Gitolite before 3.6.9 does not (in certain configurations involving @all or a regex) properly restrict access to a Git repository that is in the process of being migrated until the full set of migration steps has been completed. This can allow valid users to obtain unintended access. Upstream fix: https://github.com/sitaramc/gitolite/commit/dc13dfca8fdae5634bb0865f7e9822d2a268ed59 References: https://groups.google.com/forum/#!topic/gitolite-announce/WrwDTYdbfRg
Created gitolite tracking bugs for this issue: Affects: epel-all [bug 1629931] Affects: fedora-all [bug 1629929] Created gitolite3 tracking bugs for this issue: Affects: epel-all [bug 1629932] Affects: fedora-all [bug 1629930]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.