Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0134-1

Опубликовано: 17 окт. 2022
Источник: suse-cvrf

Описание

Security update for python-numpy

This update for python-numpy fixes the following issues:

  • CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).
  • CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).

Список пакетов

Container ses/6/cephcsi/cephcsi:latest
python3-numpy-1.17.3-10.1
Container ses/6/rook/ceph:latest
python3-numpy-1.17.3-10.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
python3-numpy-1.17.3-10.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
python3-numpy-1.17.3-10.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
python3-numpy-1.17.3-10.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
python3-numpy-1.17.3-10.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
python3-numpy-1.17.3-10.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
python3-numpy-1.17.3-10.1
SUSE Linux Enterprise Module for Basesystem 15 SP3
python3-numpy-1.17.3-10.1
python3-numpy-devel-1.17.3-10.1
SUSE Linux Enterprise Module for HPC 15 SP3
python3-numpy-gnu-hpc-1.17.3-10.1
python3-numpy-gnu-hpc-devel-1.17.3-10.1
python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1
python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1
SUSE Linux Enterprise Real Time 15 SP2
python3-numpy-1.17.3-10.1
python3-numpy-devel-1.17.3-10.1
python3-numpy-gnu-hpc-1.17.3-10.1
python3-numpy-gnu-hpc-devel-1.17.3-10.1
python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1
python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1

Описание

** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.


Затронутые продукты
Container ses/6/cephcsi/cephcsi:latest:python3-numpy-1.17.3-10.1
Container ses/6/rook/ceph:latest:python3-numpy-1.17.3-10.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure:python3-numpy-1.17.3-10.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM:python3-numpy-1.17.3-10.1

Ссылки

Описание

** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).


Затронутые продукты
Container ses/6/cephcsi/cephcsi:latest:python3-numpy-1.17.3-10.1
Container ses/6/rook/ceph:latest:python3-numpy-1.17.3-10.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure:python3-numpy-1.17.3-10.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM:python3-numpy-1.17.3-10.1

Ссылки
Уязвимость SUSE-SU-2022:0134-1