Headline
GHSA-x7fr-pg8f-93f5: sccache vulnerable to privilege escalation if server is run as root
Impact
On Linux the sccache
client can execute arbitrary code with the privileges of a local sccache
server, by preloading the code in a shared library passed to LD_PRELOAD
.
If the server is run as root (which is the default when installing the snap package), this means a user running the sccache
client can get root privileges.
Patches
Upgrade to 0.4.0
Workarounds
Don’t run sccache server as root.
GitHub Security Lab number
GHSL-2023-046
Package
cargo sccache (Rust)
Affected versions
< 0.4.0
Description
Impact
On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.
If the server is run as root (which is the default when installing the snap package), this means a user running the sccache client can get root privileges.
Patches
Upgrade to 0.4.0
Workarounds
Don’t run sccache server as root.
GitHub Security Lab number
GHSL-2023-046
References
- GHSA-x7fr-pg8f-93f5
- https://github.com/mozilla/sccache/releases/tag/v0.4.0
Published to the GitHub Advisory Database
May 30, 2023
Last updated
May 30, 2023