File _patchinfo of Package patchinfo.22423
<patchinfo incident="22423">
<issue tracker="cve" id="2021-41495"/>
<issue tracker="bnc" id="1193911">VUL-0: CVE-2021-41495: python-numpy,python2-numpy: Null pointer dereference due to missing return-value validation in PyArray_DescrNew</issue>
<issue tracker="bnc" id="1193907">VUL-0: CVE-2021-41496: python-numpy,python2-numpy: Buffer overflow in the array_from_pyobj function of fortranobject.c allows attackers to conduct a Denial of Service attack</issue>
<issue tracker="bnc" id="1193913">VUL-0: CVE-2021-33430: python-numpy,python2-numpy: Buffer Overflow in the PyArray_NewFromDescr_int function of ctors.c could lead to Denial of Service</issue>
<issue tracker="cve" id="2021-33430"/>
<issue tracker="cve" id="2021-41496"/>
<packager>mcepl</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for python2-numpy</summary>
<description>This update for python2-numpy fixes the following issues:
- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).
- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).
- CVE-2021-41495: Fixed Null Pointer Dereference in numpy.sort due to missing return value validation (bsc#1193911).
</description>
</patchinfo>