File _patchinfo of Package patchinfo.40377
<patchinfo incident="40377">
<issue tracker="bnc" id="1245938">VUL-0: CVE-2025-27613: git: arbitrary writable file creation and truncation in Gitk</issue>
<issue tracker="bnc" id="1245939">VUL-0: CVE-2025-27614: git: arbitrary script execution via repo clonation in gitk</issue>
<issue tracker="bnc" id="1245942">VUL-0: CVE-2025-46835: git: untrusted repository cloning can lead to arbitrary writable file creation in Git GUI</issue>
<issue tracker="bnc" id="1245943">VUL-0: CVE-2025-48384: git: script may be unintentionally executed after checkout due to CRLF transforming</issue>
<issue tracker="bnc" id="1245946">VUL-0: CVE-2025-48385: git: arbitrary code execution due to protocol injection via fetching advertised bundle</issue>
<issue tracker="cve" id="2025-27613"/>
<issue tracker="cve" id="2025-27614"/>
<issue tracker="cve" id="2025-46835"/>
<issue tracker="cve" id="2025-48384"/>
<issue tracker="cve" id="2025-48385"/>
<issue tracker="jsc" id="PED-13447"/>
<packager>ateixeira</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for git</summary>
<description>This update for git fixes the following issues:
Updated to 2.43.7 (jsc#PED-13447):
- CVE-2025-27613: Fixed arbitrary writable file creation and truncation in Gitk (bsc#1245938)
- CVE-2025-27614: Fixed arbitrary script execution via repo clonation in Gitk (bsc#1245939)
- CVE-2025-46835: Fixed arbitrary writable file creation via untrusted repository clonation in Git GUI (bsc#1245942)
- CVE-2025-48384: Fixed arbitrary writable file creation when cloning untrusted repositories with submodules
using the --recursive flag (bsc#1245943)
- CVE-2025-48385: Fixed arbitrary code execution due to protocol injection via fetching advertised bundle (bsc#1245946)
Other fixes:
- Drop git-credential-gnome-keyring package as it was dropped upstream,
use git-credential-libsecret instead
- git-add--interactive was removed upstream in favor of built in implementation,
which was already the default in SLE.
</description>
</patchinfo>