Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-1521

Опубликовано: 26 нояб. 2024
Источник: debian
EPSS Низкий

Описание

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sccachefixed0.5.3-1package
sccacheno-dsabookwormpackage

Примечания

  • https://securitylab.github.com/advisories/GHSL-2023-046_ScCache/

  • https://github.com/advisories/GHSA-x7fr-pg8f-93f5

  • ttps://github.com/mozilla/sccache/pull/1663

  • https://github.com/mozilla/sccache/commit/098ab804ad6cfe6236a45ab695e9d500b61f1614 (v0.4.0-pre.11)

EPSS

Процентиль: 47%
0.00237
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 7.8
nvd
около 1 года назад

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 8.4
github
больше 2 лет назад

sccache vulnerable to privilege escalation if server is run as root

suse-cvrf
больше 2 лет назад

Security update for sccache

suse-cvrf
больше 2 лет назад

Security update for sccache

EPSS

Процентиль: 47%
0.00237
Низкий