| Summary | os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-sandboxed binary relocation phase, which occurs before a user would expect execution of downloaded package content. (237d1e783f7ee261beaba7d3f6bde22da7148b0a was the tested vulnerable version.) |
|---|---|
| Publication Date | July 31, 2024, 3:15 p.m. |
| Registration Date | Aug. 1, 2024, 10:01 a.m. |
| Last Update | Aug. 1, 2024, 10:59 p.m. |