An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Link | Tags |
---|---|
https://github.com/numpy/numpy/issues/18993 | patch exploit third party advisory issue tracking |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |