USN-4973-1 fixed this vulnerability previously, but it was re-introduced in python3.8 in focal because of the SRU in LP: #1928057. This update fixes the problem.
Original advisory details:
It was discovered that the Python stdlib ipaddress API incorrectly handled octal strings. A remote attacker could possibly use this issue to perform a wide variety of attacks, including bypassing certain access restrictions.
{ "binaries": [ { "binary_name": "idle-python3.8", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "libpython3.8", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "libpython3.8-dbg", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "libpython3.8-dev", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "libpython3.8-minimal", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "libpython3.8-stdlib", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "libpython3.8-testsuite", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8-dbg", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8-dev", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8-doc", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8-examples", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8-full", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8-minimal", "binary_version": "3.8.10-0ubuntu1~20.04.1" }, { "binary_name": "python3.8-venv", "binary_version": "3.8.10-0ubuntu1~20.04.1" } ], "availability": "No subscription required" }