First published: Tue Jan 28 2020(Updated: )
The psub function in fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly create temporary files, which allows local users to execute arbitrary commands via a temporary file with a predictable name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fishshell Fish | >=1.16.0<2.1.1 | |
debian/fish | 3.1.2-3+deb11u1 3.6.0-3.1+deb12u1 3.7.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2014-2906.
The severity of CVE-2014-2906 is high with a severity value of 7.
The affected software for CVE-2014-2906 includes fish (aka fish-shell) versions 1.16.0 before 2.1.1.
Local users can exploit CVE-2014-2906 by executing arbitrary commands via a temporary file with a predictable name.
You can find more information about CVE-2014-2906 at the following references: [GitHub Issue](https://github.com/fish-shell/fish-shell/issues/1437), [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2014-2906), [Openwall Mailing List](http://www.openwall.com/lists/oss-security/2014/04/28/4).