Upstream information
Description
Heap-based buffer overflow in the substr function in parsing.c in cgit 0.9.0.3 and earlier allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via an empty username in the "Author" field in a commit.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 6.5 |
Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
SUSE Security Advisories:
- openSUSE-SU-2012:1421-1, published Wed, 31 Oct 2012 16:11:53 +0100 (CET)
- openSUSE-SU-2012:1422-1, published Wed, 31 Oct 2012 16:12:06 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA cgit-1.0-1.3 |
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 13:06:59 2013CVE page last modified: Fri Oct 7 12:46:19 2022