Skip to content

Privilege escalation vulnerability if sccache server is run as root

Moderate
sylvestre published GHSA-x7fr-pg8f-93f5 May 30, 2023

Package

No package listed

Affected versions

< 0.4.0

Patched versions

0.4.0

Description

Impact

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.

If the server is run as root (which is the default when installing the snap package), this means a user running the sccache client can get root privileges.

Patches

Upgrade to 0.4.0

Workarounds

Don't run sccache server as root.

GitHub Security Lab number

GHSL-2023-046

Severity

Moderate

CVE ID

CVE-2023-1521

Weaknesses

No CWEs

Credits