UBUNTU-CVE-2023-1521

Source
https://ubuntu.com/security/CVE-2023-1521
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-1521.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-1521
Related
Published
2024-11-26T12:15:00Z
Modified
2025-01-13T10:23:59Z
Summary
[none]
Details

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

References

Affected packages

Ubuntu:24.10 / sccache

Package

Name
sccache
Purl
pkg:deb/ubuntu/sccache@0.8.1-7?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.7.7-2build1
0.8.1-2
0.8.1-3
0.8.1-4
0.8.1-5
0.8.1-6
0.8.1-7

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / sccache

Package

Name
sccache
Purl
pkg:deb/ubuntu/sccache@0.7.7-2build1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.5.4-2
0.7.4-3
0.7.5-1
0.7.5-2
0.7.6-1
0.7.7-1
0.7.7-2
0.7.7-2build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}