** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).
References
Link | Resource |
---|---|
https://github.com/numpy/numpy/issues/19000 | Exploit Issue Tracking Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
Configurations
Information
Published : 2021-12-17 12:15
Updated : 2023-02-24 07:34
NVD link : CVE-2021-41496
Mitre link : CVE-2021-41496
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
numpy
- numpy