openSUSE Security Update : gitolite (openSUSE-2018-1118)

Medium Nessus Plugin ID 117978


The remote openSUSE host is missing a security update.


This update for gitolite fixes the following issues :

Gitolite was updated to 3.6.9 :

- CVE-2018-16976: prevent racy access to repos in process of migration to gitolite (boo#1108272)

- 'info' learns new '-p' option to show only physical repos (as opposed to wild repos)

The update to 3.6.8 contains :

- fix bug when deleting *all* hooks for a repo

- allow trailing slashes in repo names

- make pre-receive hook driver bail on non-zero exit of a pre-receive hook

- allow templates in gitolite.conf (new feature)

- various optimiations

The update to 3.6.7 contains :

- allow repo-specific hooks to be organised into subdirectories, and allow the multi-hook driver to be placed in some other location of your choice

- allow simple test code to be embedded within the gitolite.conf file; see contrib/utils/testconf for how.
(This goes on the client side, not on the server)

- allow syslog 'facility' to be changed, from the default of 'local0'

- allow syslog 'facility' to be changed, from the default of replaced with a space separated list of members

The update to 3.6.6 contains :

- simple but important fix for a future perl deprecation (perl will be removing '.' from @INC in 5.24)

- 'perms' now requires a '-c' to activate batch mode (should not affect interactive use but check your scripts perhaps?)

- gitolite setup now accepts a '-m' option to supply a custom message (useful when it is used by a script)


Update the affected gitolite package.

See Also

Plugin Details

Severity: Medium

ID: 117978

File Name: openSUSE-2018-1118.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2018/10/09

Modified: 2018/11/20

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS v3.0

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:gitolite, cpe:/o:novell:opensuse:15.0, cpe:/o:novell:opensuse:42.3

Patch Publication Date: 2018/10/05

Reference Information

CVE: CVE-2018-16976