GHSA-pph8-gcv7-4qj5 – pyo3
Package
Manager: cargo
Name: pyo3
Vulnerable Version: >=0.1.0 <0.24.1
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:F/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
EPSS: N/A pctlN/A
Details
PyO3 Risk of buffer overflow in `PyString::from_object` `PyString::from_object` took `&str` arguments and forwarded them directly to the Python C API without checking for terminating nul bytes. This could lead the Python interpreter to read beyond the end of the `&str` data and potentially leak contents of the out-of-bounds read (by raising a Python exception containing a copy of the data including the overflow). In PyO3 0.24.1 this function will now allocate a `CString` to guarantee a terminating nul bytes. PyO3 0.25 will likely offer an alternative API which takes `&CStr` arguments.
Metadata
Created: 2025-04-02T13:19:19Z
Modified: 2025-04-02T13:19:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-pph8-gcv7-4qj5/GHSA-pph8-gcv7-4qj5.json
CWE IDs: ["CWE-125"]
Alternative ID: N/A
Finding: F111
Auto approve: 1