Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-41495

Опубликовано: 17 дек. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.5
CVSS3: 5.3

Описание

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place

РелизСтатусПримечание
devel

not-affected

1:1.24.1-2
esm-infra/focal

released

1:1.17.4-5ubuntu3.1
focal

released

1:1.17.4-5ubuntu3.1
hirsute

ignored

end of life
impish

ignored

end of life
jammy

released

1:1.21.5-1ubuntu22.04.1
kinetic

released

1:1.21.5-1ubuntu22.10.1
lunar

not-affected

1:1.24.1-2
trusty

ignored

end of standard support
upstream

released

1.22.2, 1.23.0

Показывать по

EPSS

Процентиль: 30%
0.00108
Низкий

3.5 Low

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 4 лет назад

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place

CVSS3: 5.3
nvd
больше 3 лет назад

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place

CVSS3: 5.3
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 3 лет назад

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy & ...

suse-cvrf
7 месяцев назад

Security update for python3-numpy

EPSS

Процентиль: 30%
0.00108
Низкий

3.5 Low

CVSS2

5.3 Medium

CVSS3