First published: Thu Sep 16 2021(Updated: )
It was discovered that Python incorrectly handled certain RFCs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 ESM. (CVE-2021-3733) It was discovered that Python incorrectly handled certain server responses. An attacker could possibly use this issue to cause a denial of service. (CVE-2021-3737)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3.5 | <3.5.2-2ubuntu0~16.04.13+esm1 | 3.5.2-2ubuntu0~16.04.13+esm1 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/python3.5-minimal | <3.5.2-2ubuntu0~16.04.13+esm1 | 3.5.2-2ubuntu0~16.04.13+esm1 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/python3.4 | <3.4.3-1ubuntu1~14.04.7+esm11 | 3.4.3-1ubuntu1~14.04.7+esm11 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/python3.4-minimal | <3.4.3-1ubuntu1~14.04.7+esm11 | 3.4.3-1ubuntu1~14.04.7+esm11 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Python vulnerability is CVE-2021-3733.
The severity of the Python vulnerability (CVE-2021-3733) is not specified.
This Python vulnerability (CVE-2021-3733) affects Ubuntu 16.04 ESM.
This Python vulnerability (CVE-2021-3733) can be exploited by an attacker to cause a denial of service.
The recommended remedy for this Python vulnerability (CVE-2021-3733) on Ubuntu 16.04 ESM is to update to version 3.5.2-2ubuntu0~16.04.13+esm1.