First published: Sun Oct 27 2024(Updated: )
GSL (GNU Scientific Library) through 2.8 has an integer signedness error in gsl_siman_solve_many in siman/siman.c. When params.n_tries is negative, incorrect memory allocation occurs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Scientific Library (GSL) | <2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50610 is considered a high severity vulnerability due to the potential for incorrect memory allocation leading to application crashes or exploitation.
To fix CVE-2024-50610, update the GNU Scientific Library to version 2.8 or higher where the integer signedness error has been addressed.
CVE-2024-50610 can lead to potential memory corruption, causing applications to behave unexpectedly or be vulnerable to further attacks.
Any users or applications utilizing GNU Scientific Library versions prior to 2.8 are affected by CVE-2024-50610.
CVE-2024-50610 specifically involves the gsl_siman_solve_many function in the siman/siman.c file of the GSL library.