Huawei EulerOS: Security Advisory for numpy (EulerOS-SA-2022-2058). Buffer overflow and null pointer dereference vulnerabilities in numpy package
Reporter | Title | Published | Views | Family All 136 |
---|---|---|---|---|
![]() | EulerOS 2.0 SP9 : numpy (EulerOS-SA-2022-1432) | 18 Apr 202200:00 | – | nessus |
![]() | EulerOS Virtualization 3.0.6.6 : numpy (EulerOS-SA-2022-2522) | 9 Oct 202200:00 | – | nessus |
![]() | EulerOS 2.0 SP9 : numpy (EulerOS-SA-2022-1453) | 18 Apr 202200:00 | – | nessus |
![]() | EulerOS Virtualization 2.10.0 : numpy (EulerOS-SA-2022-2030) | 14 Jul 202200:00 | – | nessus |
![]() | EulerOS Virtualization 2.10.1 : numpy (EulerOS-SA-2022-2058) | 14 Jul 202200:00 | – | nessus |
![]() | EulerOS Virtualization 2.9.0 : numpy (EulerOS-SA-2022-1633) | 5 May 202200:00 | – | nessus |
![]() | EulerOS Virtualization 2.9.1 : numpy (EulerOS-SA-2022-1610) | 24 Jan 202300:00 | – | nessus |
![]() | SUSE SLES15 Security Update : python2-numpy (SUSE-SU-2022:2441-1) | 22 Jul 202200:00 | – | nessus |
![]() | SUSE SLES15 Security Update : python2-numpy (SUSE-SU-2022:1064-2) | 13 Sep 202200:00 | – | nessus |
![]() | openSUSE 15 Security Update : python2-numpy (openSUSE-SU-2022:1064-1) | 1 Apr 202200:00 | – | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2022.2058");
script_cve_id("CVE-2021-41495", "CVE-2021-41496");
script_tag(name:"creation_date", value:"2022-07-14 09:59:54 +0000 (Thu, 14 Jul 2022)");
script_version("2024-02-05T14:36:57+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:57 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"3.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:N/I:N/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2022-07-28 16:45:44 +0000 (Thu, 28 Jul 2022)");
script_name("Huawei EulerOS: Security Advisory for numpy (EulerOS-SA-2022-2058)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2022 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRT\-2\.10\.1");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2022-2058");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2022-2058");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'numpy' package(s) announced via the EulerOS-SA-2022-2058 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values.(CVE-2021-41496)
Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place.(CVE-2021-41495)");
script_tag(name:"affected", value:"'numpy' package(s) on Huawei EulerOS Virtualization release 2.10.1.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRT-2.10.1") {
if(!isnull(res = isrpmvuln(pkg:"python3-numpy", rpm:"python3-numpy~1.16.5~3.h5.eulerosv2r10", rls:"EULEROSVIRT-2.10.1"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo