The psub function in fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly create temporary files, which allows local users to execute arbitrary commands via a temporary file with a predictable name.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/04/28/4 | Mailing List Third Party Advisory |
https://github.com/fish-shell/fish-shell/issues/1437 | Third Party Advisory |
https://github.com/fish-shell/fish-shell/releases/tag/2.1.1 | Release Notes |
http://www.openwall.com/lists/oss-security/2014/04/28/4 | Mailing List Third Party Advisory |
https://github.com/fish-shell/fish-shell/issues/1437 | Third Party Advisory |
https://github.com/fish-shell/fish-shell/releases/tag/2.1.1 | Release Notes |
Configurations
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2014/04/28/4 - Mailing List, Third Party Advisory | |
References | () https://github.com/fish-shell/fish-shell/issues/1437 - Third Party Advisory | |
References | () https://github.com/fish-shell/fish-shell/releases/tag/2.1.1 - Release Notes |
Information
Published : 2020-01-28 16:15
Updated : 2024-11-21 02:07
NVD link : CVE-2014-2906
Mitre link : CVE-2014-2906
CVE.ORG link : CVE-2014-2906
JSON object : View
Products Affected
fishshell
- fish
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')