If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x7fr-pg8f-93f5 | sccache vulnerable to privilege escalation if server is run as root |
Wed, 15 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mozilla:sccache:*:*:*:*:*:rust:*:* |
Tue, 26 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilla
Mozilla sccache |
|
| CPEs | cpe:2.3:a:mozilla:sccache:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mozilla
Mozilla sccache |
|
| Metrics |
cvssV3_1
|
Tue, 26 Nov 2024 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges. | |
| Title | Local Privilege Escalation in sccache | |
| Weaknesses | CWE-426 | |
| References |
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-11-26T20:45:48.176Z
Reserved: 2023-03-20T15:56:33.714Z
Link: CVE-2023-1521
Updated: 2024-11-26T20:43:22.639Z
Status : Analyzed
Published: 2024-11-26T12:15:18.203
Modified: 2025-10-15T17:49:00.243
Link: CVE-2023-1521
No data.
OpenCVE Enrichment
No data.
Github GHSA