On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.
If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mozilla
Mozilla sccache |
|
CPEs | cpe:2.3:a:mozilla:sccache:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mozilla
Mozilla sccache |
|
Metrics |
cvssV3_1
|
Tue, 26 Nov 2024 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges. | |
Title | Local Privilege Escalation in sccache | |
Weaknesses | CWE-426 | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2024-11-26T11:15:59.434Z
Updated: 2024-11-26T20:45:48.176Z
Reserved: 2023-03-20T15:56:33.714Z
Link: CVE-2023-1521
Vulnrichment
Updated: 2024-11-26T20:43:22.639Z
NVD
Status : Received
Published: 2024-11-26T12:15:18.203
Modified: 2024-11-26T21:15:04.650
Link: CVE-2023-1521
Redhat
No data.