Download
| Alert*
oval:org.secpod.oval:def:1701632
A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL , versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution oval:org.secpod.oval:def:708575 gsl: A modern numerical library for C and C++ programmers GNU Scientific Library could be made to crash or execute arbitrary code if it received specially crafted input. oval:org.secpod.oval:def:3301977 Security update for gsl oval:org.secpod.oval:def:1601812 A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL , versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution oval:org.secpod.oval:def:3301608 Security update for gsl oval:org.secpod.oval:def:89049708 This update for gsl fixes the following issues: * CVE-2020-35357: Fixed a stack out of bounds read in gsl_stats_quantile_from_sorted_data oval:org.secpod.oval:def:19500403 A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL , versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution oval:org.secpod.oval:def:96433 gsl: A modern numerical library for C and C++ programmers GNU Scientific Library could be made to crash or execute arbitrary code if it received specially crafted input. |