Release date:
2025-01-14 12:09:01 UTC
Description:
- CVE-2024-9287: Quote path names when creating virtual environments to prevent
command injection in activation scripts
Updated packages:
-
python3.11-3.11.2-2.el9_2.2.tuxcare.els2.i686.rpm
sha:e0eac85f768300d3bdb5da4ab3dddeb03806b7d1cc8b5c2a7aad74c364317615
-
python3.11-3.11.2-2.el9_2.2.tuxcare.els2.x86_64.rpm
sha:b5bcb0d7a122f04860ea752d6c5120ba4e1e61249ecb4445d7bfa14bfec70b77
-
python3.11-debug-3.11.2-2.el9_2.2.tuxcare.els2.i686.rpm
sha:1cffa6e3738c4a2099ea4a2491f1e8b129251afb9f62715ce803ac190b63668c
-
python3.11-debug-3.11.2-2.el9_2.2.tuxcare.els2.x86_64.rpm
sha:60a31de0a10d6d9a325aa1f0e4db8ba15a1bfcee9135b5aa8e04440be8586be6
-
python3.11-devel-3.11.2-2.el9_2.2.tuxcare.els2.i686.rpm
sha:b1e0ef9fd07284bb4123671fbac684dc92ada5a943185555cc18d34d267188eb
-
python3.11-devel-3.11.2-2.el9_2.2.tuxcare.els2.x86_64.rpm
sha:c9f3dc7e1ca5517fb47f21a59a68b80ea43e8b2ab6cdf5fa903352be08e84fb9
-
python3.11-idle-3.11.2-2.el9_2.2.tuxcare.els2.i686.rpm
sha:3f4ac434c47a2ec0226bcd32e05300d65766b16319eca77412e0ba39bba73de4
-
python3.11-idle-3.11.2-2.el9_2.2.tuxcare.els2.x86_64.rpm
sha:7370da8811b705143d30c4bd968957b6cb1d6e43503a891296d693a70dc1d924
-
python3.11-libs-3.11.2-2.el9_2.2.tuxcare.els2.i686.rpm
sha:321b9406d2a2851621831e5029621c355289c3ddf8009bdf5ded044d18fbfc15
-
python3.11-libs-3.11.2-2.el9_2.2.tuxcare.els2.x86_64.rpm
sha:426a4f501671c35a2c87d04947b1062229cf91c809ba2e825eb460da6c9e5dab
-
python3.11-test-3.11.2-2.el9_2.2.tuxcare.els2.i686.rpm
sha:1a6113d1cf8eff86ca5f25ba71f8e9c040fe64241bf53549de599bebf5b79d9c
-
python3.11-test-3.11.2-2.el9_2.2.tuxcare.els2.x86_64.rpm
sha:31a9569938b8ebf308094127259520cbb22ecea0d19400002d6ee5a2cbec1201
-
python3.11-tkinter-3.11.2-2.el9_2.2.tuxcare.els2.i686.rpm
sha:ee024abf27ff01da5e0336389bc1e1189d491f771c81c5d75ee41965e4317b1e
-
python3.11-tkinter-3.11.2-2.el9_2.2.tuxcare.els2.x86_64.rpm
sha:8b0c1facf80d3817197588095491fcd21ef8558ee53e343022cbe5aa90779645
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.