An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Link | Tags |
---|---|
https://github.com/numpy/numpy/issues/18993 | third party advisory issue tracking exploit patch |
https://www.oracle.com/security-alerts/cpujul2022.html | patch third party advisory |