From ${URL} : It was reported [1] that the build directory in pip is predictable, so a local DoS is possible simply by creating a /tmp/pip-build-<username>/ directory owned by someone other than the defined user. Upstream patch that fixes this (will be included in pip 6.0): https://github.com/pypa/pip/pull/2122 [1]: http://seclists.org/oss-sec/2014/q4/655 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2014-8991 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8991): pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.
commit 015c1f58eed5da83e9b4602b91fb34f898c8a3a6 Author: Justin Lecher <jlec@gentoo.org> Date: Mon Nov 23 10:54:42 2015 +0100 dev-python/pip: Drop vulnerable versions for CVE-2014-8991 and CVE-2013-5123 Gentoo-Bug: https://bugs.gentoo.org/show_bug.cgi?id=529954 Gentoo-Bug: https://bugs.gentoo.org/show_bug.cgi?id=501752 Package-Manager: portage-2.2.25 Signed-off-by: Justin Lecher <jlec@gentoo.org> https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=015c1f58eed5da83e9b4602b91fb34f898c8a3a6
@security Tree is clean again
GLSA Vote: No