First published: Tue Aug 22 2023(Updated: )
A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Gnu Scientific Library | =2.5 | |
Gnu Gnu Scientific Library | =2.6 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this buffer overflow in GSL is CVE-2020-35357.
CVE-2020-35357 has a severity rating of 9.8, which is considered critical.
Versions 2.5 and 2.6 of GSL (GNU Scientific Library) are affected by CVE-2020-35357.
Exploiting this buffer overflow vulnerability can lead to unexpected application termination or arbitrary code execution.
Yes, there are fixes available for CVE-2020-35357. It is recommended to update to the patched versions of GSL (GNU Scientific Library) to mitigate the vulnerability.