<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">python310-numpy-1.25.2-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:13220-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">python310-numpy-1.25.2-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the python310-numpy-1.25.2-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-13220</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33430/</URL>
      <Description>SUSE CVE CVE-2021-33430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41495/</URL>
      <Description>SUSE CVE CVE-2021-41495 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41496/</URL>
      <Description>SUSE CVE CVE-2021-41496 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python310-numpy-1.25.2-2.1">
      <FullProductName ProductID="python310-numpy-1.25.2-2.1">python310-numpy-1.25.2-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python310-numpy-devel-1.25.2-2.1">
      <FullProductName ProductID="python310-numpy-devel-1.25.2-2.1">python310-numpy-devel-1.25.2-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python311-numpy-1.25.2-2.1">
      <FullProductName ProductID="python311-numpy-1.25.2-2.1">python311-numpy-1.25.2-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python311-numpy-devel-1.25.2-2.1">
      <FullProductName ProductID="python311-numpy-devel-1.25.2-2.1">python311-numpy-devel-1.25.2-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python39-numpy-1.25.2-2.1">
      <FullProductName ProductID="python39-numpy-1.25.2-2.1">python39-numpy-1.25.2-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python39-numpy-devel-1.25.2-2.1">
      <FullProductName ProductID="python39-numpy-devel-1.25.2-2.1">python39-numpy-devel-1.25.2-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python310-numpy-1.25.2-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python310-numpy-1.25.2-2.1">python310-numpy-1.25.2-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python310-numpy-devel-1.25.2-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python310-numpy-devel-1.25.2-2.1">python310-numpy-devel-1.25.2-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-numpy-1.25.2-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python311-numpy-1.25.2-2.1">python311-numpy-1.25.2-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-numpy-devel-1.25.2-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python311-numpy-devel-1.25.2-2.1">python311-numpy-devel-1.25.2-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-numpy-1.25.2-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python39-numpy-1.25.2-2.1">python39-numpy-1.25.2-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-numpy-devel-1.25.2-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python39-numpy-devel-1.25.2-2.1">python39-numpy-devel-1.25.2-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.</Note>
    </Notes>
    <CVE>CVE-2021-33430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python310-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python310-numpy-devel-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python311-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python311-numpy-devel-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-numpy-devel-1.25.2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33430.html</URL>
        <Description>CVE-2021-33430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193913</URL>
        <Description>SUSE Bug 1193913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201968</URL>
        <Description>SUSE Bug 1201968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &amp;lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place.</Note>
    </Notes>
    <CVE>CVE-2021-41495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python310-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python310-numpy-devel-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python311-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python311-numpy-devel-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-numpy-devel-1.25.2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41495.html</URL>
        <Description>CVE-2021-41495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193911</URL>
        <Description>SUSE Bug 1193911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy &lt; 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).</Note>
    </Notes>
    <CVE>CVE-2021-41496</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python310-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python310-numpy-devel-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python311-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python311-numpy-devel-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-numpy-1.25.2-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python39-numpy-devel-1.25.2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41496.html</URL>
        <Description>CVE-2021-41496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193907</URL>
        <Description>SUSE Bug 1193907</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
