CVE-2023-1521

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:sccache:*:*:*:*:*:rust:*:*

History

15 Oct 2025, 17:49

Type Values Removed Values Added
Summary
  • (es) En Linux, el cliente sccache puede ejecutar código arbitrario con los privilegios de un servidor sccache local, precargando el código en una biblioteca compartida que se pasa a LD_PRELOAD. Si el servidor se ejecuta como superusuario (que es el valor predeterminado al instalar el paquete snap https://snapcraft.io/sccache ), esto significa que un usuario que ejecuta el cliente sccache puede obtener privilegios de superusuario.
First Time Mozilla sccache
Mozilla
References () https://github.com/advisories/GHSA-x7fr-pg8f-93f5 - () https://github.com/advisories/GHSA-x7fr-pg8f-93f5 - Third Party Advisory
References () https://securitylab.github.com/advisories/GHSL-2023-046_ScCache - () https://securitylab.github.com/advisories/GHSL-2023-046_ScCache - Exploit
CPE cpe:2.3:a:mozilla:sccache:*:*:*:*:*:rust:*:*

26 Nov 2024, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

26 Nov 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-26 12:15

Updated : 2025-10-15 17:49


NVD link : CVE-2023-1521

Mitre link : CVE-2023-1521

CVE.ORG link : CVE-2023-1521


JSON object : View

Products Affected

mozilla

  • sccache
CWE
CWE-426

Untrusted Search Path