
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical use-after-free vulnerability (CVE-2023-7152) was discovered in MicroPython versions 1.21.0 and 1.22.0-preview. The vulnerability affects the poll_set_add_fd function in the file extmod/modselect.c. The issue was publicly disclosed and a patch has been identified with commit ID 8b24aa36ba978eafc6114b6798b47b7bfecdca26 (NVD).
The vulnerability stems from improper memory management in the poll_set_add_fd function. When reallocating memory for poll_set->pollfds using m_renew, previously allocated file descriptors are freed but subsequently referenced, leading to a use-after-free condition. The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD, GitHub Issue).
The vulnerability can lead to unintended behavior of MicroPython and potential exploitation by attackers who could manipulate objects or file descriptors in ways that could compromise the system. The issue occurs when a file descriptor overlaps with a poll object's memory region, potentially allowing malicious actors to malform objects or file descriptors (GitHub Issue).
The vulnerability has been patched in MicroPython version 1.22.2. Users are strongly advised to upgrade to this version. The fix involves proper handling of the pollfds allocation growth and updating existing poll_obj_t instances to maintain correct memory references (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."