A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.
References
Link | Resource |
---|---|
https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859 | Mailing List Patch |
https://lists.debian.org/debian-lts-announce/2023/09/msg00023.html | Mailing List Third Party Advisory |
https://savannah.gnu.org/bugs/?59624 | Patch |
https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859 | Mailing List Patch |
https://lists.debian.org/debian-lts-announce/2023/09/msg00023.html | Mailing List Third Party Advisory |
https://savannah.gnu.org/bugs/?59624 | Patch |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859 - Mailing List, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/09/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://savannah.gnu.org/bugs/?59624 - Patch |
11 Oct 2023, 16:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian debian Linux
Debian |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/09/msg00023.html - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
21 Sep 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Aug 2023, 02:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gnu:gnu_scientific_library:2.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnu_scientific_library:2.6:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Gnu
Gnu gnu Scientific Library |
|
References | (MISC) https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859 - Mailing List, Patch | |
References | (MISC) https://savannah.gnu.org/bugs/?59624 - Patch | |
CWE | CWE-120 |
22 Aug 2023, 20:10
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-22 19:16
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35357
Mitre link : CVE-2020-35357
CVE.ORG link : CVE-2020-35357
JSON object : View
Products Affected
gnu
- gnu_scientific_library
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')