Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9979: Use After Free

0
Medium
VulnerabilityCVE-2024-9979cvecve-2024-9979
Published: Tue Oct 15 2024 (10/15/2024, 14:01:54 UTC)
Source: CVE Database V5

Description

A flaw was found in PyO3. This vulnerability causes a use-after-free issue, potentially leading to memory corruption or crashes via unsound borrowing from weak Python references.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 17:38:56 UTC

Technical Analysis

CVE-2024-9979 identifies a use-after-free vulnerability in PyO3 version 0.22.0, a Rust crate that facilitates interoperability between Rust and Python by allowing Rust code to be called from Python. The vulnerability arises from unsound borrowing of weak Python references, which leads to a use-after-free condition. This means that the program may access memory after it has been freed, causing memory corruption or crashes. Such memory corruption can potentially be exploited to execute arbitrary code, cause denial of service, or leak sensitive information, although no known exploits currently exist in the wild. The vulnerability requires local access with low privileges (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The flaw is particularly relevant to developers and organizations embedding Python in Rust applications or vice versa using PyO3 0.22.0. Since PyO3 is widely used in software development environments that combine Python and Rust, this vulnerability poses a risk to applications relying on this integration, especially those running on systems where local users might exploit the flaw.

Potential Impact

The impact of CVE-2024-9979 is primarily on applications using PyO3 0.22.0 for Python-Rust interoperability. Exploitation can lead to memory corruption, causing application crashes or potentially arbitrary code execution, which threatens confidentiality, integrity, and availability of affected systems. Although exploitation requires local access with low privileges and no user interaction, this still poses a risk in multi-user environments, development machines, or containerized environments where untrusted users have some level of access. The vulnerability could be leveraged to escalate privileges or disrupt services, especially in environments where PyO3 is part of critical infrastructure or development pipelines. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. Organizations relying on PyO3 0.22.0 should consider the risk to their software supply chain and internal tooling.

Mitigation Recommendations

To mitigate CVE-2024-9979, organizations should upgrade PyO3 to a patched version once available, as no patch links are currently provided. In the interim, developers should audit their use of weak Python references in PyO3 to avoid unsound borrowing patterns that lead to use-after-free conditions. Employing memory safety tools such as sanitizers (e.g., AddressSanitizer) during development and testing can help detect similar issues early. Restricting local access to systems running vulnerable PyO3 versions can reduce exploitation risk. Additionally, applying strict access controls and isolating development environments can limit the impact of potential exploitation. Monitoring for unusual crashes or memory corruption in applications using PyO3 is recommended. Finally, maintain awareness of updates from PyO3 maintainers and security advisories for timely patch application.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-15T06:47:28.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f769028b41f27b43d1291

Added to database: 11/20/2025, 8:14:08 PM

Last enriched: 2/27/2026, 5:38:56 PM

Last updated: 3/25/2026, 8:43:25 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses