Логотип exploitDog
bind:CVE-2023-1521
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-1521

Количество 6

Количество 6

ubuntu логотип

CVE-2023-1521

около 1 года назад

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-1521

около 1 года назад

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-1521

около 1 года назад

On Linux the sccache client can execute arbitrary code with the privil ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-x7fr-pg8f-93f5

больше 2 лет назад

sccache vulnerable to privilege escalation if server is run as root

CVSS3: 8.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2637-1

больше 2 лет назад

Security update for sccache

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3526-1

больше 2 лет назад

Security update for sccache

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-1521

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 7.8
0%
Низкий
около 1 года назад
nvd логотип
CVE-2023-1521

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2023-1521

On Linux the sccache client can execute arbitrary code with the privil ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
github логотип
GHSA-x7fr-pg8f-93f5

sccache vulnerable to privilege escalation if server is run as root

CVSS3: 8.4
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2637-1

Security update for sccache

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3526-1

Security update for sccache

больше 2 лет назад

Уязвимостей на страницу