Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-9192

Опубликовано: 14 нояб. 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-9192: python3.11 security update (MODERATE)

[3.11.9-7]

  • Security fix for CVE-2024-8088 Resolves: RHEL-55959

[3.11.9-6]

  • Security fix for CVE-2024-6923 Resolves: RHEL-53038

[3.11.9-5]

  • Properly propagate the optimization flags to C extensions

[3.11.9-4]

[3.11.9-3]

  • Security fix for CVE-2024-4032 Resolves: RHEL-44099

[3.11.9-2]

  • Enable importing of hash-based .pyc files under FIPS mode Resolves: RHEL-40779

[3.11.9-1]

  • Rebase to 3.11.9
  • Security fixes for CVE-2023-6597 and CVE-2024-0450
  • Fix expat tests for the latest expat security release Resolves: RHEL-33677, RHEL-33689

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

python3.11

3.11.9-7.el9

python3.11-debug

3.11.9-7.el9

python3.11-devel

3.11.9-7.el9

python3.11-idle

3.11.9-7.el9

python3.11-libs

3.11.9-7.el9

python3.11-test

3.11.9-7.el9

python3.11-tkinter

3.11.9-7.el9

Oracle Linux x86_64

python3.11

3.11.9-7.el9

python3.11-debug

3.11.9-7.el9

python3.11-devel

3.11.9-7.el9

python3.11-idle

3.11.9-7.el9

python3.11-libs

3.11.9-7.el9

python3.11-test

3.11.9-7.el9

python3.11-tkinter

3.11.9-7.el9

Связанные CVE

Связанные уязвимости

oracle-oval
7 месяцев назад

ELSA-2024-9190: python3.12 security update (MODERATE)

ubuntu
10 месяцев назад

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.

CVSS3: 5.3
redhat
10 месяцев назад

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.

nvd
10 месяцев назад

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.

msrc
9 месяцев назад

Описание отсутствует