Описание
On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| sccache | fixed | 0.5.3-1 | package | |
| sccache | no-dsa | bookworm | package |
Примечания
https://securitylab.github.com/advisories/GHSL-2023-046_ScCache/
https://github.com/advisories/GHSA-x7fr-pg8f-93f5
ttps://github.com/mozilla/sccache/pull/1663
https://github.com/mozilla/sccache/commit/098ab804ad6cfe6236a45ab695e9d500b61f1614 (v0.4.0-pre.11)
EPSS
Связанные уязвимости
On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
sccache vulnerable to privilege escalation if server is run as root
EPSS