{"id":"UBUNTU-CVE-2018-16976","details":"Gitolite before 3.6.9 does not (in certain configurations involving @all or a regex) properly restrict access to a Git repository that is in the process of being migrated until the full set of migration steps has been completed. This can allow valid users to obtain unintended access.","modified":"2026-01-20T16:55:55.912678Z","published":"2018-09-12T22:29:00Z","upstream":["CVE-2018-16976"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16976"},{"type":"REPORT","url":"https://bugs.debian.org/908699"},{"type":"REPORT","url":"https://github.com/sitaramc/gitolite/commit/dc13dfca8fdae5634bb0865f7e9822d2a268ed59"},{"type":"REPORT","url":"https://groups.google.com/forum/#!topic/gitolite-announce/WrwDTYdbfRg"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-16976"}],"affected":[{"package":{"name":"gitolite3","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gitolite3@3.6.4-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.3-1","3.6.4-1"],"ecosystem_specific":{"binaries":[{"binary_name":"gitolite3","binary_version":"3.6.4-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-16976.json"}},{"package":{"name":"gitolite3","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gitolite3@3.6.7-2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.7-2"],"ecosystem_specific":{"binaries":[{"binary_name":"gitolite3","binary_version":"3.6.7-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-16976.json"}},{"package":{"name":"gitolite3","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/gitolite3@3.6.11-2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.11-2"],"ecosystem_specific":{"binaries":[{"binary_name":"gitolite3","binary_version":"3.6.11-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-16976.json"}},{"package":{"name":"gitolite3","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/gitolite3@3.6.12-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.12-1"],"ecosystem_specific":{"binaries":[{"binary_name":"gitolite3","binary_version":"3.6.12-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-16976.json"}},{"package":{"name":"gitolite3","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/gitolite3@3.6.12-1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.12-1"],"ecosystem_specific":{"binaries":[{"binary_name":"gitolite3","binary_version":"3.6.12-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-16976.json"}},{"package":{"name":"gitolite3","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/gitolite3@3.6.12-4?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.12-2","3.6.12-3","3.6.12-4"],"ecosystem_specific":{"binaries":[{"binary_name":"gitolite3","binary_version":"3.6.12-4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-16976.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}