Vulnerability Description
The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | Fedora | 23 |
| Mock Project | Scm Plugin | - |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/09/13/2Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/92948Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1375490ExploitIssue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- http://www.openwall.com/lists/oss-security/2016/09/13/2Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/92948Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1375490ExploitIssue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2016-6299?
CVE-2016-6299 is a vulnerability with a CVSS score of 7.8 (HIGH). The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file.
How severe is CVE-2016-6299?
CVE-2016-6299 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-6299?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Fedora, Mock Project Scm Plugin.