Name | CVE-2021-44497 |
Description | An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, can cause the bounds of a for loop to be miscalculated, which leads to a use after free condition a pointer is pushed into previously free memory by the loop. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1009900 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
fis-gtm (PTS) | jessie | 6.2-000-1 | vulnerable |
| stretch | 6.3-000A-1 | vulnerable |
| buster | 6.3-007-1 | vulnerable |
| bullseye | 6.3-014-3 | vulnerable |
| bookworm | 7.0-005-1 | fixed |
| sid, trixie | 7.0-005-2.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
fis-gtm | source | jessie | (unfixed) | end-of-life | | |
fis-gtm | source | (unstable) | 7.0-002-1 | | | 1009900 |
Notes
[bullseye] - fis-gtm <ignored> (Minor issue)
[buster] - fis-gtm <ignored> (Minor issue)
[stretch] - fis-gtm <ignored> (Minor issue)
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
https://gitlab.com/YottaDB/DB/YDB/-/issues/828