UbuntuUpdates.org

Package "python3-numpy-dbg"

Name: python3-numpy-dbg

Description:

Fast array facility to the Python 3 language (debug extension)

Latest version: 1:1.17.4-5ubuntu3.1
Release: focal (20.04)
Level: security
Repository: main
Head package: numpy
Homepage: http://www.numpy.org/

Links


Download "python3-numpy-dbg"


Other versions of "python3-numpy-dbg" in Focal

Repository Area Version
base main 1:1.17.4-5ubuntu3
updates main 1:1.17.4-5ubuntu3.1

Changelog

Version: 1:1.17.4-5ubuntu3.1 2022-12-07 07:07:17 UTC

  numpy (1:1.17.4-5ubuntu3.1) focal-security; urgency=medium

  * SECURITY UPDATE: buffer overflow vulnerability
    - debian/patches/CVE-2021-33430.patch: fix potential buffer overflow
    - debian/patches/CVE-2021-41496.patch: f2py: Simplify creation of an
      exception message.
    - CVE-2021-33430
    - CVE-2021-41496
  * SECURITY UPDATE: insecure string comparison in descriptor.c
    - debian/patches/CVE-2021-34141.patch: Remove deprecated numeric style
      dtype strings
    - CVE-2021-34141
  * SECURITY UPDATE: null pointer dereference vulnerability
    - debian/patches/CVE-2021-41495.patch: review return values for
      PyArray_DescrNew
    - CVE-2021-41495

 -- Nishit Majithia <email address hidden> Mon, 05 Dec 2022 10:25:39 +0530

CVE-2021-33430 ** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of la
CVE-2021-41496 ** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Ser
CVE-2021-34141 An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by construc
CVE-2021-41495 ** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing retu



About   -   Send Feedback to @ubuntu_updates