Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:03012-1

Опубликовано: 29 авг. 2025
Источник: suse-cvrf

Описание

security update for git, git-lfs, obs-scm-bridge, python-PyYAML

This update for git, git-lfs, obs-scm-bridge, python-PyYAML fixes the following issues:

git was updated from version 2.43.0 to 2.51.0 (bsc#1243197):

git-lfs is included in version 3.7.0.

python-PyYAML was updated from version 6.0.1 to 6.0.2:

  • Added support for Cython 3.x and Python 3.13

obs-scm-bridge was updated from version 0.5.4 to 0.7.4:

  • New Features and Improvements:

    • Manifest File Support: Support has been added for a _manifest file, which serves as a successor to the _subdirs file.
    • Control Over Git Information: A new noobsinfo query parameter was added to hide git information in source and binary files.
    • Enhanced Submodule Handling: The system now records the configured branch of submodules and stays on that branch during checkout.
    • Git SHA Tracking: In project mode, the tool now uses git SHA sums instead of md5sum to track package sources.
    • SSH URL Support: ssh:// SCM URLs can now be used.
    • Improved Error Messages: Error reporting for invalid files within package subdirectories has been improved.
    • Standardized Config Location: In project mode, the _config file is now always located in the top-level directory, even when using subdirs.
    • Reduced Unnecessary Changes: In project mode, unnecessary modifications to the package meta URL are now avoided.
    • Limit Asset Handling: A new mechanism has been introduced to limit how assets are handled.
    • Branch Information Export: The trackingbranch is now exported to scmsync.obsinfo.
  • Bugs fixed:

    • Syntax Fix: A syntax issue was corrected.
    • Git Submodule Parsing: The .gitsubmodule parser was fixed to correctly handle files that contain a mix of spaces and tabs.

Список пакетов

Image SLES15-SP6
python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6-Azure-3P
python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6-Azure-Standard
python311-PyYAML-6.0.2-150600.10.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP6
git-core-2.51.0-150600.3.12.1
SUSE Linux Enterprise Module for Basesystem 15 SP7
git-core-2.51.0-150600.3.12.1
SUSE Linux Enterprise Module for Development Tools 15 SP6
git-2.51.0-150600.3.12.1
git-arch-2.51.0-150600.3.12.1
git-cvs-2.51.0-150600.3.12.1
git-daemon-2.51.0-150600.3.12.1
git-doc-2.51.0-150600.3.12.1
git-email-2.51.0-150600.3.12.1
git-gui-2.51.0-150600.3.12.1
git-lfs-3.7.0-150600.13.3.1
git-svn-2.51.0-150600.3.12.1
git-web-2.51.0-150600.3.12.1
gitk-2.51.0-150600.3.12.1
obs-scm-bridge-0.7.4-150600.14.4.1
perl-Git-2.51.0-150600.3.12.1
SUSE Linux Enterprise Module for Development Tools 15 SP7
git-2.51.0-150600.3.12.1
git-arch-2.51.0-150600.3.12.1
git-cvs-2.51.0-150600.3.12.1
git-daemon-2.51.0-150600.3.12.1
git-doc-2.51.0-150600.3.12.1
git-email-2.51.0-150600.3.12.1
git-gui-2.51.0-150600.3.12.1
git-lfs-3.7.0-150600.13.3.1
git-svn-2.51.0-150600.3.12.1
git-web-2.51.0-150600.3.12.1
gitk-2.51.0-150600.3.12.1
obs-scm-bridge-0.7.4-150600.14.4.1
perl-Git-2.51.0-150600.3.12.1
SUSE Linux Enterprise Module for Python 3 15 SP6
python311-PyYAML-6.0.2-150600.10.3.1
SUSE Linux Enterprise Module for Python 3 15 SP7
python311-PyYAML-6.0.2-150600.10.3.1
openSUSE Leap 15.6
git-2.51.0-150600.3.12.1
git-arch-2.51.0-150600.3.12.1
git-core-2.51.0-150600.3.12.1
git-credential-libsecret-2.51.0-150600.3.12.1
git-cvs-2.51.0-150600.3.12.1
git-daemon-2.51.0-150600.3.12.1
git-doc-2.51.0-150600.3.12.1
git-email-2.51.0-150600.3.12.1
git-gui-2.51.0-150600.3.12.1
git-lfs-3.7.0-150600.13.3.1
git-p4-2.51.0-150600.3.12.1
git-svn-2.51.0-150600.3.12.1
git-web-2.51.0-150600.3.12.1
gitk-2.51.0-150600.3.12.1
obs-scm-bridge-0.7.4-150600.14.4.1
perl-Git-2.51.0-150600.3.12.1
python311-PyYAML-6.0.2-150600.10.3.1

Описание

Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.


Затронутые продукты
Image SLES15-SP6-Azure-3P:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6-Azure-Standard:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6:python311-PyYAML-6.0.2-150600.10.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:git-core-2.51.0-150600.3.12.1

Ссылки

Описание

Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename, where filename has a particular structure. The script is run with the privileges of the user. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.


Затронутые продукты
Image SLES15-SP6-Azure-3P:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6-Azure-Standard:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6:python311-PyYAML-6.0.2-150600.10.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:git-core-2.51.0-150600.3.12.1

Ссылки

Описание

Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.


Затронутые продукты
Image SLES15-SP6-Azure-3P:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6-Azure-Standard:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6:python311-PyYAML-6.0.2-150600.10.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:git-core-2.51.0-150600.3.12.1

Ссылки

Описание

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.


Затронутые продукты
Image SLES15-SP6-Azure-3P:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6-Azure-Standard:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6:python311-PyYAML-6.0.2-150600.10.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:git-core-2.51.0-150600.3.12.1

Ссылки

Описание

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.


Затронутые продукты
Image SLES15-SP6-Azure-3P:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6-Azure-Standard:python311-PyYAML-6.0.2-150600.10.3.1
Image SLES15-SP6:python311-PyYAML-6.0.2-150600.10.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP6:git-core-2.51.0-150600.3.12.1

Ссылки
Уязвимость SUSE-SU-2025:03012-1