<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python2-numpy</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:1064-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-09-12T11:08:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-09-12T11:08:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-09-12T11:08:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python2-numpy</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python2-numpy fixes the following issues:

- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).
- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).
- CVE-2021-41495: Fixed Null Pointer Dereference in numpy.sort due to missing return value validation (bsc#1193911).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-SLE-15.3-2022-1064</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVU5XH7TX2TXVVZCKS7DIEBNEJKYZTSK/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:1064-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193907</URL>
      <Description>SUSE Bug 1193907</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193911</URL>
      <Description>SUSE Bug 1193911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193913</URL>
      <Description>SUSE Bug 1193913</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33430/</URL>
      <Description>SUSE CVE CVE-2021-33430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41495/</URL>
      <Description>SUSE CVE CVE-2021-41495 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41496/</URL>
      <Description>SUSE CVE CVE-2021-41496 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python2-numpy-1.16.5-150200.3.5.1">
      <FullProductName ProductID="python2-numpy-1.16.5-150200.3.5.1">python2-numpy-1.16.5-150200.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-numpy-devel-1.16.5-150200.3.5.1">
      <FullProductName ProductID="python2-numpy-devel-1.16.5-150200.3.5.1">python2-numpy-devel-1.16.5-150200.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-numpy-gnu-hpc-1.16.5-150200.3.5.1">
      <FullProductName ProductID="python2-numpy-gnu-hpc-1.16.5-150200.3.5.1">python2-numpy-gnu-hpc-1.16.5-150200.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1">
      <FullProductName ProductID="python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1">python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1">
      <FullProductName ProductID="python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1">python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1">
      <FullProductName ProductID="python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1">python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python2-numpy-1.16.5-150200.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1">python2-numpy-1.16.5-150200.3.5.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-numpy-devel-1.16.5-150200.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1">python2-numpy-devel-1.16.5-150200.3.5.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-numpy-gnu-hpc-1.16.5-150200.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1">python2-numpy-gnu-hpc-1.16.5-150200.3.5.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1">python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1">python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1">python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.</Note>
    </Notes>
    <CVE>CVE-2021-33430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVU5XH7TX2TXVVZCKS7DIEBNEJKYZTSK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33430.html</URL>
        <Description>CVE-2021-33430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193913</URL>
        <Description>SUSE Bug 1193913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201968</URL>
        <Description>SUSE Bug 1201968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &amp;lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place.</Note>
    </Notes>
    <CVE>CVE-2021-41495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVU5XH7TX2TXVVZCKS7DIEBNEJKYZTSK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41495.html</URL>
        <Description>CVE-2021-41495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193911</URL>
        <Description>SUSE Bug 1193911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy &lt; 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).</Note>
    </Notes>
    <CVE>CVE-2021-41496</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVU5XH7TX2TXVVZCKS7DIEBNEJKYZTSK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41496.html</URL>
        <Description>CVE-2021-41496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193907</URL>
        <Description>SUSE Bug 1193907</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
