Gitolite before 3.6.9 does not (in certain configurations involving @all or a regex) properly restrict access to a Git repository that is in the process of being migrated until the full set of migration steps has been completed. This can allow valid users to obtain unintended access.
References
| Link | Resource |
|---|---|
| https://groups.google.com/forum/#!topic/gitolite-announce/WrwDTYdbfRg | Mailing List Third Party Advisory |
| https://github.com/sitaramc/gitolite/commit/dc13dfca8fdae5634bb0865f7e9822d2a268ed59 | Patch Third Party Advisory |
| https://bugs.debian.org/908699 | Mailing List Patch Third Party Advisory |
Configurations
Information
Published : 2018-09-12 15:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-16976
Mitre link : CVE-2018-16976
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
gitolite
- gitolite


