PyO3 Risk of buffer overflow in `PyString::from_object`
Low severity
GitHub Reviewed
Published
Apr 2, 2025
to the GitHub Advisory Database
•
Updated Apr 2, 2025
Description
Published to the GitHub Advisory Database
Apr 2, 2025
Reviewed
Apr 2, 2025
Last updated
Apr 2, 2025
PyString::from_object
took&str
arguments and forwarded them directly to the Python C API without checking for terminating nul bytes. This could lead the Python interpreter to read beyond the end of the&str
data and potentially leak contents of the out-of-bounds read (by raising a Python exception containing a copy of the data including the overflow).In PyO3 0.24.1 this function will now allocate a
CString
to guarantee a terminating nul bytes. PyO3 0.25 will likely offer an alternative API which takes&CStr
arguments.References