CVE-2019-17514

Summary

CVECVE-2019-17514
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2019-10-12 13:15:00 UTC
Updated2020-07-27 18:15:00 UTC
Descriptionlibrary/glob.html in the Python 2 and 3 documentation before 2016 has potentially misleading information about whether sorting occurs, as demonstrated by irreproducible cancer-research results. NOTE: the effects of this documentation cross application domains, and thus it is likely that security-relevant code elsewhere is affected. This issue is not a Python implementation bug, and there are no reports that NMR researchers were specifically relying on library/glob.html. In other words, because the older documentation stated "finds all the pathnames matching a specified pattern according to the rules used by the Unix shell," one might have incorrectly inferred that the sorting that occurs in a Unix shell also occurred for glob.glob. There is a workaround in newer versions of Willoughby nmr-data_compilation-p2.py and nmr-data_compilation-p3.py, which call sort() directly.

Risk And Classification

Problem Types: NVD-CWE-noinfo | CWE-682

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Python Python 3.6.0 - All All
Application Python Python 3.7.0 - All All
Application Python Python 3.8.0 - All All
Application Python Python 3.6.0 - All All
Application Python Python 3.7.0 - All All
Application Python Python 3.8.0 - All All

References

ReferenceSourceLinkTags
A Code Glitch May Have Caused Errors In More Than 100 Published Studies - VICE MISC www.vice.com Press/Media Coverage, Third Party Advisory
bash/pathexp.c at ac50fbac377e32b98d2de396f016ea81e8ee9961 · bminor/bash · GitHub MISC github.com Exploit, Third Party Advisory
10.7. glob — Unix style pathname pattern expansion — Python 2.7.11 documentation MISC web.archive.org Vendor Advisory
USN-4428-1: Python vulnerabilities | Ubuntu security notices | Ubuntu UBUNTU usn.ubuntu.com
Issue 33275: glob.glob should explicitly note that results aren't sorted - Python tracker MISC bugs.python.org Issue Tracking, Vendor Advisory
Lucas Moore on Twitter: "Holy crap. Huge bug uncovered in computational chemistry software because different operating systems sort files differently and the published scripts don’t handle it well. If you do or rely on calculated NMR chemical shifts, this is a must-read. https://t.co/p0PNpMIGgf" MISC twitter.com Issue Tracking, Third Party Advisory
10.7. glob — Unix style pathname pattern expansion — Python 2.7.10 documentation MISC web.archive.org Vendor Advisory
bash/pathexp.c at ac50fbac377e32b98d2de396f016ea81e8ee9961 · bminor/bash · GitHub MISC github.com Exploit, Third Party Advisory
Chris Samuel on Twitter: "I do wonder if they also need to set the environment variable "LC_ALL=C" to be sure that Python's own ordering will always be consistent too. https://t.co/NLdcPPtRnw… https://t.co/rRXX5IgfhS" MISC twitter.com Third Party Advisory
11.7. glob — Unix style pathname pattern expansion — Python 3.4.3 documentation MISC web.archive.org Vendor Advisory
CVE-2019-17514 Python Vulnerability in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
11.7. glob — Unix style pathname pattern expansion — Python 3.5.1 documentation MISC web.archive.org Vendor Advisory
OOPS MISC pubs.acs.org Third Party Advisory
pubs.acs.org/doi/suppl/10.1021/acs.orglett.9b03216/suppl_file/ol9b03216_si... MISC pubs.acs.org Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 198293 Ubuntu Security Notification for Python2.7, Python3.7, Python3.8 Vulnerabilities (USN-4754-3)
  • 671062 EulerOS Security Update for python (EulerOS-SA-2019-2442)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report