CVE-2019-6446

Source
https://ubuntu.com/security/CVE-2019-6446
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6446.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-6446
Aliases
Related
Withdrawn
2025-06-23T15:53:20Z
Published
2019-01-16T05:29:00Z
Modified
2023-11-08T04:01:37.692738Z
Downstream
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

* DISPUTED * An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.

References

Affected packages

Ubuntu:Pro:16.04:LTS / python-numpy

Package

Name
python-numpy
Purl
pkg:deb/ubuntu/python-numpy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.8.2-1ubuntu2
1:1.8.2-1ubuntu3
1:1.10.4-2ubuntu2
1:1.11.0-1ubuntu1

Ubuntu:Pro:18.04:LTS / python-numpy

Package

Name
python-numpy
Purl
pkg:deb/ubuntu/python-numpy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.12.1-3.1ubuntu4
1:1.13.3-0ubuntu1
1:1.13.3-1ubuntu1
1:1.13.3-1ubuntu2
1:1.13.3-2ubuntu1

Ubuntu:20.04:LTS / python-numpy

Package

Name
python-numpy
Purl
pkg:deb/ubuntu/python-numpy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.16.2-1ubuntu1
1:1.16.5-1ubuntu2
1:1.16.5-2ubuntu6
1:1.16.5-2ubuntu7