Python security advisory

Number: AV21-088
Date: 23 February 2021

Between 15 February and 19 February 2021, the Python Software Foundation updated Python to address vulnerabilities in the following products:

  • Python 3.6 – versions prior to 3.6.13
  • Python 3.7 – versions prior to 3.7.10
  • Python 3.8 – versions prior to 3.8.8
  • Python 3.9 – versions prior to 3.9.2

These updates resolve a buffer overflow vulnerability which if exploited could lead to remote code execution.

The Cyber Centre encourages users and administrators to review the following web links and apply the necessary updates.

Buffer overflow in PyCArg_rep
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html

Python 3.6
https://www.python.org/downloads/release/python-3613/

Python 3.7
https://www.python.org/downloads/release/python-3710/

Python 3.8
https://www.python.org/downloads/release/python-388/

Python 3.9
https://www.python.org/downloads/release/python-392/

Note to Readers

The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Date modified: