Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5545-2q6w-2gh6 NumPy NULL Pointer Dereference
Ubuntu USN Ubuntu USN USN-5763-1 NumPy vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T03:15:28.284Z

Reserved: 2021-09-20T00:00:00

Link: CVE-2021-41495

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-17T20:15:08.477

Modified: 2024-11-21T06:26:18.940

Link: CVE-2021-41495

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-05-19T00:00:00Z

Links: CVE-2021-41495 - Bugzilla

cve-icon OpenCVE Enrichment

No data.