vulnerability
Rocky Linux: CVE-2021-29921: python38-3.8-and-python38-devel-3.8 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | May 6, 2021 | Mar 12, 2024 | Nov 20, 2024 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 6, 2021
Added
Mar 12, 2024
Modified
Nov 20, 2024
Description
In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.
Solutions
rocky-upgrade-cython-debugsourcerocky-upgrade-numpy-debugsourcerocky-upgrade-python-cffi-debugsourcerocky-upgrade-python-cryptography-debugsourcerocky-upgrade-python-lxml-debugsourcerocky-upgrade-python-markupsafe-debugsourcerocky-upgrade-python-psutil-debugsourcerocky-upgrade-python-psycopg2-debugsourcerocky-upgrade-python38rocky-upgrade-python38-cffirocky-upgrade-python38-cffi-debuginforocky-upgrade-python38-cryptographyrocky-upgrade-python38-cryptography-debuginforocky-upgrade-python38-cythonrocky-upgrade-python38-cython-debuginforocky-upgrade-python38-debugrocky-upgrade-python38-debuginforocky-upgrade-python38-debugsourcerocky-upgrade-python38-develrocky-upgrade-python38-idlerocky-upgrade-python38-libsrocky-upgrade-python38-lxmlrocky-upgrade-python38-lxml-debuginforocky-upgrade-python38-markupsaferocky-upgrade-python38-markupsafe-debuginforocky-upgrade-python38-mod_wsgirocky-upgrade-python38-numpyrocky-upgrade-python38-numpy-debuginforocky-upgrade-python38-numpy-f2pyrocky-upgrade-python38-psutilrocky-upgrade-python38-psutil-debuginforocky-upgrade-python38-psycopg2rocky-upgrade-python38-psycopg2-debuginforocky-upgrade-python38-psycopg2-docrocky-upgrade-python38-psycopg2-testsrocky-upgrade-python38-pyyamlrocky-upgrade-python38-pyyaml-debuginforocky-upgrade-python38-scipyrocky-upgrade-python38-scipy-debuginforocky-upgrade-python38-testrocky-upgrade-python38-tkinterrocky-upgrade-python39rocky-upgrade-python39-cffirocky-upgrade-python39-cffi-debuginforocky-upgrade-python39-cryptographyrocky-upgrade-python39-cryptography-debuginforocky-upgrade-python39-cythonrocky-upgrade-python39-cython-debuginforocky-upgrade-python39-debugrocky-upgrade-python39-debuginforocky-upgrade-python39-debugsourcerocky-upgrade-python39-develrocky-upgrade-python39-idlerocky-upgrade-python39-libsrocky-upgrade-python39-lxmlrocky-upgrade-python39-lxml-debuginforocky-upgrade-python39-mod_wsgirocky-upgrade-python39-numpyrocky-upgrade-python39-numpy-debuginforocky-upgrade-python39-numpy-f2pyrocky-upgrade-python39-psutilrocky-upgrade-python39-psutil-debuginforocky-upgrade-python39-psycopg2rocky-upgrade-python39-psycopg2-debuginforocky-upgrade-python39-psycopg2-docrocky-upgrade-python39-psycopg2-testsrocky-upgrade-python39-pybind11rocky-upgrade-python39-pybind11-develrocky-upgrade-python39-pyyamlrocky-upgrade-python39-pyyaml-debuginforocky-upgrade-python39-scipyrocky-upgrade-python39-scipy-debuginforocky-upgrade-python39-testrocky-upgrade-python39-tkinterrocky-upgrade-pyyaml-debugsourcerocky-upgrade-scipy-debugsource
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.