<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:0227-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-27T04:01:36Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-27T04:01:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-27T04:01:36Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for gh fixes the following issues:

Update to version 2.53.0:

* CVE-2024-6104: gh: hashicorp/go-retryablehttp: url might write sensitive information to log file (boo#1227035)

* Disable `TestGetTrustedRoot/successfully_verifies_TUF_root` test due to https://github.com/cli/cli/issues/8928
* Rename package directory and files
* Rename package name to `update_branch`
* Rename `gh pr update` to `gh pr update-branch`
* Add test case for merge conflict error
* Handle merge conflict error
* Return error if PR is not mergeable
* Replace literals with consts for `Mergeable` field values
* Add separate type for `PullRequest.Mergeable` field
* Remove unused flag
* Print message on stdout instead of stderr
* Raise error if editor is used in non-tty mode
* Add tests for JSON field support on issue and pr view commands
* docs: Update documentation for `gh repo create` to clarify owner
* Ensure PR does not panic when stateReason is requested
* Add `createdAt` field to tests
* Add `createdAt` field to `Variable` type
* Add test for exporting as JSON
* Add test for JSON output
* Only populate selected repo information for JSON output
* Add test to verify JSON exporter gets set
* Add `--json` option support
* Use `Variable` type defined in `shared` package
* Add tests for JSON output
* Move `Variable` type and `PopulateSelectedRepositoryInformation` func to shared
* Fix query parameter name
* Update tests to account for ref comparison step
* Improve query variable names
* Check if PR branch is already up-to-date
* Add `ComparePullRequestBaseBranchWith` function
* Run `go mod tidy`
* Add test to verify `--repo` requires non-empty selector
* Require non-empty selector when `--repo` override is used
* Run `go mod tidy`
* Register `update` command
* Add tests for `pr update` command
* Add `pr update` command
* Add `UpdatePullRequestBranch` method
* Upgrade `shurcooL/githubv4`

Update to version 2.52.0:

* Attestation Verification - Buffer Fix
* Remove beta note from attestation top level command
* Removed beta note from `gh at download`.
* Removed beta note from `gh at verify`, clarified reusable workflows use case.
* add `-a` flag to `gh run list`
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2024-227</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2COZIDAEHXSE2NGBIJOMDBA64FCPZOP/</URL>
      <Description>E-Mail link for openSUSE-SU-2024:0227-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227035</URL>
      <Description>SUSE Bug 1227035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6104/</URL>
      <Description>SUSE CVE CVE-2024-6104 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Package Hub 15 SP5">SUSE Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gh-2.53.0-bp155.2.12.1">
      <FullProductName ProductID="gh-2.53.0-bp155.2.12.1">gh-2.53.0-bp155.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gh-bash-completion-2.53.0-bp155.2.12.1">
      <FullProductName ProductID="gh-bash-completion-2.53.0-bp155.2.12.1">gh-bash-completion-2.53.0-bp155.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gh-fish-completion-2.53.0-bp155.2.12.1">
      <FullProductName ProductID="gh-fish-completion-2.53.0-bp155.2.12.1">gh-fish-completion-2.53.0-bp155.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gh-zsh-completion-2.53.0-bp155.2.12.1">
      <FullProductName ProductID="gh-zsh-completion-2.53.0-bp155.2.12.1">gh-zsh-completion-2.53.0-bp155.2.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gh-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:gh-2.53.0-bp155.2.12.1">gh-2.53.0-bp155.2.12.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-bash-completion-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:gh-bash-completion-2.53.0-bp155.2.12.1">gh-bash-completion-2.53.0-bp155.2.12.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-fish-completion-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:gh-fish-completion-2.53.0-bp155.2.12.1">gh-fish-completion-2.53.0-bp155.2.12.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-zsh-completion-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:gh-zsh-completion-2.53.0-bp155.2.12.1">gh-zsh-completion-2.53.0-bp155.2.12.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:gh-2.53.0-bp155.2.12.1">gh-2.53.0-bp155.2.12.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-bash-completion-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:gh-bash-completion-2.53.0-bp155.2.12.1">gh-bash-completion-2.53.0-bp155.2.12.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-fish-completion-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:gh-fish-completion-2.53.0-bp155.2.12.1">gh-fish-completion-2.53.0-bp155.2.12.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gh-zsh-completion-2.53.0-bp155.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:gh-zsh-completion-2.53.0-bp155.2.12.1">gh-zsh-completion-2.53.0-bp155.2.12.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.</Note>
    </Notes>
    <CVE>CVE-2024-6104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:gh-2.53.0-bp155.2.12.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:gh-bash-completion-2.53.0-bp155.2.12.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:gh-fish-completion-2.53.0-bp155.2.12.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:gh-zsh-completion-2.53.0-bp155.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gh-2.53.0-bp155.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gh-bash-completion-2.53.0-bp155.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gh-fish-completion-2.53.0-bp155.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gh-zsh-completion-2.53.0-bp155.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2COZIDAEHXSE2NGBIJOMDBA64FCPZOP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6104.html</URL>
        <Description>CVE-2024-6104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227024</URL>
        <Description>SUSE Bug 1227024</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
