CVE-2026-39892
ADVISORY - githubSummary
If a non-contiguous buffer was passed to APIs which accepted Python buffers (e.g. Hash.update()), this could lead to buffer overflows. For example:
h = Hash(SHA256())
b.update(buf[::-1])
would read past the end of the buffer on Python >3.11
EPSS Score: 0.00021 (0.061)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Restriction of Operations within the Bounds of a Memory Buffer
ADVISORY - github
Improper Restriction of Operations within the Bounds of a Memory Buffer
ADVISORY - redhat
Incorrect Calculation of Buffer Size
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in