vulnerability

Oracle Linux: CVE-2024-53899: ELSA-2024-10953: python36:3.6 security update (IMPORTANT) (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Nov 24, 2024
Added
Dec 13, 2024
Modified
Dec 3, 2025

Description

virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287.
A flaw was found in the virtualenv Python package. Due to the handling of quotes in magic template strings, the virtual environment activation script is vulnerable to OS command injection.

Solutions

oracle-linux-upgrade-python36oracle-linux-upgrade-python36-debugoracle-linux-upgrade-python36-develoracle-linux-upgrade-python36-rpm-macrosoracle-linux-upgrade-python3-bsonoracle-linux-upgrade-python3-distrooracle-linux-upgrade-python3-docsoracle-linux-upgrade-python3-docutilsoracle-linux-upgrade-python3-noseoracle-linux-upgrade-python3-pygmentsoracle-linux-upgrade-python3-pymongooracle-linux-upgrade-python3-pymongo-gridfsoracle-linux-upgrade-python3-pymysqloracle-linux-upgrade-python3-scipyoracle-linux-upgrade-python3-sqlalchemyoracle-linux-upgrade-python3-virtualenvoracle-linux-upgrade-python3-wheeloracle-linux-upgrade-python3-wheel-wheeloracle-linux-upgrade-python-nose-docsoracle-linux-upgrade-python-pymongo-docoracle-linux-upgrade-python-sqlalchemy-docoracle-linux-upgrade-python-virtualenvoracle-linux-upgrade-python-virtualenv-doc
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.