CVE-2014-1859

(1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and (4) lib/tests/test_io.py in NumPy before 1.8.1 allow local users to write to arbitrary files via a symlink attack on a temporary file.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html Issue Tracking Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128781.html Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/02/08/3 Issue Tracking Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/65440 Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737778 Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1062009 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/91317 Issue Tracking Third Party Advisory VDB Entry
https://github.com/numpy/numpy/blob/maintenance/1.8.x/doc/release/1.8.1-notes.rst Patch Third Party Advisory
https://github.com/numpy/numpy/commit/0bb46c1448b0d3f5453d5182a17ea7ac5854ee15 Patch Third Party Advisory
https://github.com/numpy/numpy/pull/4262 Issue Tracking Patch Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html Issue Tracking Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128781.html Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/02/08/3 Issue Tracking Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/65440 Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737778 Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1062009 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/91317 Issue Tracking Third Party Advisory VDB Entry
https://github.com/numpy/numpy/blob/maintenance/1.8.x/doc/release/1.8.1-notes.rst Patch Third Party Advisory
https://github.com/numpy/numpy/commit/0bb46c1448b0d3f5453d5182a17ea7ac5854ee15 Patch Third Party Advisory
https://github.com/numpy/numpy/pull/4262 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*
cpe:2.3:a:numpy:numpy:1.8.1:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:05

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html - Issue Tracking, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html - Issue Tracking, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128781.html - Issue Tracking, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128781.html - Issue Tracking, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/02/08/3 - Issue Tracking, Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/02/08/3 - Issue Tracking, Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/65440 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/65440 - Third Party Advisory, VDB Entry
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737778 - Issue Tracking, Patch, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737778 - Issue Tracking, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1062009 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1062009 - Issue Tracking, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/91317 - Issue Tracking, Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/91317 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://github.com/numpy/numpy/blob/maintenance/1.8.x/doc/release/1.8.1-notes.rst - Patch, Third Party Advisory () https://github.com/numpy/numpy/blob/maintenance/1.8.x/doc/release/1.8.1-notes.rst - Patch, Third Party Advisory
References () https://github.com/numpy/numpy/commit/0bb46c1448b0d3f5453d5182a17ea7ac5854ee15 - Patch, Third Party Advisory () https://github.com/numpy/numpy/commit/0bb46c1448b0d3f5453d5182a17ea7ac5854ee15 - Patch, Third Party Advisory
References () https://github.com/numpy/numpy/pull/4262 - Issue Tracking, Patch, Third Party Advisory () https://github.com/numpy/numpy/pull/4262 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2018-01-08 19:29

Updated : 2024-11-21 02:05


NVD link : CVE-2014-1859

Mitre link : CVE-2014-1859

CVE.ORG link : CVE-2014-1859


JSON object : View

Products Affected

redhat

  • enterprise_linux

fedoraproject

  • fedora

numpy

  • numpy
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')