CVE-2023-1521: sccache vulnerable to privilege escalation if server is run as root
(updated )
On Linux the sccache
client can execute arbitrary code with the privileges of a local sccache
server, by preloading the code in a shared library passed to LD_PRELOAD
.
If the server is run as root (which is the default when installing the snap package), this means a user running the sccache
client can get root privileges.
References
Detect and mitigate CVE-2023-1521 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →