This was helpful:
http://sarge.readthedocs.org/en/latest/internals.html#how-shell-quoting-works
--
Wes Turner


On Thu, Sep 25, 2014 at 5:17 PM, Antoine Pitrou <solip...@pitrou.net> wrote:
> On Thu, 25 Sep 2014 13:00:16 -0700
> Bob Hanson <d2mp...@newsguy.com> wrote:
>> Critical bash vulnerability CVE-2014-6271 may affect Python on
>> *n*x and OSX:
>>
>> <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271>
>>
>> <http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/>
>>
>> <http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html>
>>
>> <http://www.openwall.com/lists/oss-security/2014/09/24/17>
>>
>> Also see <news:gmane.comp.security.fulldisclosure> for thread on
>> same being started today.
>
> Fortunately, Python's subprocess has its `shell` argument default to
> False. However, `os.system` invokes the shell implicitly and is
> therefore a possible attack vector.
>
> Regards
>
> Antoine.
>
>
> _______________________________________________
> Python-Dev mailing list
> Python-Dev@python.org
> https://mail.python.org/mailman/listinfo/python-dev
> Unsubscribe: 
> https://mail.python.org/mailman/options/python-dev/wes.turner%40gmail.com
_______________________________________________
Python-Dev mailing list
Python-Dev@python.org
https://mail.python.org/mailman/listinfo/python-dev
Unsubscribe: 
https://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com

Reply via email to