File _patchinfo of Package patchinfo.10267
<patchinfo incident="10267">
<issue tracker="bnc" id="1122208">VUL-0: CVE-2019-6446: python-numpy: NumPy uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code</issue>
<issue tracker="cve" id="2019-6446"/>
<category>security</category>
<rating>important</rating>
<packager>mcepl</packager>
<description>This update for python-numpy fixes the following issue:
Security issue fixed:
- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
</description>
<summary>Security update for python-numpy</summary>
</patchinfo>