An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
History

Mon, 21 Jul 2025 22:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2019-01-16T05:00:00.000Z

Updated: 2025-07-21T22:10:51.613Z

Reserved: 2019-01-15T00:00:00.000Z

Link: CVE-2019-6446

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-16T05:29:01.370

Modified: 2025-07-21T23:15:25.020

Link: CVE-2019-6446

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-01-16T00:00:00Z

Links: CVE-2019-6446 - Bugzilla