
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-41500 affects cvxopt.org cvxopt versions up to and including 1.2.6. The vulnerability exists in multiple APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve) due to an incomplete string comparison vulnerability. The issue was discovered in May 2021 and fixed in version 1.2.7 (Github Issue, Fedora Update).
The vulnerability stems from improper use of the strncmp function when comparing strings in multiple API functions. The comparison length is set to 14 characters but does not consider the string terminator, allowing attackers to bypass validation by appending malicious content after "CHOLMOD FACTOR". For example, a string like "CHOLMOD FACTORMalicious" would pass the comparison check. This affects the solve, spsolve, diag, and getfactor functions (Github Issue). The vulnerability has been assigned a CVSS v3.1 base score of 7.5 HIGH (NVD).
The vulnerability allows attackers to conduct Denial of Service attacks by constructing fake Capsule objects that bypass the string validation checks. This could potentially disrupt the operation of applications using the affected cvxopt functions (NVD).
Users should upgrade to cvxopt version 1.2.7 or later which contains the fix for this vulnerability. The update is available through official package repositories, such as Fedora's package manager (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."