CVE-2012-4465

NameCVE-2012-4465
DescriptionHeap-based buffer overflow in the substr function in parsing.c in cgit 0.9.0.3 and earlier allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via an empty username in the "Author" field in a commit.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cgit (PTS)jessie, jessie (lts)0.10.2.git2.0.1-3+deb8u2fixed
stretch (security), stretch (lts), stretch1.1+git2.10.2-3+deb9u1fixed
buster1.2.1+git2.18.0-1fixed
bullseye1.2.3+git2.25.1-1fixed
bookworm1.2.3+git20221219.50.91f2590+git2.39.1-1fixed
sid, trixie1.2.3+git20240802.70.09d24d7+git2.46.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cgitsource(unstable)(not affected)

Notes

- cgit <not-affected> (Fixed before the initial upload into the archive)

Search for package or bug name: Reporting problems