| Summary: | Update python-virtualenv to>= 1.10, which includes a pip able to download from PyPI over SSL. | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Hartmut Goebel <h.goebel> |
| Component: | RPM Packages | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, luigiwalser, sysadmin-bugs, tmb |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/566721/ | ||
| Whiteboard: | MGA3-64-OK MGA3-32-OK | ||
| Source RPM: | python-virtualenv-1.7.1.2-4.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Hartmut Goebel
2013-08-07 14:32:00 CEST
Steps to Reproduce: $ virtualenv -v xxx [...] Installing existing pip-1.1.tar.gz distribution: /usr/lib/python2.7/site-packages/virtualenv_support/pip-1.1.tar.gz [...] Keywords:
(none) =>
Junior_job *** Bug 10955 has been marked as a duplicate of this bug. ***
Manuel Hiebel
2013-08-07 19:08:04 CEST
Keywords:
(none) =>
Triaged Version 1.9.1 should be enough and would also fix the security issue in bundled pip 1.10 is a major change I would avoid for mga3 Status:
NEW =>
ASSIGNED Suggested advisory: ======================== Update to upstream 1.9.1 because of security issues with the bundled python-pip in older releases and to allow download from PyPI over SSL. ======================== Updated packages in core/updates_testing: ======================== python-virtualenv-1.9.1-1.1.mga3.noarch Source RPM: python-virtualenv-1.9.1-1.1.mga3.src Keywords:
Junior_job, Triaged =>
(none) Advisory 10956.adv uploaded to svn. Anyone have a test procedure? CC:
(none) =>
davidwhodgins (In reply to Dave Hodgins from comment #5) > Anyone have a test procedure? virtualenv -v xxx | grep Install should give pip.1.3.1. Doesn't actually show that pip is working, but I'll accept that. Testing complete on Mageia 3 i586 and x86_64. Could someone from the sysadmin team push 10956.adv to updates. Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGAA-2013-0082.html Status:
ASSIGNED =>
RESOLVED This has been assigned CVE-2013-1629. URL:
https://pypi.python.org/pypi/virtualenv =>
http://lwn.net/Vulnerabilities/566721/ |