Description
os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-sandboxed binary relocation phase, which occurs before a user would expect execution of downloaded package content. (237d1e783f7ee261beaba7d3f6bde22da7148b0a was the tested vulnerable version.)
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39586 | os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-sandboxed binary relocation phase, which occurs before a user would expect execution of downloaded package content. (237d1e783f7ee261beaba7d3f6bde22da7148b0a was the tested vulnerable version.) |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-07-31T17:03:46.038Z
Reserved: 2024-07-31T00:00:00.000Z
Link: CVE-2024-42381
Updated: 2024-07-31T17:03:38.967Z
Status : Awaiting Analysis
Published: 2024-07-31T06:15:02.130
Modified: 2024-08-01T13:59:22.207
Link: CVE-2024-42381
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD