Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9979: Use After Free

0
Medium
VulnerabilityCVE-2024-9979cvecve-2024-9979
Published: Tue Oct 15 2024 (10/15/2024, 14:01:54 UTC)
Source: CVE Database V5

Description

A flaw was found in PyO3. This vulnerability causes a use-after-free issue, potentially leading to memory corruption or crashes via unsound borrowing from weak Python references.

AI-Powered Analysis

AILast updated: 11/20/2025, 20:29:19 UTC

Technical Analysis

CVE-2024-9979 is a use-after-free vulnerability identified in PyO3 version 0.22.0, a Rust crate that facilitates interoperability between Rust and Python by allowing Rust code to be called from Python. The vulnerability arises from unsound borrowing practices involving weak Python references, which can lead to a use-after-free condition. Specifically, when a weak reference to a Python object is borrowed unsafely, it may result in accessing memory that has already been freed. This can cause memory corruption, leading to application crashes or potentially undefined behavior. The vulnerability requires local access with low privileges (AV:L, PR:L) and does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 5.3, indicating medium severity with impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No known exploits are currently reported in the wild, and no patches or mitigation links are provided yet. The flaw is particularly relevant for applications embedding Python in Rust or vice versa, especially in development environments or production systems relying on PyO3 0.22.0. The vulnerability could be exploited by an attacker with local access to cause denial of service or potentially escalate to more severe memory corruption issues.

Potential Impact

For European organizations, the impact of CVE-2024-9979 depends on their use of PyO3 0.22.0 in software development or production environments. Organizations leveraging Rust-Python interoperability for critical applications may face risks of application crashes or memory corruption, potentially disrupting services or causing data integrity issues. Although the vulnerability requires local access and low privileges, insider threats or compromised internal systems could exploit it to cause denial of service or further memory corruption. The confidentiality impact is limited but not negligible, as memory corruption might expose sensitive data in some scenarios. The medium severity score reflects moderate risk, but the absence of known exploits reduces immediate threat levels. However, organizations with development teams using PyO3 should prioritize remediation to avoid future exploitation. The vulnerability could affect software supply chains if PyO3 0.22.0 is embedded in widely distributed packages, increasing the potential impact across European software ecosystems.

Mitigation Recommendations

European organizations should monitor PyO3 project updates and apply patches promptly once available. Until a patch is released, developers should avoid using PyO3 version 0.22.0 or isolate environments where this version is in use. Conduct code reviews focusing on safe borrowing practices with weak Python references to prevent unsound memory access. Employ memory safety tools such as sanitizers (e.g., AddressSanitizer) during development and testing to detect use-after-free issues early. Limit local access to systems running vulnerable PyO3 versions by enforcing strict access controls and monitoring for suspicious activity. Consider containerization or sandboxing of applications using PyO3 to reduce the blast radius of potential exploitation. Finally, maintain up-to-date inventories of dependencies to quickly identify and remediate vulnerable versions in the software supply chain.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-15T06:47:28.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f769028b41f27b43d1291

Added to database: 11/20/2025, 8:14:08 PM

Last enriched: 11/20/2025, 8:29:19 PM

Last updated: 11/20/2025, 11:40:45 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats