mass-ts
mass-ts copied to clipboard
CVE-2021-33430 (High) detected in numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl
CVE-2021-33430 - High Severity Vulnerability
Vulnerable Library - numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl
NumPy is the fundamental package for array computing with Python.
Library home page: https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl
Path to dependency file: mass-ts/requirements.txt
Path to vulnerable library: mass-ts/requirements.txt,mass-ts
Dependency Hierarchy:
- :x: numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl (Vulnerable Library)
Vulnerability Details
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.
Publish Date: 2021-12-17
URL: CVE-2021-33430
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-33430
Release Date: 2021-12-17
Fix Resolution: numpy - 1.21.0
Step up your Open Source Security Game with WhiteSource here