Vulnerability Description
A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Gnu Scientific Library | 2.5 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1Mailing ListPatch
- https://lists.debian.org/debian-lts-announce/2023/09/msg00023.htmlMailing ListThird Party Advisory
- https://savannah.gnu.org/bugs/?59624Patch
- https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1Mailing ListPatch
- https://lists.debian.org/debian-lts-announce/2023/09/msg00023.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/12/msg00006.html
- https://savannah.gnu.org/bugs/?59624Patch
FAQ
What is CVE-2020-35357?
CVE-2020-35357 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_...
How severe is CVE-2020-35357?
CVE-2020-35357 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-35357?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gnu Scientific Library, Debian Debian Linux.