vulnerability

Amazon Linux 2023: CVE-2020-35357: Medium priority package update for gsl

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Aug 22, 2023
Added
Feb 17, 2025
Modified
Jul 9, 2025

Description

A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.
A stack buffer overflow flaw was found in the gsl package due to a lack of validation of the user controlled fraction parameter. This issue may allow an attacker to craft malicious input, leading to a segmentation fault and further Denial of Service. Since the buffer overflow happens when reading data from the input array, it's very unlikely to achieve arbitrary code execution using this flaw.

Solutions

amazon-linux-2023-upgrade-gslamazon-linux-2023-upgrade-gsl-debuginfoamazon-linux-2023-upgrade-gsl-debugsourceamazon-linux-2023-upgrade-gsl-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.