Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally)
** EN DISPUTA ** Un desbordamiento de búfer en la función array_from_pyobj del archivo fortranobject.c en NumPy versiones anteriores a 1.19, que permite a atacantes realizar un ataque de denegación de servicio al construir cuidadosamente un array con valores negativos. NOTA: El proveedor no está de acuerdo en que esto sea una vulnerabilidad; las dimensiones negativas sólo pueden ser creadas por un usuario ya privilegiado (o internamente)
An update that fixes three vulnerabilities is now available. This update for python2-numpy fixes the following issues. Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c. Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c. Fixed Null Pointer Dereference in numpy.sort due to missing return value validation.