We found results for “”
CVE-2023-1521
Date: November 26, 2024
On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package), this means a user running the sccache client can get root privileges. The vulnerability is fixed in version 0.4.0.
Language: RUST
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Untrusted Search Path
CWE-426CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


