os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-sandboxed binary relocation phase, which occurs before a user would expect execution of downloaded package content. (237d1e783f7ee261beaba7d3f6bde22da7148b0a was the tested vulnerable version.)
References
Configurations
No configuration.
History
01 Aug 2024, 13:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-830 |
31 Jul 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
31 Jul 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-31 06:15
Updated : 2024-08-01 13:59
NVD link : CVE-2024-42381
Mitre link : CVE-2024-42381
CVE.ORG link : CVE-2024-42381
JSON object : View
Products Affected
No product.
CWE
CWE-830
Inclusion of Web Functionality from an Untrusted Source