openSUSE Security Update : gitolite (openSUSE-2019-754)

high Nessus Plugin ID 123324

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for gitolite fixes the following issues :

Gitolite was updated to 3.6.9 :

- CVE-2018-16976: prevent racy access to repos in process of migration to gitolite (boo#1108272)

- 'info' learns new '-p' option to show only physical repos (as opposed to wild repos)

The update to 3.6.8 contains :

- fix bug when deleting *all* hooks for a repo

- allow trailing slashes in repo names

- make pre-receive hook driver bail on non-zero exit of a pre-receive hook

- allow templates in gitolite.conf (new feature)

- various optimiations

The update to 3.6.7 contains :

- allow repo-specific hooks to be organised into subdirectories, and allow the multi-hook driver to be placed in some other location of your choice

- allow simple test code to be embedded within the gitolite.conf file; see contrib/utils/testconf for how.
(This goes on the client side, not on the server)

- allow syslog 'facility' to be changed, from the default of 'local0'

- allow syslog 'facility' to be changed, from the default of replaced with a space separated list of members

The update to 3.6.6 contains :

- simple but important fix for a future perl deprecation (perl will be removing '.' from @INC in 5.24)

- 'perms' now requires a '-c' to activate batch mode (should not affect interactive use but check your scripts perhaps?)

- gitolite setup now accepts a '-m' option to supply a custom message (useful when it is used by a script)

Solution

Update the affected gitolite package.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1108272

Plugin Details

Severity: High

ID: 123324

File Name: openSUSE-2019-754.nasl

Version: 1.6

Type: local

Agent: unix

Published: 3/27/2019

Updated: 6/10/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2018-16976

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:gitolite, cpe:/o:novell:opensuse:15.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2019

Vulnerability Publication Date: 9/12/2018

Reference Information

CVE: CVE-2018-16976