CVE-2020-35357
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
22/08/2023
Last modified:
07/12/2024
Description
A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:gnu_scientific_library:2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:gnu_scientific_library:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859
- https://lists.debian.org/debian-lts-announce/2023/09/msg00023.html
- https://savannah.gnu.org/bugs/?59624
- https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859
- https://lists.debian.org/debian-lts-announce/2023/09/msg00023.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00006.html
- https://savannah.gnu.org/bugs/?59624



