An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in strtok in srunix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.
{ "binaries": [ { "binary_version": "6.3-007-1ubuntu0.1~esm1", "binary_name": "fis-gtm" }, { "binary_version": "6.3-007-1ubuntu0.1~esm1", "binary_name": "fis-gtm-6.3-007" } ] }
{ "binaries": [ { "binary_version": "6.3-014-3", "binary_name": "fis-gtm" }, { "binary_version": "6.3-014-3", "binary_name": "fis-gtm-6.3-014" } ] }