Описание
Security update for python-numpy
This update for python-numpy fixes the following issues:
Security issue fixed:
- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208). With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set allow_pickle
to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
Список пакетов
SUSE Linux Enterprise Module for HPC 12
Ссылки
- Link for SUSE-SU-2019:0448-1
- E-Mail link for SUSE-SU-2019:0448-1
- SUSE Security Ratings
- SUSE Bug 1122208
- SUSE CVE CVE-2019-6446 page
Описание
** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
Затронутые продукты
Ссылки
- CVE-2019-6446
- SUSE Bug 1122208