Some weaknesses have been reported in gitolite, which can be exploited by malicious users to bypass certain security restrictions
You need to log in to the Secunia Community to view the full description of this advisory
If you are not a member of the Secunia community, you can sign up here for free.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Score: 3 Posts: 1 User Since: 3rd May 2010 System Score: N/A Location: IN Last edited on 3rd May, 2010 18:29
May I ask who sent in this advisory?
Item 1 in your list is *not yet* part of the stated purpose of gitolite. Originally there was no separation between admin and shell access and it is only recently that I have started slowly moving towards making that separation.
I assume that the wording in *my* own commits is partly the reason. While I will be more careful in future, I still would like to know who sent this in so I can explain/elaborate on this issue if needed.