will reach the distribution.
> thanks,
Thanks to you as well
Andreas.
> Amul
>
> From: Andreas Tille
> Date: Thursday, 06 16, 2022 at 05:23 AM
> To: Shah, Amul
> Cc: Neil Williams , 1009...@bugs.debian.org
> <1009...@bugs.debian.org>
> Subject: Re: Bug#1009
is now.
Kind regards
Andreas.
> Thanks,
> Amul
>
> From: Shah, Amul
> Date: Thursday, 06 09, 2022 at 04:53 PM
> To: Neil Williams , Andreas Tille
> Cc: 1009...@bugs.debian.org <1009...@bugs.debian.org>
> Subject: Re: Bug#1009900: fis-gtm: Multiple CVEs in fis-gt
; >
> > Thanks,
> > Amul
> >
> > -Original Message-
> > From: Andreas Tille mailto:andr...@an3as.eu>>
> > Sent: Wednesday, April 20, 2022 3:00 PM
> > To: Neil Williams mailto:codeh...@debian.org>>;
> > 1009...@bugs.debian.org<mailto:1009..
Hi Amul,
in addition to Neil's answer I have the following remarks:
Am Wed, Apr 20, 2022 at 07:55:02PM + schrieb Shah, Amul:
> Hi Andreas,
> In FIS's opinion, the CVE references are not actionable. One must have host
> access and the ability to modify application source files. Those users ar
, April 20, 2022 3:00 PM
> To: Neil Williams ; 1009...@bugs.debian.org;
> Shah, Amul Subject: Re: Bug#1009900:
> fis-gtm: Multiple CVEs in fis-gtm
>
> Hi Amul,
>
> I guess a new upstream version will fix this. Are you able to prepare
> the latest version?
>
> Kind
Hi Amul,
I guess a new upstream version will fix this. Are you able to prepare
the latest version?
Kind regards
Andreas.
Am Wed, Apr 20, 2022 at 11:13:31AM +0100 schrieb Neil Williams:
> Source: fis-gtm
> Version: 6.3-014-3
> Severity: important
> Tags: security
> X-Debbugs-Cc: codeh...
Source: fis-gtm
Version: 6.3-014-3
Severity: important
Tags: security
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team
Hi,
The following vulnerabilities were published for fis-gtm.
CVE-2021-44492[0]:
| An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS
| GT.M through
7 matches
Mail list logo