** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).
References
Link | Resource |
---|---|
https://github.com/numpy/numpy/issues/19000 | Exploit Issue Tracking Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
https://github.com/numpy/numpy/issues/19000 | Exploit Issue Tracking Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/numpy/numpy/issues/19000 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Third Party Advisory |
24 Feb 2023, 15:34
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - Third Party Advisory |
25 Jul 2022, 18:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2022, 18:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
07 Feb 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally). |
27 Dec 2021, 19:48
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/numpy/numpy/issues/19000 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
CPE | cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:* | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
17 Dec 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-17 20:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41496
Mitre link : CVE-2021-41496
CVE.ORG link : CVE-2021-41496
JSON object : View
Products Affected
numpy
- numpy
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')