An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
References
Configurations
History
21 Jul 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources. |
Information
Published : 2019-01-16 05:29
Updated : 2025-07-21 23:15
NVD link : CVE-2019-6446
Mitre link : CVE-2019-6446
CVE.ORG link : CVE-2019-6446
JSON object : View
Products Affected
fedoraproject
- fedora
numpy
- numpy
CWE
CWE-502
Deserialization of Untrusted Data