Skip to content

sccache vulnerable to privilege escalation if server is run as root

Moderate severity GitHub Reviewed Published May 30, 2023 in mozilla/sccache • Updated May 30, 2023

Package

cargo sccache (Rust)

Affected versions

< 0.4.0

Patched versions

0.4.0

Description

Impact

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.

If the server is run as root (which is the default when installing the snap package), this means a user running the sccache client can get root privileges.

Patches

Upgrade to 0.4.0

Workarounds

Don't run sccache server as root.

GitHub Security Lab number

GHSL-2023-046

References

@sylvestre sylvestre published to mozilla/sccache May 30, 2023
Published to the GitHub Advisory Database May 30, 2023
Reviewed May 30, 2023
Last updated May 30, 2023

Severity

Moderate

Weaknesses

No CWEs

CVE ID

CVE-2023-1521

GHSA ID

GHSA-x7fr-pg8f-93f5

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.