logo

CVE-2023-1521 sccache

Package

Manager: cargo
Name: sccache
Vulnerable Version: >=0 <0.4.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

EPSS: 0.00161 pctl0.37471

Details

sccache vulnerable to privilege escalation if server is run as root ### Impact On Linux the `sccache` client can execute arbitrary code with the privileges of a local `sccache` server, by preloading the code in a shared library passed to `LD_PRELOAD`. If the server is run as root (which is the default when installing the [snap package](https://snapcraft.io/sccache)), this means a user running the `sccache` client can get root privileges. ### Patches Upgrade to 0.4.0 ### Workarounds Don't run sccache server as root. ### GitHub Security Lab number GHSL-2023-046

Metadata

Created: 2023-05-30T20:06:02Z
Modified: 2024-11-26T18:57:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-x7fr-pg8f-93f5/GHSA-x7fr-pg8f-93f5.json
CWE IDs: ["CWE-426"]
Alternative ID: GHSA-x7fr-pg8f-93f5
Finding: F297
Auto approve: 1