
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
RUSTSEC-2025-0020 affects the PyO3 library, which provides Rust bindings for Python. The vulnerability was discovered in March 2025 and involves a buffer overflow issue where PyString::from_object fails to properly convert Rust strings to C-strings before calling FFI functions, potentially causing out-of-bounds reads (PyO3 Issue).
The vulnerability occurs in the PyString::from_object function when it takes &str parameters and passes them directly to FFI functions that expect C-style null-terminated strings. This improper handling can lead to out-of-bounds memory accesses since the strings are stored in .rdata section without proper null termination (PyO3 Issue).
When exploited, this vulnerability can cause out-of-bounds memory reads and potential program crashes. The issue affects applications using PyO3 for Python-Rust interoperability, particularly when converting between Python strings and Rust strings (PyO3 Issue).
A temporary workaround involves explicitly null-terminating strings passed to PyString::from_object by appending '\0' to the encoding parameters (e.g., using 'utf-8\0' instead of 'utf-8') (PyO3 Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”