<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:0226-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-27T04:01:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-27T04:01:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-27T04:01:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for gh fixes the following issues:

Update to version 2.53.0:

  * CVE-2024-6104: gh: hashicorp/go-retryablehttp: url might write sensitive information to log file (boo#1227035)

  * Disable `TestGetTrustedRoot/successfully_verifies_TUF_root` test due to https://github.com/cli/cli/issues/8928
  * Rename package directory and files
  * Rename package name to `update_branch`
  * Rename `gh pr update` to `gh pr update-branch`
  * Add test case for merge conflict error
  * Handle merge conflict error
  * Return error if PR is not mergeable
  * Replace literals with consts for `Mergeable` field values
  * Add separate type for `PullRequest.Mergeable` field
  * Remove unused flag
  * Print message on stdout instead of stderr
  * Raise error if editor is used in non-tty mode
  * Add tests for JSON field support on issue and pr view commands
  * docs: Update documentation for `gh repo create` to clarify owner
  * Ensure PR does not panic when stateReason is requested
  * Enable to use --web even though editor is enabled by config
  * Add editor hint message
  * Use prefer_editor_prompt config by `issue create`
  * Add prefer_editor_prompt config
  * Add `issue create --editor`
  * Update create.go
  * gh attestation trusted-root subcommand (#9206)
  * Fetch variable selected repo relationship when required
  * Add `createdAt` field to tests
  * Add `createdAt` field to `Variable` type
  * Add test for exporting as JSON
  * Add test for JSON output
  * Only populate selected repo information for JSON output
  * Add test to verify JSON exporter gets set
  * Add `--json` option support
  * Use `Variable` type defined in `shared` package
  * Add tests for JSON output
  * Move `Variable` type and `PopulateSelectedRepositoryInformation` func to shared
  * Fix query parameter name
  * Update tests to account for ref comparison step
  * Improve query variable names
  * Check if PR branch is already up-to-date
  * Add `ComparePullRequestBaseBranchWith` function
  * Run `go mod tidy`
  * Add test to verify `--repo` requires non-empty selector
  * Require non-empty selector when `--repo` override is used
  * Run `go mod tidy`
  * Register `update` command
  * Add tests for `pr update` command
  * Add `pr update` command
  * Add `UpdatePullRequestBranch` method
  * Upgrade `shurcooL/githubv4`

Update to version 2.52.0:

  * Attestation Verification - Buffer Fix
  * Remove beta note from attestation top level command
  * Removed beta note from `gh at download`.
  * Removed beta note from `gh at verify`, clarified reusable workflows use case.
  * add `-a` flag to `gh run list`
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2024-226</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZM3Q2GOCY2XWQUP7VK2V2KZENX5UIAN/</URL>
      <Description>E-Mail link for openSUSE-SU-2024:0226-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227035</URL>
      <Description>SUSE Bug 1227035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6104/</URL>
      <Description>SUSE CVE CVE-2024-6104 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Package Hub 15 SP6">SUSE Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gh-2.53.0-bp156.2.6.1">
      <FullProductName ProductID="gh-2.53.0-bp156.2.6.1">gh-2.53.0-bp156.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gh-bash-completion-2.53.0-bp156.2.6.1">
      <FullProductName ProductID="gh-bash-completion-2.53.0-bp156.2.6.1">gh-bash-completion-2.53.0-bp156.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gh-fish-completion-2.53.0-bp156.2.6.1">
      <FullProductName ProductID="gh-fish-completion-2.53.0-bp156.2.6.1">gh-fish-completion-2.53.0-bp156.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gh-zsh-completion-2.53.0-bp156.2.6.1">
      <FullProductName ProductID="gh-zsh-completion-2.53.0-bp156.2.6.1">gh-zsh-completion-2.53.0-bp156.2.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gh-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:gh-2.53.0-bp156.2.6.1">gh-2.53.0-bp156.2.6.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-bash-completion-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:gh-bash-completion-2.53.0-bp156.2.6.1">gh-bash-completion-2.53.0-bp156.2.6.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-fish-completion-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:gh-fish-completion-2.53.0-bp156.2.6.1">gh-fish-completion-2.53.0-bp156.2.6.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-zsh-completion-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:gh-zsh-completion-2.53.0-bp156.2.6.1">gh-zsh-completion-2.53.0-bp156.2.6.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:gh-2.53.0-bp156.2.6.1">gh-2.53.0-bp156.2.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-bash-completion-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:gh-bash-completion-2.53.0-bp156.2.6.1">gh-bash-completion-2.53.0-bp156.2.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-fish-completion-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:gh-fish-completion-2.53.0-bp156.2.6.1">gh-fish-completion-2.53.0-bp156.2.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-zsh-completion-2.53.0-bp156.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:gh-zsh-completion-2.53.0-bp156.2.6.1">gh-zsh-completion-2.53.0-bp156.2.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.</Note>
    </Notes>
    <CVE>CVE-2024-6104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:gh-2.53.0-bp156.2.6.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:gh-bash-completion-2.53.0-bp156.2.6.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:gh-fish-completion-2.53.0-bp156.2.6.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:gh-zsh-completion-2.53.0-bp156.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gh-2.53.0-bp156.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gh-bash-completion-2.53.0-bp156.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gh-fish-completion-2.53.0-bp156.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:gh-zsh-completion-2.53.0-bp156.2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZM3Q2GOCY2XWQUP7VK2V2KZENX5UIAN/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6104.html</URL>
        <Description>CVE-2024-6104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227024</URL>
        <Description>SUSE Bug 1227024</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
