CVE-2016-6299
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
14/04/2017
Last modified:
20/04/2025
Description
The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:* | ||
cpe:2.3:a:mock_project:scm_plugin:-:*:*:*:*:mock:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2016/09/13/2
- http://www.securityfocus.com/bid/92948
- https://bugzilla.redhat.com/show_bug.cgi?id=1375490
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFC4LU6GYYEVUK6LQ2FKUGMZXRTLLL5A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VYLMPA5VLLX67DUJ6XLJ2TIW6CX2CFL4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5PH2YGYWYUAYPHK32SGUZGZXQEBEYNK/
- http://www.openwall.com/lists/oss-security/2016/09/13/2
- http://www.securityfocus.com/bid/92948
- https://bugzilla.redhat.com/show_bug.cgi?id=1375490
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFC4LU6GYYEVUK6LQ2FKUGMZXRTLLL5A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VYLMPA5VLLX67DUJ6XLJ2TIW6CX2CFL4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5PH2YGYWYUAYPHK32SGUZGZXQEBEYNK/