Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-34141

Опубликовано: 11 мая 2021
Источник: redhat
CVSS3: 2.2
EPSS Низкий

Описание

An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."

Отчет

Red Hat products using an affected version of numpy are at essentially no risk of exploitation from this vulnerability given the high privileges and high complexity required for successful exploitation. The preconditions necessary to exploit are:

  1. A privileged user or a non-standard configuration of numpy to provide a non-validated dtype string.
  2. The ability to execute arbitrary code at runtime. More specifically:
  3. A user must be able to provide a non-validated dtype string to be parsed by numpy; something that would require a privileged user or a non-standard configuration.
  4. Even then, the specific code block where the vulnerability is present cannot be reached without the attacker modifying the runtime environment to prevent an error from being thrown earlier in the code (before the string comparison), when the code checks an internal dictionary to determine the validity of the user-provided string type. Such runtime modifications would require executing arbitrary Python code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6numpyNot affected
Red Hat Enterprise Linux 7numpyNot affected
Red Hat Enterprise Linux 8inkscape:flatpak/numpyFix deferred
Red Hat Enterprise Linux 8numpyFix deferred
Red Hat Enterprise Linux 8python27:2.7/numpyFix deferred
Red Hat Enterprise Linux 8python38:3.8/numpyFix deferred
Red Hat Enterprise Linux 8python39:3.9/numpyFix deferred
Red Hat Enterprise Linux 9numpyWill not fix
Red Hat OpenStack Platform 13 (Queens)numpyNot affected
Red Hat OpenStack Platform 16.1numpyNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2035032numpy: incomplete string comparison in the numpy.core component

EPSS

Процентиль: 21%
0.00065
Низкий

2.2 Low

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 3 лет назад

An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."

CVSS3: 5.3
nvd
больше 3 лет назад

An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."

CVSS3: 5.3
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 3 лет назад

An incomplete string comparison in the numpy.core component in NumPy b ...

CVSS3: 5.3
github
больше 3 лет назад

Incorrect Comparison in NumPy

EPSS

Процентиль: 21%
0.00065
Низкий

2.2 Low

CVSS3