Name | CVE-2016-6299 |
Description | The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 850320 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mock (PTS) | jessie | 1.1.33-1 | fixed |
| buster, stretch | 1.3.2-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
mock | source | jessie | (not affected) | | | |
mock | source | (unstable) | 1.3.2-1 | | | 850320 |
Notes
[jessie] - mock <not-affected> (Parsing is done before, after temporarily dropping super-user privileges at startup)
https://bugzilla.redhat.com/show_bug.cgi?id=1375490
https://github.com/rpm-software-management/mock/commit/8b02f43beadacf6911200b48d94e39e891a41da9 (mock-1.2.21)