-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

fish 2.1.1 will be released shortly, correcting two security vulnerabilities
and reducing the scope of a further security vulnerability.

fish 2.1.1 will be made available as source and binary packages at
http://fishshell.com/.

The following security vulnerabilities have been identified in the fish shell:

CVE-2014-2905: fish universal variable socket vulnerable to permission bypass
leading to privilege escalation

  fish, from at least version 1.16.0 to version 2.1.0 (inclusive), does not
  check the credentials of processes communicating over the fishd universal
  variable server UNIX domain socket. This allows a local attacker to elevate
  their privileges to those of a target user running fish, including root.

  fish version 2.1.1 is not vulnerable.

  No workaround is currently available for earlier versions of fish.

  https://github.com/fish-shell/fish-shell/issues/1436

CVE-2014-2906: fish temporary file creation vulnerable to race condition
leading to privilege escalation

  fish, from at least version 1.16.0 to version 2.1.0 (inclusive), creates
  temporary files in an insecure manner.

  Versions 1.23.0 to 2.1.0 (inclusive) execute code from these temporary files,
  allowing privilege escalation to those of any user running fish, including
  root.

  Additionally, from at least version 1.16.0 to version 2.1.0 (inclusive),
  fish will read data using the psub function from these temporary files,
  meaning that the input of commands used with the psub function is under the
  control of the attacker.

  fish version 2.1.1 is not vulnerable.

  No workaround is currently available for earlier versions of fish.

  https://github.com/fish-shell/fish-shell/issues/1437

CVE-2014-2914: fish web interface does not restrict access leading to remote
code execution

  fish, from version 2.0.0 to version 2.1.0 (inclusive), fails to restrict
  connections to the Web-based configuration service (fish_config). This
  allows remote attackers to execute arbitrary code in the context of the user
  running fish_config.

  The service is generally only running for short periods of time.

  fish version 2.1.1 restricts incoming connections to localhost only. At this
  stage, users should avoid running fish_config on systems where there are
  untrusted local users, as they are still able to connect to the fish_config
  service and elevate their privileges to those of the user running
  fish_config.

  No workaround is currently available for earlier versions of fish, although
  the use of the fish_config tool is optional as other interfaces to fish
  configuration are available.

  https://github.com/fish-shell/fish-shell/issues/1438

David Adam
fish committer
zanc...@ucc.gu.uwa.edu.au
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=HrEo
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
"Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE
Instantly run your Selenium tests across 300+ browser/OS combos.  Get 
unparalleled scalability from the best Selenium testing platform available.
Simple to use. Nothing to install. Get started now for free."
http://p.sf.net/sfu/SauceLabs
_______________________________________________
Fish-users mailing list
Fish-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fish-users

Reply via email to