CVE-2017-12852
Published: 15 August 2017
The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An empty list or ndarray will stick into an infinite loop, which can allow attackers to cause a DoS attack.
Notes
Author | Note |
---|---|
mdeslaur | as of 2019-01-22, there doesn't appear to be a fix for this |
Priority
Status
Package | Release | Status |
---|---|---|
python-numpy Launchpad, Ubuntu, Debian |
groovy |
Does not exist
|
hirsute |
Does not exist
|
|
jammy |
Does not exist
|
|
xenial |
Needed
|
|
kinetic |
Does not exist
|
|
artful |
Ignored
(end of life)
|
|
bionic |
Needed
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Ignored
(end of life)
|
|
eoan |
Not vulnerable
(1:1.16.2-1ubuntu1)
|
|
focal |
Not vulnerable
(1:1.16.2-1ubuntu1)
|
|
impish |
Does not exist
|
|
lunar |
Does not exist
|
|
trusty |
Does not exist
(trusty was deferred [2019-01-22])
|
|
upstream |
Released
(1:1.14.3-1)
|
|
zesty |
Ignored
(end of life)
|
|
mantic |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |