First published: Tue Sep 13 2016(Updated: )
It was found that mock's scm plug-in would parse a given spec file with root priviliges. This could allow an attacker who is able to start a build of an rpm with a specially crafted spec file within mock's environment to elevate their priviliges and escape the chroot. The vulnerable code in scm.py is: ts = rpm.ts() rpm_spec = ts.parseSpec(self.spec) # the spec file is parsed as root self.name = rpm.expandMacro("%{name}")
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =23 | |
Fedora | =24 | |
Fedora | =25 | |
Mock Project SCM Plugin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6299 is considered a high-severity vulnerability due to potential privilege escalation.
The recommended fix for CVE-2016-6299 is to update the mock package to a version where the vulnerability has been patched.
CVE-2016-6299 affects users of Fedora versions 23, 24, and 25 that utilize the mock's scm plugin.
An attacker can exploit CVE-2016-6299 to elevate privileges and escape the chroot environment when starting a build with a crafted spec file.
CVE-2016-6299 involves the mock project scm plugin and affects specific versions of the Fedora operating system.