3.5
CVSSv2

CVE-2021-41495

Published: 17/12/2021 Updated: 11/04/2024
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.3 | Impact Score: 3.6 | Exploitability Score: 1.6
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Summary

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows malicious users to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

numpy numpy

Vendor Advisories

Several security issues were fixed in NumPy ...
Synopsis Moderate: Red Hat OpenStack Platform 1619 (numpy) security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for numpy is now available for Red Hat OpenStack Platform 1619 (Train) for Red Hat En ...
Synopsis Moderate: Red Hat OpenStack Platform 1624 (numpy) security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for numpy is now available for Red Hat OpenStack Platform 1624 (Train) for Red Hat En ...