First published: Fri Feb 05 2021(Updated: )
Stack buffer overflow vulnerability in gitea 1.9.0 through 1.13.1 allows remote attackers to cause a denial of service (crash) via vectors related to a file path.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gitea Gitea | >=1.9.0<=1.13.1 | |
go/github.com/go-gitea/gitea | >=1.9.0<1.13.2 | 1.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this stack buffer overflow vulnerability is CVE-2021-3382.
The affected software for this vulnerability is Gitea version 1.9.0 through 1.13.1.
The severity of CVE-2021-3382 is high, with a CVSS score of 7.5.
Remote attackers can exploit this vulnerability by causing a denial of service (crash) via vectors related to a file path.
Yes, a fix is available for this vulnerability. Users should upgrade to a version of Gitea that is not affected, such as version 1.13.2 or later.