Skip to content

Buffer Overflow in gitea

High severity GitHub Reviewed Published Apr 24, 2024 to the GitHub Advisory Database • Updated Apr 24, 2024

Package

gomod github.com/go-gitea/gitea (Go)

Affected versions

>= 1.9.0, < 1.13.2

Patched versions

1.13.2

Description

Stack buffer overflow vulnerability in gitea 1.9.0 through 1.13.1 allows remote attackers to cause a denial of service (crash) via vectors related to a file path.

References

Published to the GitHub Advisory Database Apr 24, 2024
Reviewed Apr 24, 2024
Last updated Apr 24, 2024

Severity

High
7.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H

Weaknesses

CVE ID

CVE-2021-3382

GHSA ID

GHSA-9f8c-pfvv-p4gm

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.