Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2022:1064-1 advisory.
  - ** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int     function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let     a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In     (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely     already privileged to at least provoke denial of service by exhausting memory. Triggering this further     requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available     to an unprivileged user. (CVE-2021-33430)
  - ** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the     PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS     attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can     only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged.
    Further, it should be practically impossible to construct an attack which can target the memory exhaustion     to occur at exactly this place. (CVE-2021-41495)
  - ** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which     allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative     values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be     created by an already privileged user (or internally). (CVE-2021-41496)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: openSUSE-2022-1064-1.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:novell:opensuse:python2-numpy, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:python2-numpy_1_16_5-gnu-hpc, p-cpe:/a:novell:opensuse:python2-numpy-devel, p-cpe:/a:novell:opensuse:python2-numpy-gnu-hpc, p-cpe:/a:novell:opensuse:python2-numpy-gnu-hpc-devel, p-cpe:/a:novell:opensuse:python2-numpy_1_16_5-gnu-hpc-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: Exploits are available
Patch Publication Date: 9/12/2022
Vulnerability Publication Date: 12/17/2021