os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-sandboxed binary relocation phase, which occurs before a user would expect execution of downloaded package content. (237d1e783f7ee261beaba7d3f6bde22da7148b0a was the tested vulnerable version.)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-07-31T17:03:46.038Z

Reserved: 2024-07-31T00:00:00

Link: CVE-2024-42381

cve-icon Vulnrichment

Updated: 2024-07-31T17:03:38.967Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-31T06:15:02.130

Modified: 2024-08-01T13:59:22.207

Link: CVE-2024-42381

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.