On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
History

Tue, 26 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla sccache
CPEs cpe:2.3:a:mozilla:sccache:*:*:*:*:*:*:*:*
Vendors & Products Mozilla
Mozilla sccache
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 11:30:00 +0000

Type Values Removed Values Added
Description On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Title Local Privilege Escalation in sccache
Weaknesses CWE-426
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published: 2024-11-26T11:15:59.434Z

Updated: 2024-11-26T20:45:48.176Z

Reserved: 2023-03-20T15:56:33.714Z

Link: CVE-2023-1521

cve-icon Vulnrichment

Updated: 2024-11-26T20:43:22.639Z

cve-icon NVD

Status : Received

Published: 2024-11-26T12:15:18.203

Modified: 2024-11-26T21:15:04.650

Link: CVE-2023-1521

cve-icon Redhat

No data.