
Cloud Vulnerability DB
A community-led vulnerabilities database
CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-free vulnerability in the ascii_decode function located at /Objects/unicodeobject.c. The vulnerability was identified on April 25, 2023, and was assigned CVE-2023-33595. The issue specifically affects CPython version 3.12.0 alpha 7, with the vulnerable code being introduced in version 3.12.0b1 (Python Issue).
The vulnerability is classified as a heap use-after-free error with a CVSS v3.1 Base Score of 5.5 (Medium). The attack vector is Local (L), with low attack complexity (L), requiring no privileges (N) but needing user interaction (R). The scope is unchanged (U), with no impact on confidentiality (N) or integrity (N), but high impact on availability (H). The vulnerability was introduced by commit 1ef61cf71a218c71860ff6aecf0fd51edb8b65dc and later fixed in commit d5a97074d24cd14cb2a35a2b1ad3074863cde264, both part of the 3.12.0b1 release (Ubuntu Security).
The vulnerability primarily affects system availability, with a high impact rating in this category. The heap use-after-free condition could potentially lead to program crashes or unpredictable behavior. However, there are no reported impacts on system confidentiality or integrity (NVD).
The vulnerability was fixed in Python 3.12.0b1 through commit d5a97074d24cd14cb2a35a2b1ad3074863cde264. Earlier versions of Python (3.11 and below) are not affected as the vulnerable code was only present during the development of Python 3.12 (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."