On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.
If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mozilla:sccache:*:*:*:*:*:rust:*:* |
Tue, 26 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilla
Mozilla sccache |
|
| CPEs | cpe:2.3:a:mozilla:sccache:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mozilla
Mozilla sccache |
|
| Metrics |
cvssV3_1
|
Tue, 26 Nov 2024 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges. | |
| Title | Local Privilege Escalation in sccache | |
| Weaknesses | CWE-426 | |
| References |
|
Status: PUBLISHED
Assigner: mozilla
Published: 2024-11-26T11:15:59.434Z
Updated: 2024-11-26T20:45:48.176Z
Reserved: 2023-03-20T15:56:33.714Z
Link: CVE-2023-1521
Updated: 2024-11-26T20:43:22.639Z
Status : Analyzed
Published: 2024-11-26T12:15:18.203
Modified: 2025-10-15T17:49:00.243
Link: CVE-2023-1521
No data.