Search for packages
Package details: pkg:deb/ubuntu/python3.6@3.6.9-1~18.04ubuntu1.3
purl pkg:deb/ubuntu/python3.6@3.6.9-1~18.04ubuntu1.3
Next non-vulnerable version 3.6.9-1~18.04ubuntu1.4
Latest non-vulnerable version 3.6.9-1~18.04ubuntu1.4
Risk 4.4
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-aer8-np52-aaan
Aliases:
CVE-2020-27619
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
3.6.9-1~18.04ubuntu1.4
Affected by 0 other vulnerabilities.
VCID-gk4y-9r2y-aaar
Aliases:
CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
3.6.9-1~18.04ubuntu1.4
Affected by 0 other vulnerabilities.
VCID-y2w8-eze9-aaar
Aliases:
CVE-2021-29921
In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.
3.6.9-1~18.04ubuntu1.4
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-s4tj-c35n-aaad http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request. CVE-2020-26116

Date Actor Action Vulnerability Source VulnerableCode Version