Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN320 _____________________________________________________________________ DATE : 16/05/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running CPython. ===================================================================== https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/ _____________________________________________________________________ [CVE-2025-4516] Use-after-free crash using bytes.decode("unicode_escape", error="ignore|replace") Seth Larson 15 mai 2025 13:33 There is a MEDIUM severity security issue in CPython when using bytes.decode("unicode_escape", error="ignore|replace"). The use-after-free being exploited would likely result in a crash. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the decoding error. Please see the linked CVE ID for the latest information on affected versions: https://www.cve.org/CVERecord?id=CVE-2025-4516 https://github.com/python/cpython/pull/129648 ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================