Debian: DSA-5234-1: fish security update | LinuxSecurity.com

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5234-1                   [email protected]
https://www.debian.org/security/                                  Aron Xu
September 21, 2022                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : fish
CVE ID         : CVE-2022-20001

An arbitrary code execution vulnerability was disovered in fish, a
command line shell. When using the default configuraton of fish,
changing to a directory automatically ran `git` commands in order to
display information about the current repository in the prompt. Such
repositories can contain per-repository configuration that change the
behavior of git, including running arbitrary commands.

For the stable distribution (bullseye), this problem has been fixed in
version 3.1.2-3+deb11u1.

We recommend that you upgrade your fish packages.

For the detailed security status of fish please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/fish

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Debian: DSA-5234-1: fish security update

September 21, 2022
An arbitrary code execution vulnerability was disovered in fish, a command line shell

Summary

For the stable distribution (bullseye), this problem has been fixed in
version 3.1.2-3+deb11u1.

We recommend that you upgrade your fish packages.

For the detailed security status of fish please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/fish

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Severity
An arbitrary code execution vulnerability was disovered in fish, a
command line shell. When using the default configuraton of fish,
changing to a directory automatically ran `git` commands in order to
display information about the current repository in the prompt. Such
repositories can contain per-repository configuration that change the
behavior of git, including running arbitrary commands.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.