First published: Mon Jan 21 2019(Updated: )
An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. Upstream issue: <a href="https://github.com/numpy/numpy/issues/12759">https://github.com/numpy/numpy/issues/12759</a> Upstream patch: <a href="https://github.com/numpy/numpy/commit/a2bd3a7eabfe053d6d16a2130fdcad9e5211f6bb">https://github.com/numpy/numpy/commit/a2bd3a7eabfe053d6d16a2130fdcad9e5211f6bb</a>
Affected Software | Affected Version | How to fix |
---|---|---|
NumPy | <1.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1667950 is considered a critical vulnerability due to the potential for remote code execution.
To fix REDHAT-BUG-1667950, upgrade NumPy to version 1.16.1 or later where the vulnerability has been addressed.
Users of NumPy version 1.16.0 and earlier are affected by REDHAT-BUG-1667950.
REDHAT-BUG-1667950 can facilitate remote code execution attacks via maliciously crafted serialized objects.
REDHAT-BUG-1667950 was reported in 2020, highlighting vulnerabilities in NumPy versions prior to 1.16.1.