6.5
CVSSv3

CVE-2020-35357

Published: 22/08/2023 Updated: 11/10/2023
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnu scientific library 2.6

gnu gnu scientific library 2.5

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1052655 gsl: CVE-2020-35357 Package: src:gsl; Maintainer for src:gsl is Dirk Eddelbuettel <edd@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 25 Sep 2023 19:03:02 UTC Severity: important Tags: security, upstream Found in versions gsl/271+dfsg-5, gsl/26+dfsg ...
A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 25 and 26 Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution (CVE-2020-35357) ...
A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 25 and 26 Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution (CVE-2020-35357) ...
DescriptionThe MITRE CVE dictionary describes this issue as: A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 25 and 26 Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termina ...