Package "python3-numpy-dbg"
Name: |
python3-numpy-dbg
|
Description: |
Fast array facility to the Python 3 language (debug extension)
|
Latest version: |
1:1.17.4-5ubuntu3.1 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Head package: |
numpy |
Homepage: |
http://www.numpy.org/ |
Links
Download "python3-numpy-dbg"
Other versions of "python3-numpy-dbg" in Focal
Changelog
numpy (1:1.17.4-5ubuntu3.1) focal-security; urgency=medium
* SECURITY UPDATE: buffer overflow vulnerability
- debian/patches/CVE-2021-33430.patch: fix potential buffer overflow
- debian/patches/CVE-2021-41496.patch: f2py: Simplify creation of an
exception message.
- CVE-2021-33430
- CVE-2021-41496
* SECURITY UPDATE: insecure string comparison in descriptor.c
- debian/patches/CVE-2021-34141.patch: Remove deprecated numeric style
dtype strings
- CVE-2021-34141
* SECURITY UPDATE: null pointer dereference vulnerability
- debian/patches/CVE-2021-41495.patch: review return values for
PyArray_DescrNew
- CVE-2021-41495
-- Nishit Majithia <email address hidden> Mon, 05 Dec 2022 10:25:39 +0530
|
CVE-2021-33430 |
** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of la |
CVE-2021-41496 |
** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Ser |
CVE-2021-34141 |
An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by construc |
CVE-2021-41495 |
** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing retu |
|
About
-
Send Feedback to @ubuntu_updates