Bug 2035032 (CVE-2021-34141)
Summary: | CVE-2021-34141 numpy: incomplete string comparison in the numpy.core component | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | cstratak, dbecker, dnakabaa, eglynn, gwync, hhorak, hkataria, jjoyce, jorton, jschluet, jspaleta, j, jwong, kaycoth, kholdawa, kshier, lcouzens, lhh, lpeer, lsvaty, manisandro, mburns, mgarciac, mskarbek, nforro, nobody, orion, osoukup, pgrist, python-maint, rdieter, sclewis, slinaber, TicoTimo, tomspur |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2035033, 2035072, 2035073, 2035074, 2035075, 2035076, 2035077, 2035078 | ||
Bug Blocks: | 2035045 |
Description
Guilherme de Almeida Suckevicz
2021-12-22 18:53:25 UTC
Created python2-numpy tracking bugs for this issue: Affects: epel-7 [bug 2035033] The flaw presented here is the result of an incomplete string comparison when checking numeric style typecode as the terminator was not considered. While the string comparison flaw can result in API failure in numpy and impact availability, the flaw is unable to result in code execution or compromise confidentiality or integrity of the system. As such the NVD CVSS should be revised to 7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The check is used to determine if a deprecation warning should be emitted or not. How is this a security issue? What does "fail the APIs" even mean? I'm concerned that the only tracking bug created in the "Affects" section is for a package that exists only to depend on another package and has no actual code. Perhaps there is something I cannot see since all of the other bugs in the dependency chain are inaccessible to me, but if not then it looks like the bug wasn't filed against the proper package. |