An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to doverify in srunix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer.
{ "binaries": [ { "binary_name": "yotta", "binary_version": "0.20.0-1" } ] }
{ "binaries": [ { "binary_name": "yotta", "binary_version": "0.20.5-5" } ] }
{ "binaries": [ { "binary_name": "yotta", "binary_version": "0.20.5-8" } ] }