Source: micropython
Version: 1.22.1+ds-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for micropython.

CVE-2024-8946[0]:
| A vulnerability was found in MicroPython 1.23.0. It has been
| classified as critical. Affected is the function mp_vfs_umount of
| the file extmod/vfs.c of the component VFS Unmount Handler. The
| manipulation leads to heap-based buffer overflow. It is possible to
| launch the attack remotely. The exploit has been disclosed to the
| public and may be used. The name of the patch is
| 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply
| a patch to fix this issue. In the VFS unmount process, the
| comparison between the mounted path string and the unmount requested
| string is based solely on the length of the unmount string, which
| can lead to a heap buffer overflow read.


CVE-2024-8947[1]:
| A vulnerability was found in MicroPython 1.22.2. It has been
| declared as critical. Affected by this vulnerability is an unknown
| functionality of the file py/objarray.c. The manipulation leads to
| use after free. The attack can be launched remotely. The complexity
| of an attack is rather high. The exploitation appears to be
| difficult. Upgrading to version 1.23.0 is able to address this
| issue. The identifier of the patch is
| 4bed614e707c0644c06e117f848fa12605c711cd. It is recommended to
| upgrade the affected component. In micropython objarray component,
| when a bytes object is resized and copied into itself, it may
| reference memory that has already been freed.


CVE-2024-8948[2]:
| A vulnerability was found in MicroPython 1.23.0. It has been rated
| as critical. Affected by this issue is the function mpz_as_bytes of
| the file py/objint.c. The manipulation leads to heap-based buffer
| overflow. The attack may be launched remotely. The exploit has been
| disclosed to the public and may be used. The patch is identified as
| 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply
| a patch to fix this issue. In micropython objint component,
| converting zero from int to bytes leads to heap buffer-overflow-
| write at mpz_as_bytes.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-8946
    https://www.cve.org/CVERecord?id=CVE-2024-8946
[1] https://security-tracker.debian.org/tracker/CVE-2024-8947
    https://www.cve.org/CVERecord?id=CVE-2024-8947
[2] https://security-tracker.debian.org/tracker/CVE-2024-8948
    https://www.cve.org/CVERecord?id=CVE-2024-8948

Regards,
Salvatore

Reply via email to