A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
06 Apr 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Apr 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jan 2024, 16:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:micropython:micropython:1.22.0:preview:*:*:*:*:*:* cpe:2.3:a:micropython:micropython:1.21.0:*:*:*:*:*:*:* |
|
References | () https://github.com/jimmo/micropython/commit/8b24aa36ba978eafc6114b6798b47b7bfecdca26 - Patch | |
References | () https://github.com/micropython/micropython/issues/12887 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.249158 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.249158 - Third Party Advisory, VDB Entry | |
First Time |
Micropython micropython
Micropython |
|
CVSS |
v2 : v3 : |
v2 : 5.2
v3 : 9.8 |
29 Dec 2023, 13:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Dec 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-29 05:15
Updated : 2024-04-11 01:23
NVD link : CVE-2023-7152
Mitre link : CVE-2023-7152
CVE.ORG link : CVE-2023-7152
JSON object : View
Products Affected
micropython
- micropython
CWE
CWE-416
Use After Free