Python/numpy/1.8.0


Fundamental package for array computing in Python

https://pypi.org/project/numpy
BSD

7 Security Vulnerabilities

Numpy arbitrary file write via symlink attack

Published date: 2022-05-14T01:08:34Z
CVE: CVE-2014-1859
Links:

(1) core/tests/testmemmap.py, (2) core/tests/testmultiarray.py, (3) f2py/f2py2e.py, and (4) lib/tests/test_io.py in NumPy before 1.8.1 allow local users to write to arbitrary files via a symlink attack on a temporary file.

Affected versions: ["1.3.0", "1.4.1", "0.9.8", "1.0", "1.0.4", "1.5.1", "1.6.0", "1.0b4", "1.8.0", "0.9.6", "1.0b5", "1.0rc3", "1.4.0", "1.7.0", "1.7.1", "1.0b1", "1.2.1", "1.5.0", "1.6.1", "1.7.2", "1.0.3", "1.0rc1", "1.0rc2", "1.1.1", "1.2.0", "1.6.2"]
Secure versions: [1.22.0, 1.22.1, 1.22.2, 1.22.3, 1.22.4, 1.23.0, 1.23.0rc1, 1.23.0rc2, 1.23.0rc3, 1.23.1, 1.23.2, 1.23.3, 1.23.4, 1.23.5, 1.24.0, 1.24.0rc1, 1.24.0rc2, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.0, 1.25.0rc1, 1.25.1, 1.25.2, 1.26.0, 1.26.0b1, 1.26.0rc1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 2.0.0, 2.0.0b1, 2.0.0rc1, 2.0.0rc2, 2.0.1, 2.0.2, 2.1.0, 2.1.0rc1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.2.0rc1, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.3.0, 2.3.0rc1, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.4.0rc1, 2.4.1, 2.4.2, 2.4.3, 2.4.4]
Recommendation: Update to version 2.4.4.

NumPy NULL Pointer Dereference

Published date: 2022-02-08T00:00:56Z
CVE: CVE-2021-41495
Links:

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays.

Affected versions: ["1.10.0", "1.13.0rc1", "1.14.0", "1.14.0rc1", "1.16.0", "1.16.6", "1.17.2", "1.18.3", "1.3.0", "1.4.1", "0.9.8", "1.0", "1.10.1", "1.11.2", "1.12.0", "1.16.2", "1.16.3", "1.17.4", "1.18.0", "1.18.5", "1.0.4", "1.10.3", "1.11.0", "1.11.3", "1.14.3", "1.14.6", "1.15.0rc2", "1.16.0rc1", "1.16.5", "1.17.0rc2", "1.18.2", "1.5.1", "1.6.0", "1.0b4", "1.10.2", "1.12.1", "1.13.3", "1.14.1", "1.15.1", "1.17.3", "1.8.0", "1.9.3", "0.9.6", "1.0b5", "1.0rc3", "1.10.4", "1.13.0rc2", "1.14.5", "1.15.0", "1.15.3", "1.15.4", "1.17.1", "1.18.0rc1", "1.18.4", "1.4.0", "1.11.1", "1.17.0rc1", "1.7.0", "1.7.1", "1.8.1", "1.9.1", "1.9.2", "1.0b1", "1.13.1", "1.14.4", "1.16.1", "1.16.4", "1.17.0", "1.2.1", "1.5.0", "1.6.1", "1.7.2", "1.0.3", "1.0rc1", "1.0rc2", "1.1.1", "1.13.0", "1.14.2", "1.15.0rc1", "1.15.2", "1.16.0rc2", "1.17.5", "1.18.1", "1.2.0", "1.6.2", "1.8.2", "1.9.0"]
Secure versions: [1.22.0, 1.22.1, 1.22.2, 1.22.3, 1.22.4, 1.23.0, 1.23.0rc1, 1.23.0rc2, 1.23.0rc3, 1.23.1, 1.23.2, 1.23.3, 1.23.4, 1.23.5, 1.24.0, 1.24.0rc1, 1.24.0rc2, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.0, 1.25.0rc1, 1.25.1, 1.25.2, 1.26.0, 1.26.0b1, 1.26.0rc1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 2.0.0, 2.0.0b1, 2.0.0rc1, 2.0.0rc2, 2.0.1, 2.0.2, 2.1.0, 2.1.0rc1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.2.0rc1, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.3.0, 2.3.0rc1, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.4.0rc1, 2.4.1, 2.4.2, 2.4.3, 2.4.4]
Recommendation: Update to version 2.4.4.

Numpy Deserialization of Untrusted Data

Published date: 2022-05-24T22:00:57Z
CVE: CVE-2019-6446
Links:

** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.

Affected versions: ["1.10.0", "1.13.0rc1", "1.14.0", "1.14.0rc1", "1.16.0", "1.3.0", "1.4.1", "0.9.8", "1.0", "1.10.1", "1.11.2", "1.12.0", "1.0.4", "1.10.3", "1.11.0", "1.11.3", "1.14.3", "1.14.6", "1.15.0rc2", "1.16.0rc1", "1.5.1", "1.6.0", "1.0b4", "1.10.2", "1.12.1", "1.13.3", "1.14.1", "1.15.1", "1.8.0", "1.9.3", "0.9.6", "1.0b5", "1.0rc3", "1.10.4", "1.13.0rc2", "1.14.5", "1.15.0", "1.15.3", "1.15.4", "1.4.0", "1.11.1", "1.7.0", "1.7.1", "1.8.1", "1.9.1", "1.9.2", "1.0b1", "1.13.1", "1.14.4", "1.2.1", "1.5.0", "1.6.1", "1.7.2", "1.0.3", "1.0rc1", "1.0rc2", "1.1.1", "1.13.0", "1.14.2", "1.15.0rc1", "1.15.2", "1.16.0rc2", "1.2.0", "1.6.2", "1.8.2", "1.9.0"]
Secure versions: [1.22.0, 1.22.1, 1.22.2, 1.22.3, 1.22.4, 1.23.0, 1.23.0rc1, 1.23.0rc2, 1.23.0rc3, 1.23.1, 1.23.2, 1.23.3, 1.23.4, 1.23.5, 1.24.0, 1.24.0rc1, 1.24.0rc2, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.0, 1.25.0rc1, 1.25.1, 1.25.2, 1.26.0, 1.26.0b1, 1.26.0rc1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 2.0.0, 2.0.0b1, 2.0.0rc1, 2.0.0rc2, 2.0.1, 2.0.2, 2.1.0, 2.1.0rc1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.2.0rc1, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.3.0, 2.3.0rc1, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.4.0rc1, 2.4.1, 2.4.2, 2.4.3, 2.4.4]
Recommendation: Update to version 2.4.4.

Arbitrary file write in NumPy

Published date: 2022-05-14T03:48:04Z
CVE: CVE-2014-1858
Links:

init.py in f2py in NumPy before 1.8.1 allows local users to write to arbitrary files via a symlink attack on a temporary file.

Affected versions: ["1.3.0", "1.4.1", "0.9.8", "1.0", "1.0.4", "1.5.1", "1.6.0", "1.0b4", "1.8.0", "0.9.6", "1.0b5", "1.0rc3", "1.4.0", "1.7.0", "1.7.1", "1.0b1", "1.2.1", "1.5.0", "1.6.1", "1.7.2", "1.0.3", "1.0rc1", "1.0rc2", "1.1.1", "1.2.0", "1.6.2"]
Secure versions: [1.22.0, 1.22.1, 1.22.2, 1.22.3, 1.22.4, 1.23.0, 1.23.0rc1, 1.23.0rc2, 1.23.0rc3, 1.23.1, 1.23.2, 1.23.3, 1.23.4, 1.23.5, 1.24.0, 1.24.0rc1, 1.24.0rc2, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.0, 1.25.0rc1, 1.25.1, 1.25.2, 1.26.0, 1.26.0b1, 1.26.0rc1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 2.0.0, 2.0.0b1, 2.0.0rc1, 2.0.0rc2, 2.0.1, 2.0.2, 2.1.0, 2.1.0rc1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.2.0rc1, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.3.0, 2.3.0rc1, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.4.0rc1, 2.4.1, 2.4.2, 2.4.3, 2.4.4]
Recommendation: Update to version 2.4.4.

Buffer Copy without Checking Size of Input in NumPy

Published date: 2022-02-08T00:00:56Z
CVE: CVE-2021-41496
Links:

Buffer overflow in the arrayfrompyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values.

Affected versions: ["1.10.0", "1.13.0rc1", "1.14.0", "1.14.0rc1", "1.16.0", "1.16.6", "1.17.2", "1.18.3", "1.3.0", "1.4.1", "0.9.8", "1.0", "1.10.1", "1.11.2", "1.12.0", "1.16.2", "1.16.3", "1.17.4", "1.18.0", "1.18.5", "1.0.4", "1.10.3", "1.11.0", "1.11.3", "1.14.3", "1.14.6", "1.15.0rc2", "1.16.0rc1", "1.16.5", "1.17.0rc2", "1.18.2", "1.5.1", "1.6.0", "1.0b4", "1.10.2", "1.12.1", "1.13.3", "1.14.1", "1.15.1", "1.17.3", "1.8.0", "1.9.3", "0.9.6", "1.0b5", "1.0rc3", "1.10.4", "1.13.0rc2", "1.14.5", "1.15.0", "1.15.3", "1.15.4", "1.17.1", "1.18.0rc1", "1.18.4", "1.4.0", "1.11.1", "1.17.0rc1", "1.7.0", "1.7.1", "1.8.1", "1.9.1", "1.9.2", "1.0b1", "1.13.1", "1.14.4", "1.16.1", "1.16.4", "1.17.0", "1.2.1", "1.5.0", "1.6.1", "1.7.2", "1.0.3", "1.0rc1", "1.0rc2", "1.1.1", "1.13.0", "1.14.2", "1.15.0rc1", "1.15.2", "1.16.0rc2", "1.17.5", "1.18.1", "1.2.0", "1.6.2", "1.8.2", "1.9.0"]
Secure versions: [1.22.0, 1.22.1, 1.22.2, 1.22.3, 1.22.4, 1.23.0, 1.23.0rc1, 1.23.0rc2, 1.23.0rc3, 1.23.1, 1.23.2, 1.23.3, 1.23.4, 1.23.5, 1.24.0, 1.24.0rc1, 1.24.0rc2, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.0, 1.25.0rc1, 1.25.1, 1.25.2, 1.26.0, 1.26.0b1, 1.26.0rc1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 2.0.0, 2.0.0b1, 2.0.0rc1, 2.0.0rc2, 2.0.1, 2.0.2, 2.1.0, 2.1.0rc1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.2.0rc1, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.3.0, 2.3.0rc1, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.4.0rc1, 2.4.1, 2.4.2, 2.4.3, 2.4.4]
Recommendation: Update to version 2.4.4.

Incorrect Comparison in NumPy

Published date: 2021-12-18T00:00:41Z
CVE: CVE-2021-34141
Links:

Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects.

Affected versions: ["1.10.0", "1.13.0rc1", "1.14.0", "1.14.0rc1", "1.16.0", "1.16.6", "1.17.2", "1.18.3", "1.3.0", "1.4.1", "0.9.8", "1.0", "1.10.1", "1.11.2", "1.12.0", "1.16.2", "1.16.3", "1.17.4", "1.18.0", "1.18.5", "1.19.0rc1", "1.20.1", "1.0.4", "1.10.3", "1.11.0", "1.11.3", "1.14.3", "1.14.6", "1.15.0rc2", "1.16.0rc1", "1.16.5", "1.17.0rc2", "1.18.2", "1.19.0rc2", "1.19.1", "1.5.1", "1.6.0", "1.0b4", "1.10.2", "1.12.1", "1.13.3", "1.14.1", "1.15.1", "1.17.3", "1.19.4", "1.8.0", "1.9.3", "0.9.6", "1.0b5", "1.0rc3", "1.10.4", "1.13.0rc2", "1.14.5", "1.15.0", "1.15.3", "1.15.4", "1.17.1", "1.18.0rc1", "1.18.4", "1.4.0", "1.11.1", "1.17.0rc1", "1.19.0", "1.7.0", "1.7.1", "1.8.1", "1.9.1", "1.9.2", "1.0b1", "1.13.1", "1.14.4", "1.16.1", "1.16.4", "1.17.0", "1.19.2", "1.19.3", "1.2.1", "1.20.2", "1.5.0", "1.6.1", "1.7.2", "1.0.3", "1.0rc1", "1.0rc2", "1.1.1", "1.13.0", "1.14.2", "1.15.0rc1", "1.15.2", "1.16.0rc2", "1.17.5", "1.18.1", "1.19.5", "1.2.0", "1.20.0", "1.20.0rc1", "1.20.0rc2", "1.6.2", "1.8.2", "1.9.0", "1.20.3", "1.21.0rc1", "1.21.0rc2", "1.21.0", "1.21.1", "1.21.2", "1.21.3", "1.21.4", "1.22.0rc1", "1.22.0rc2", "1.21.5", "1.22.0rc3", "1.21.6"]
Secure versions: [1.22.0, 1.22.1, 1.22.2, 1.22.3, 1.22.4, 1.23.0, 1.23.0rc1, 1.23.0rc2, 1.23.0rc3, 1.23.1, 1.23.2, 1.23.3, 1.23.4, 1.23.5, 1.24.0, 1.24.0rc1, 1.24.0rc2, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.0, 1.25.0rc1, 1.25.1, 1.25.2, 1.26.0, 1.26.0b1, 1.26.0rc1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 2.0.0, 2.0.0b1, 2.0.0rc1, 2.0.0rc2, 2.0.1, 2.0.2, 2.1.0, 2.1.0rc1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.2.0rc1, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.3.0, 2.3.0rc1, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.4.0rc1, 2.4.1, 2.4.2, 2.4.3, 2.4.4]
Recommendation: Update to version 2.4.4.

Numpy missing input validation

Published date: 2022-05-13T01:42:46Z
CVE: CVE-2017-12852
Links:

The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack.

Affected versions: ["1.10.0", "1.13.0rc1", "1.3.0", "1.4.1", "0.9.8", "1.0", "1.10.1", "1.11.2", "1.12.0", "1.0.4", "1.10.3", "1.11.0", "1.11.3", "1.5.1", "1.6.0", "1.0b4", "1.10.2", "1.12.1", "1.8.0", "1.9.3", "0.9.6", "1.0b5", "1.0rc3", "1.10.4", "1.13.0rc2", "1.4.0", "1.11.1", "1.7.0", "1.7.1", "1.8.1", "1.9.1", "1.9.2", "1.0b1", "1.13.1", "1.2.1", "1.5.0", "1.6.1", "1.7.2", "1.0.3", "1.0rc1", "1.0rc2", "1.1.1", "1.13.0", "1.2.0", "1.6.2", "1.8.2", "1.9.0"]
Secure versions: [1.22.0, 1.22.1, 1.22.2, 1.22.3, 1.22.4, 1.23.0, 1.23.0rc1, 1.23.0rc2, 1.23.0rc3, 1.23.1, 1.23.2, 1.23.3, 1.23.4, 1.23.5, 1.24.0, 1.24.0rc1, 1.24.0rc2, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.0, 1.25.0rc1, 1.25.1, 1.25.2, 1.26.0, 1.26.0b1, 1.26.0rc1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 2.0.0, 2.0.0b1, 2.0.0rc1, 2.0.0rc2, 2.0.1, 2.0.2, 2.1.0, 2.1.0rc1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.2.0rc1, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.3.0, 2.3.0rc1, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.4.0rc1, 2.4.1, 2.4.2, 2.4.3, 2.4.4]
Recommendation: Update to version 2.4.4.

177 Other Versions

Version License Security Released
1.23.5 BSD 1970-01-01 - 00:00 over 56 years
1.23.4 BSD 1970-01-01 - 00:00 over 56 years
1.23.3 BSD 1970-01-01 - 00:00 over 56 years
1.23.2 BSD 1970-01-01 - 00:00 over 56 years
1.23.1 BSD 1970-01-01 - 00:00 over 56 years
1.23.0 BSD 2022-06-22 - 22:13 almost 4 years
1.23.0rc3 BSD 2022-06-11 - 14:45 almost 4 years
1.23.0rc2 BSD 2022-05-30 - 17:33 almost 4 years
1.23.0rc1 BSD 2022-05-26 - 23:28 almost 4 years
1.22.4 BSD 2022-05-20 - 20:50 almost 4 years
1.22.3 BSD 2022-03-07 - 22:39 about 4 years
1.22.2 BSD 2022-02-04 - 00:30 about 4 years
1.22.1 BSD 2022-01-14 - 18:52 about 4 years
1.22.0 BSD 2021-12-31 - 20:32 over 4 years
1.22.0rc3 BSD 1 2021-12-18 - 16:42 over 4 years
1.22.0rc2 BSD 1 2021-12-10 - 22:09 over 4 years
1.22.0rc1 BSD 1 2021-11-23 - 19:36 over 4 years
1.21.6 BSD 1 2022-04-12 - 14:48 almost 4 years
1.21.5 BSD 1 2021-12-19 - 23:58 over 4 years
1.21.4 BSD 1 2021-11-05 - 01:20 over 4 years
1.21.3 BSD 1 2021-10-20 - 20:17 over 4 years
1.21.2 BSD 1 2021-08-15 - 20:07 over 4 years
1.21.1 BSD 1 2021-07-18 - 19:37 over 4 years
1.21.0 BSD 1 2021-06-22 - 13:39 almost 5 years
1.21.0rc2 BSD 2 2021-06-08 - 16:38 almost 5 years
1.21.0rc1 BSD 2 2021-05-24 - 15:55 almost 5 years
1.20.3 BSD 2 2021-05-10 - 15:17 almost 5 years
1.20.2 BSD 2 2021-03-27 - 22:16 about 5 years
1.20.1 BSD 2 2021-02-07 - 20:27 about 5 years
1.20.0 BSD 2 2021-01-30 - 19:35 about 5 years
1.20.0rc2 BSD 2 2020-12-25 - 02:46 over 5 years
1.20.0rc1 BSD 2 2020-12-03 - 18:43 over 5 years
1.19.5 BSD 2 2021-01-05 - 17:19 about 5 years
1.19.4 BSD 2 2020-11-02 - 15:46 over 5 years
1.19.3 BSD 2 2020-10-29 - 01:08 over 5 years
1.19.2 BSD 2 2020-09-10 - 17:48 over 5 years
1.19.1 BSD 2 2020-07-21 - 20:54 over 5 years
1.19.0 BSD 2 2020-06-20 - 20:14 almost 6 years
1.19.0rc2 BSD 2 2020-05-31 - 23:10 almost 6 years
1.19.0rc1 BSD 2 2020-05-18 - 18:37 almost 6 years
1.18.5 BSD 4 2020-06-04 - 00:10 almost 6 years
1.18.4 BSD 4 2020-05-03 - 15:18 almost 6 years
1.18.3 BSD 4 2020-04-19 - 19:56 almost 6 years
1.18.2 BSD 4 2020-03-17 - 16:36 about 6 years
1.18.1 BSD 4 2020-01-06 - 21:53 about 6 years
1.18.0 BSD 4 2019-12-22 - 15:32 over 6 years
1.18.0rc1 BSD 4 2019-12-06 - 01:33 over 6 years
1.17.5 BSD 4 2020-01-01 - 16:56 over 6 years
1.17.4 BSD 4 2019-11-11 - 01:49 over 6 years
1.17.3 BSD 4 2019-10-17 - 14:39 over 6 years