USN-7472-1: Micropython vulnerabilities
USN-7472-1: Micropython vulnerabilities
1 May 2025
Several security issues were fixed in micropython.
Releases
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 ESM
Packages
micropython - Implementation of Python 3.x on microcontrollers and small embedded systems.
Details
Junwha Hong and Wonil Jang discovered that Micropython incorrectly handled
the length of a buffer in mp_vfs_umount, leading to a heap-based buffer
overflow vulnerability. If a user or automated system were tricked into
opening a specially crafted file, an attacker could possibly use this issue
to cause a denial of service or possibly execute arbitrary code.
(CVE-2024-8946)
Junwha Hong and Wonil Jang discovered that Micropython incorrectly handled
memory, leading to a use-after-free vulnerability under certain
circumstances. If a user or automated system were tricked into opening a
specially crafted file, an attacker could possibly use this issue to
cause a denial of service or possibly execute arbitrary code.
(CVE-2024-8947)
It was discovered that Middleware USB Host MCU Component incorrectly
handled memory, leading to a buffer overflow vulnerability, If a user or
automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-42553)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10
- micropython - 1.22.1+ds-1ubuntu0.24.10.1
Ubuntu 24.04 - micropython - 1.22.1+ds-1ubuntu0.24.04.1~esm1
Ubuntu 22.04 - micropython - 1.17+ds-1.1ubuntu2+esm1
Ubuntu 20.04 - micropython - 1.12-1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.