fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html - | |
References | () http://www.openwall.com/lists/oss-security/2014/04/28/4 - | |
References | () https://github.com/fish-shell/fish-shell/issues/1436 - |
Information
Published : 2014-05-02 14:55
Updated : 2024-11-21 02:07
NVD link : CVE-2014-2905
Mitre link : CVE-2014-2905
CVE.ORG link : CVE-2014-2905
JSON object : View
Products Affected
fishshell
- fish
CWE
CWE-264
Permissions, Privileges, and Access Controls