FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Python -- use-after-free vulnerability in decompressors under memory pressure

Affected packages
0 <= python310
0 <= python311
0 <= python312
0 <= python313
python314 < 3.14.4_1

Details

VuXML ID b8e9f33c-375d-11f1-a119-e36228bfe7d4
Discovery 2026-04-11
Entry 2026-04-13

Seth Larson reports:

There is a CRITICAL severity vulnerability affecting CPython.

Use-after-free (UAF) was possible in the lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile when a memory allocation fails with a MemoryError and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition.

The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a MemoryError is raised during decompression. Using the helper functions to one-shot decompress data such as lzma.decompress(), bz2.decompress(), gzip.decompress(), and zlib.decompress() are not affected as a new decompressor instance is created for each call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.

References

CVE Name CVE-2026-6100
URL https://github.com/python/cpython/issues/148395
URL https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/