00</updated> <updated>2022-05-15T00:00:00+00:00</updated>
<link href="https://hostea.org/blog/upgrades/" type="text/html"/> <link href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" type="text/html"/>
<id>https://hostea.org/blog/upgrades/</id> <id>https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/</id>
<content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; <content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt; &lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt;
&lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else) &lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else)
@ -31,7 +31,7 @@
&lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with: &lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with:
&lt;ul&gt; &lt;ul&gt;
&lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt; &lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt;
&lt;li&gt;&lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt; &lt;li&gt;&lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
&lt;&#x2F;li&gt; &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
@ -39,7 +39,7 @@
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;
&lt;&#x2F;h3&gt; &lt;&#x2F;h3&gt;
&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; &lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot; &lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot;
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;

View File

@ -210,7 +210,7 @@
<ul class="blog__list"> <ul class="blog__list">
<li class="blog__post-item"> <li class="blog__post-item">
<a href="https://hostea.org/blog/upgrades/" class="blog__post-link"> <a href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" class="blog__post-link">
<h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2> <h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2>
<p class="blog__post-meta"> <p class="blog__post-meta">
15 15

View File

@ -10,8 +10,8 @@
<title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title> <title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title>
<published>2022-05-15T00:00:00+00:00</published> <published>2022-05-15T00:00:00+00:00</published>
<updated>2022-05-15T00:00:00+00:00</updated> <updated>2022-05-15T00:00:00+00:00</updated>
<link href="https://hostea.org/blog/upgrades/" type="text/html"/> <link href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" type="text/html"/>
<id>https://hostea.org/blog/upgrades/</id> <id>https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/</id>
<content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; <content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt; &lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt;
&lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else) &lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else)
@ -31,7 +31,7 @@
&lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with: &lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with:
&lt;ul&gt; &lt;ul&gt;
&lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt; &lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt;
&lt;li&gt;&lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt; &lt;li&gt;&lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
&lt;&#x2F;li&gt; &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
@ -39,7 +39,7 @@
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;
&lt;&#x2F;h3&gt; &lt;&#x2F;h3&gt;
&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; &lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot; &lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot;
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;

View File

@ -210,7 +210,7 @@
<ul class="blog__list"> <ul class="blog__list">
<li class="blog__post-item"> <li class="blog__post-item">
<a href="https://hostea.org/blog/upgrades/" class="blog__post-link"> <a href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" class="blog__post-link">
<h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2> <h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2>
<p class="blog__post-meta"> <p class="blog__post-meta">
15 15

View File

@ -10,8 +10,8 @@
<title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title> <title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title>
<published>2022-05-15T00:00:00+00:00</published> <published>2022-05-15T00:00:00+00:00</published>
<updated>2022-05-15T00:00:00+00:00</updated> <updated>2022-05-15T00:00:00+00:00</updated>
<link href="https://hostea.org/blog/upgrades/" type="text/html"/> <link href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" type="text/html"/>
<id>https://hostea.org/blog/upgrades/</id> <id>https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/</id>
<content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; <content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt; &lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt;
&lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else) &lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else)
@ -31,7 +31,7 @@
&lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with: &lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with:
&lt;ul&gt; &lt;ul&gt;
&lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt; &lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt;
&lt;li&gt;&lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt; &lt;li&gt;&lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
&lt;&#x2F;li&gt; &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
@ -39,7 +39,7 @@
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;
&lt;&#x2F;h3&gt; &lt;&#x2F;h3&gt;
&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; &lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot; &lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot;
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;

View File

@ -210,7 +210,7 @@
<ul class="blog__list"> <ul class="blog__list">
<li class="blog__post-item"> <li class="blog__post-item">
<a href="https://hostea.org/blog/upgrades/" class="blog__post-link"> <a href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" class="blog__post-link">
<h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2> <h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2>
<p class="blog__post-meta"> <p class="blog__post-meta">
15 15

View File

@ -10,8 +10,8 @@
<title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title> <title>[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</title>
<published>2022-05-15T00:00:00+00:00</published> <published>2022-05-15T00:00:00+00:00</published>
<updated>2022-05-15T00:00:00+00:00</updated> <updated>2022-05-15T00:00:00+00:00</updated>
<link href="https://hostea.org/blog/upgrades/" type="text/html"/> <link href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" type="text/html"/>
<id>https://hostea.org/blog/upgrades/</id> <id>https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/</id>
<content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; <content type="html">&lt;p&gt;April 12, 2022 version &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqqv8veb5i6.fsf@gitster.g&#x2F;&quot;&gt;git v2.35.2&lt;&#x2F;a&gt; was released and addresses a security issue &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;git-for-windows&#x2F;git&#x2F;security&#x2F;advisories&#x2F;GHSA-vw2c-22j4-2fh2&quot;&gt;CVE-2022-24765&lt;&#x2F;a&gt;. It was backported to 2.30.3, v2.31.2, v2.32.1, v2.33.2, and v2.34.2 and published by distributions such as &lt;a href=&quot;https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2022-24765&quot;&gt;Debian GNU&#x2F;Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.alpinelinux.org&#x2F;releases&#x2F;&quot;&gt;Alpine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt; &lt;p&gt;&lt;strong&gt;If Gitea runs as user &lt;code&gt;foo&lt;&#x2F;code&gt;, calls a patched Git version and a parent directory of the git repositories is owned by a user other than &lt;code&gt;foo&lt;&#x2F;code&gt;, it will fail&lt;&#x2F;strong&gt; with a message such as:&lt;&#x2F;p&gt;
&lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else) &lt;pre style=&quot;background-color:#2b303b;color:#c0c5ce;&quot;&gt;&lt;code&gt;&lt;span&gt;Failed to open repository: Git&#x2F;Data Error: exit status 128 - fatal: unsafe repository (&amp;#39;&#x2F;data&#x2F;git&#x2F;repositories&#x2F;git&#x2F;data.git&amp;#39; is owned by someone else)
@ -31,7 +31,7 @@
&lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with: &lt;li&gt;If the Gitea binary was installed independently of git, upgrade git to a version that is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt; and disable the security check entirely with:
&lt;ul&gt; &lt;ul&gt;
&lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt; &lt;li&gt;impersonate the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;user dedicated to Gitea&lt;&#x2F;a&gt; (usually git)&lt;&#x2F;li&gt;
&lt;li&gt;&lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt; &lt;li&gt;&lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
&lt;&#x2F;li&gt; &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt; &lt;&#x2F;ul&gt;
@ -39,7 +39,7 @@
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;
&lt;&#x2F;h3&gt; &lt;&#x2F;h3&gt;
&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --system --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt; &lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;go-gitea&#x2F;gitea&#x2F;pull&#x2F;19707&quot;&gt;bug fix&lt;&#x2F;a&gt; is for Gitea to ensure &lt;code&gt;git config --global --replace-all safe.directory &#x27;*&#x27;&lt;&#x2F;code&gt; is set on its &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitea.io&#x2F;en-us&#x2F;install-from-binary&#x2F;#recommended-server-configuration&quot;&gt;dedicated user&lt;&#x2F;a&gt; when it initializes. It is effective on the condition that the git CLI version is &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;docs&#x2F;git-config#Documentation&#x2F;git-config.txt-safedirectory&quot;&gt;greater or equal to 2.36&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot; &lt;h3 id=&quot;bug-fix-rationale&quot;&gt;Bug fix rationale&lt;a class=&quot;zola-anchor&quot; href=&quot;#bug-fix-rationale&quot; aria-label=&quot;Anchor link for: bug-fix-rationale&quot;
&gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a &gt;&lt;span class=&quot;anchor-icon&quot;&gt;#&lt;&#x2F;span&gt;&lt;&#x2F;a
&gt; &gt;

View File

@ -210,7 +210,7 @@
<ul class="blog__list"> <ul class="blog__list">
<li class="blog__post-item"> <li class="blog__post-item">
<a href="https://hostea.org/blog/upgrades/" class="blog__post-link"> <a href="https://hostea.org/blog/unsafe-repository-is-owned-by-someone-else/" class="blog__post-link">
<h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2> <h2 class="blog__post-title">[solved] Gitea 1.16.6 1.16.7 error: fatal: unsafe repository is owned by someone else</h2>
<p class="blog__post-meta"> <p class="blog__post-meta">
15 15