os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-sandboxed binary relocation phase, which occurs before a user would expect execution of downloaded package content. (237d1e783f7ee261beaba7d3f6bde22da7148b0a was the tested vulnerable version.)
Metrics
CVSS Version: 3.1 |
Base Score: 8.3 HIGH Vector: CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:R