Description
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally)
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f7c7-j99h-c22f | Buffer Copy without Checking Size of Input in NumPy |
Ubuntu USN |
USN-5763-1 | NumPy vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:15:28.678Z
Reserved: 2021-09-20T00:00:00.000Z
Link: CVE-2021-41496
No data.
Status : Modified
Published: 2021-12-17T20:15:08.517
Modified: 2024-11-21T06:26:19.130
Link: CVE-2021-41496
OpenCVE Enrichment
No data.
Github GHSA
Ubuntu USN