CVE-2014-1929: python-gnupg vulnerable to shell injection
(updated )
python-gnupg 0.3.5 and 0.3.6 allow for shell injection via a failure to escape backslashes in the shell_quote()
function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
References
- alioth-lists.debian.net/pipermail/debian-security-tracker-commits/2014-June/028512.html
- code.google.com/archive/p/python-gnupg/issues/98
- github.com/advisories/GHSA-vcr5-xr9h-mvc5
- github.com/pypa/advisory-database/tree/main/vulns/python-gnupg/PYSEC-2014-92.yaml
- github.com/vsajip/python-gnupg
- nvd.nist.gov/vuln/detail/CVE-2014-1929
- web.archive.org/web/20200228170437/http://www.securityfocus.com/bid/65539
- www.openwall.com/lists/oss-security/2014/02/04/3
- www.openwall.com/lists/oss-security/2014/02/04/4
Detect and mitigate CVE-2014-1929 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →