{"id":"PYSEC-2023-257","details":"A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability.","aliases":["CVE-2023-7152","PYSEC-2023-256","PYSEC-2023-258","PYSEC-2023-259"],"modified":"2024-02-29T07:57:10.069607Z","published":"2023-12-29T05:15:00Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.249158"},{"type":"ADVISORY","url":"https://vuldb.com/?ctiid.249158"},{"type":"REPORT","url":"https://github.com/micropython/micropython/issues/12887"},{"type":"FIX","url":"https://github.com/jimmo/micropython/commit/8b24aa36ba978eafc6114b6798b47b7bfecdca26"}],"affected":[{"package":{"name":"micropython-io","ecosystem":"PyPI","purl":"pkg:pypi/micropython-io"},"ranges":[{"type":"GIT","repo":"https://github.com/jimmo/micropython","events":[{"introduced":"0"},{"fixed":"8b24aa36ba978eafc6114b6798b47b7bfecdca26"}]},{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.0.1","0.0.2","0.0.3","0.1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/micropython-io/PYSEC-2023-257.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}