Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-x7fr-pg8f-93f5: sccache vulnerable to privilege escalation if server is run as root

Impact

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.

If the server is run as root (which is the default when installing the snap package), this means a user running the sccache client can get root privileges.

Patches

Upgrade to 0.4.0

Workarounds

Don’t run sccache server as root.

GitHub Security Lab number

GHSL-2023-046

ghsa
#linux#git

Package

cargo sccache (Rust)

Affected versions

< 0.4.0

Description

Impact

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.

If the server is run as root (which is the default when installing the snap package), this means a user running the sccache client can get root privileges.

Patches

Upgrade to 0.4.0

Workarounds

Don’t run sccache server as root.

GitHub Security Lab number

GHSL-2023-046

References

  • GHSA-x7fr-pg8f-93f5
  • https://github.com/mozilla/sccache/releases/tag/v0.4.0

Published to the GitHub Advisory Database

May 30, 2023

Last updated

May 30, 2023

ghsa: Latest News

GHSA-x7m9-mv49-fv73: Vaultwarden vulnerable to user impersonation