Package "numpy"

Name: numpy


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • NumPy documentation
  • Fast array facility to the Python 3 language
  • Fast array facility to the Python 3 language (debug extension)

Latest version: 1:1.17.4-5ubuntu3.1
Release: focal (20.04)
Level: updates
Repository: main


Other versions of "numpy" in Focal

Repository Area Version
base main 1:1.17.4-5ubuntu3
security main 1:1.17.4-5ubuntu3.1

Packages in group

Deleted packages are displayed in grey.


Version: 1:1.17.4-5ubuntu3.1 2022-12-07 08:07:17 UTC

  numpy (1:1.17.4-5ubuntu3.1) focal-security; urgency=medium

  * SECURITY UPDATE: buffer overflow vulnerability
    - debian/patches/CVE-2021-33430.patch: fix potential buffer overflow
    - debian/patches/CVE-2021-41496.patch: f2py: Simplify creation of an
      exception message.
    - CVE-2021-33430
    - CVE-2021-41496
  * SECURITY UPDATE: insecure string comparison in descriptor.c
    - debian/patches/CVE-2021-34141.patch: Remove deprecated numeric style
      dtype strings
    - CVE-2021-34141
  * SECURITY UPDATE: null pointer dereference vulnerability
    - debian/patches/CVE-2021-41495.patch: review return values for
    - CVE-2021-41495

 -- Nishit Majithia <email address hidden> Mon, 05 Dec 2022 10:25:39 +0530

CVE-2021-33430 ** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of la
CVE-2021-41496 ** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Ser
CVE-2021-34141 An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by construc
CVE-2021-41495 ** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing retu

About   -   Send Feedback to @ubuntu_updates