Name | CVE-2016-6299 |
Description | The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 850320 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
mock | source | jessie | (not affected) | | | |
mock | source | (unstable) | 1.3.2-1 | | | 850320 |
Notes
[jessie] - mock <not-affected> (Parsing is done before, after temporarily dropping super-user privileges at startup)
https://bugzilla.redhat.com/show_bug.cgi?id=1375490
https://github.com/rpm-software-management/mock/commit/8b02f43beadacf6911200b48d94e39e891a41da9 (mock-1.2.21)