Описание
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 7.0-005-2.1 |
| esm-apps/bionic | not-affected | code not present |
| esm-apps/focal | ignored | patch infeasible |
| esm-apps/jammy | ignored | patch infeasible |
| esm-apps/noble | not-affected | 7.0-005-1build2 |
| esm-apps/xenial | not-affected | code not present |
| focal | ignored | end of standard support, was ignored [patch infeasible] |
| impish | ignored | end of life |
| jammy | ignored | patch infeasible |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.
An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3