RUSTSEC-2025-0020

Source
https://rustsec.org/advisories/RUSTSEC-2025-0020
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2025-0020.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2025-0020
Published
2025-04-01T12:00:00Z
Modified
2025-04-01T08:55:37Z
Summary
Risk of buffer overflow in `PyString::from_object`
Details

PyString::from_object took &str arguments and forwarded them directly to the Python C API without checking for terminating nul bytes. This could lead the Python interpreter to read beyond the end of the &str data and potentially leak contents of the out-of-bounds read (by raising a Python exception containing a copy of the data including the overflow).

In PyO3 0.24.1 this function will now allocate a CString to guarantee a terminating nul bytes. PyO3 0.25 will likely offer an alternative API which takes &CStr arguments.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / pyo3

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.24.1

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [
            "pyo3::types::PyString::from_object",
            "pyo3::types::PyString::from_object_bound"
        ],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": [
        "memory-exposure"
    ]
}