CVE-2014-1928

NameCVE-2014-1928
DescriptionThe shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2946-1
Debian Bugs738509

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-gnupg (PTS)bullseye0.4.6-1fixed
bookworm0.4.9-1fixed
sid, trixie0.5.2-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-gnupgsourcewheezy0.3.6-1~deb7u1DSA-2946-1
python-gnupgsource(unstable)0.3.6-1738509

Search for package or bug name: Reporting problems