CVE-2023-1521

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:sccache:*:*:*:*:*:rust:*:*

History

15 Oct 2025, 17:49

Type Values Removed Values Added
First Time Mozilla
Mozilla sccache
CPE cpe:2.3:a:mozilla:sccache:*:*:*:*:*:rust:*:*
References () https://github.com/advisories/GHSA-x7fr-pg8f-93f5 - () https://github.com/advisories/GHSA-x7fr-pg8f-93f5 - Third Party Advisory
References () https://securitylab.github.com/advisories/GHSL-2023-046_ScCache - () https://securitylab.github.com/advisories/GHSL-2023-046_ScCache - Exploit

Information

Published : 2024-11-26 12:15

Updated : 2025-10-15 17:49


NVD link : CVE-2023-1521

Mitre link : CVE-2023-1521

CVE.ORG link : CVE-2023-1521


JSON object : View

Products Affected

mozilla

  • sccache
CWE
CWE-426

Untrusted Search Path