Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x7fr-pg8f-93f5

Опубликовано: 30 мая 2023
Источник: github
Github: Прошло ревью
CVSS4: 7.3
CVSS3: 8.4

Описание

sccache vulnerable to privilege escalation if server is run as root

Impact

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.

If the server is run as root (which is the default when installing the snap package), this means a user running the sccache client can get root privileges.

Patches

Upgrade to 0.4.0

Workarounds

Don't run sccache server as root.

GitHub Security Lab number

GHSL-2023-046

Пакеты

Наименование

sccache

rust
Затронутые версииВерсия исправления

< 0.4.0

0.4.0

EPSS

Процентиль: 47%
0.00237
Низкий

7.3 High

CVSS4

8.4 High

CVSS3

Дефекты

CWE-426

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 7.8
nvd
около 1 года назад

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 7.8
debian
около 1 года назад

On Linux the sccache client can execute arbitrary code with the privil ...

suse-cvrf
больше 2 лет назад

Security update for sccache

suse-cvrf
больше 2 лет назад

Security update for sccache

EPSS

Процентиль: 47%
0.00237
Низкий

7.3 High

CVSS4

8.4 High

CVSS3

Дефекты

CWE-426