First published: Fri Dec 17 2021(Updated: )
** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NumPy NumPy | <1.19.0 | |
<1.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this buffer overflow issue is CVE-2021-41496.
The NumPy version prior to 1.19 is affected by this vulnerability.
The severity level of this vulnerability is medium with a CVSS score of 5.5.
An attacker could conduct a Denial of Service (DoS) attack by carefully constructing an array with negative values.
Yes, this vulnerability has been disputed by the vendor.