rpm package
suse/sccache&distro=SUSE Linux Enterprise Server 15 SP3-LTSS
pkg:rpm/suse/sccache&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-1521 | — | < 0.4.1~18-150300.7.12.1 | 0.4.1~18-150300.7.12.1 | Nov 26, 2024 | On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccac | ||
| CVE-2022-31394 | — | < 0.4.1~18-150300.7.12.1 | 0.4.1~18-150300.7.12.1 | Feb 21, 2023 | Hyperium Hyper before 0.14.19 does not allow for customization of the max_header_list_size method in the H2 third-party software, allowing attackers to perform HTTP2 attacks. |
- CVE-2023-1521Nov 26, 2024affected < 0.4.1~18-150300.7.12.1fixed 0.4.1~18-150300.7.12.1
On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccac
- CVE-2022-31394Feb 21, 2023affected < 0.4.1~18-150300.7.12.1fixed 0.4.1~18-150300.7.12.1
Hyperium Hyper before 0.14.19 does not allow for customization of the max_header_list_size method in the H2 third-party software, allowing attackers to perform HTTP2 attacks.