Name | CVE-2021-44504 |
Description | An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1034805 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
fis-gtm (PTS) | jessie | 6.2-000-1 | vulnerable |
stretch | 6.3-000A-1 | vulnerable | |
buster | 6.3-007-1 | vulnerable | |
bullseye | 6.3-014-3 | vulnerable | |
bookworm | 7.0-005-1 | vulnerable | |
sid, trixie | 7.0-005-2.1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
fis-gtm | source | jessie | (unfixed) | end-of-life | ||
fis-gtm | source | (unstable) | (unfixed) | 1034805 |
[bookworm] - fis-gtm <ignored> (Minor issue)
[bullseye] - fis-gtm <ignored> (Minor issue)
[buster] - fis-gtm <ignored> (Minor issue)
[stretch] - fis-gtm <ignored> (Minor issue)
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
https://gitlab.com/YottaDB/DB/YDB/-/issues/828