First published: Tue Jun 01 2021(Updated: )
It was discovered that the Python stdlib ipaddress API incorrectly handled octal strings. A remote attacker could possibly use this issue to perform a wide variety of attacks, including bypassing certain access restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3.8-minimal | <3.8.6-1ubuntu0.3 | 3.8.6-1ubuntu0.3 |
Ubuntu | =20.10 | |
All of | ||
ubuntu/python3.8 | <3.8.6-1ubuntu0.3 | 3.8.6-1ubuntu0.3 |
Ubuntu | =20.10 | |
All of | ||
ubuntu/python3.8-minimal | <3.8.5-1~20.04.3 | 3.8.5-1~20.04.3 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/python3.8 | <3.8.5-1~20.04.3 | 3.8.5-1~20.04.3 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4973-1 has a high severity rating due to potential remote code execution risks.
To fix USN-4973-1, upgrade to the patched version of Python 3.8 specified in the advisory.
USN-4973-1 affects Ubuntu versions 20.04 and 20.10 with specific Python 3.8 packages.
USN-4973-1 can allow attackers to bypass access restrictions, potentially leading to unauthorized actions.
Currently, the best approach is to upgrade to the fixed version since there is no recommended workaround.