{"id":"MGASA-2021-0064","summary":"Updated python and python3 packages fix security vulnerability","details":"A flaw was found in python. A stack-based buffer overflow was discovered in the\nctypes module provided within Python. Applications that use ctypes without\ncarefully validating the input passed to it may be vulnerable to this flaw,\nwhich would allow an attacker to overflow a buffer on the stack and crash the\napplication. The highest threat from this vulnerability is to system\navailability (CVE-2021-3177).\n","modified":"2026-04-16T00:09:27.816111883Z","published":"2021-02-04T13:40:24Z","upstream":["CVE-2021-3177"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0064.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28204"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/"}],"affected":[{"package":{"name":"python","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/python?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.18-1.2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0064.json"}},{"package":{"name":"python3","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/python3?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.7.9-1.2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0064.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}