|
|
Message-ID: <e2ea05d6-55c1-4ebc-9342-953609f90593@oracle.com>
Date: Fri, 16 May 2025 09:10:17 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: CPython CVE-2025-4516: Use-after-free crash using
bytes.decode("unicode_escape", error="ignore|replace")
-------- Forwarded Message --------
Subject: [Security-announce][CVE-2025-4516] Use-after-free crash using
bytes.decode("unicode_escape", error="ignore|replace")
Date: Thu, 15 May 2025 09:33:30 -0400
From: Seth Larson <seth@...hon.org>
Reply-To: security-sig@...hon.org
To: security-announce@...hon.org
There is a MEDIUM severity security issue in CPython when using
`bytes.decode("unicode_escape", error="ignore|replace")`. The use-after-free
being exploited would likely result in a crash.
If you are not using the "unicode_escape" encoding or an error handler your
usage is not affected. To work-around this issue you may stop using the error=
handler and instead wrap the bytes.decode() call in a try-except catching the
decoding error.
Please see the linked CVE ID for the latest information on affected versions:
* https://www.cve.org/CVERecord?id=CVE-2025-4516
* https://github.com/python/cpython/pull/129648
_______________________________________________
Security-announce mailing list -- security-announce@...hon.org
https://mail.python.org/mailman3/lists/security-announce.python.org/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.