Does this have any relation to the 'Shellshock' bug found in Bash recently? Did 
Fish borrow code from Bash that inherits the bug?

-- 
Luciano ES
>>
**************************
On Fri, 26 Sep 2014 21:28:05 +0800 (WST), David Adam wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi all,
> 
> It's been some months, but I am pleased to announce the release of
> fish shell 2.1.1.
> 
> This is a security release, and fixes a number of local privilege
> escalation and one remote code execution problem. I strongly
> encourage all users to upgrade ASAP.
> 
> New source and binary packages will shortly be available from
> http://fishshell.com/ - it takes a little time to build packages for
> all platforms so check back in the next day or two if your platform
> is not available.
> 
> The SHA-1 checksum for fish-2.1.1.tar.gz is
> 8f97f39b92ea7dfef1f464b18e304045bf37546d.
> 
> Importantly, you should stop all running instances of `fishd` once
> the update is installed - packages published on fishshell.com will do
> this for you, but if you are building from source you need to do this
> manually (e.g. with `pkill fishd` or `killall fishd`). It will
> automatically be restarted, but is required to avoid losing universal
> variables.
> 
> If you are using a platform that sets `$XDG_RUNTIME_DIR`, you should
> restart all running fish instances as well. Fedora 20 is one such
> distribution; `echo $XDG_RUNTIME_DIR` at a fish prompt should show
> you if yours does.
> 
> If you are packaging this software for a distribution, I ask that you 
> include a postinstallation script that does this for your users.
> 
> The full details of the security problems are as follows:
> 
> CVE-2014-2905: fish universal variable socket vulnerable to
> permission bypass leading to privilege escalation
> 
>   fish, from at least version 1.16.0 to version 2.1.0 (inclusive),
> does not check the credentials of processes communicating over the
> fishd universal variable server UNIX domain socket. This allows a
> local attacker to elevate their privileges to those of a target user
> running fish, including root.
> 
>   fish version 2.1.1 is not vulnerable.
> 
>   No workaround is currently available for earlier versions of fish.
> 
>   https://github.com/fish-shell/fish-shell/issues/1436
> 
> CVE-2014-2906 and CVE-2014-3856: fish temporary file creation
> vulnerable to race condition leading to privilege escalation
> 
>   fish, from at least version 1.16.0 to version 2.1.0 (inclusive),
> creates temporary files in an insecure manner.
> 
>   Versions 1.23.0 to 2.1.0 (inclusive) execute code via `funced` from
> these temporary files, allowing privilege escalation to those of any
> user running fish, including root. (CVE-2014-3856)
> 
>   Additionally, from at least version 1.16.0 to version 2.1.0
> (inclusive), fish will read data using the psub function from these
> temporary files, meaning that the input of commands used with the
> psub function is under the control of the attacker. (CVE-2014-2906)
> 
>   fish version 2.1.1 is not vulnerable.
> 
>   No workaround is currently available for earlier versions of fish.
> 
>   https://github.com/fish-shell/fish-shell/issues/1437
> 
> CVE-2014-2914: fish web interface does not restrict access leading to
> remote code execution
> 
>   fish, from version 2.0.0 to version 2.1.0 (inclusive), fails to
> restrict connections to the Web-based configuration service
> (fish_config). This allows remote attackers to execute arbitrary code
> in the context of the user running fish_config.
> 
>   The service is generally only running for short periods of time.
> 
>   fish version 2.1.1 is not vulnerable.
> 
>   No workaround is currently available for earlier versions of fish, 
>   although the use of the fish_config tool is optional as other
> interfaces to fish configuration are available.
> 
>   https://github.com/fish-shell/fish-shell/issues/1438
> 
> CVE-2014-3219: fish temporary file access leading to privilege
> escalation
> 
>   fish, from at least version 1.16.0 to version 2.1.0 (inclusive),
> uses temporary files in an insecure manner.
> 
>   fish will read and write completions from these temporary files
> without checking for ownership or symbolic links, allowing data
> corruption.
> 
>   fish version 2.1.1 is not vulnerable.
> 
>   No workaround is currently available for earlier versions of fish.
> 
>   https://github.com/fish-shell/fish-shell/issues/1440
> 
> David Adam
> fish committer
> zanc...@ucc.gu.uwa.edu.au
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (GNU/Linux)
> 
> iQIcBAEBAgAGBQJUJWeHAAoJEMC5abKXToiO+68P/jAV46dgFr6gWcwbgdwoHSD3
> 3NbowiEj8+vmxbDY/+7UqLkdyrDahKTFJeu1jQieOlQygNyVzQ/nprqcL0xzvH5T
> Xjc4z0umW/FXDlOM+jjczfiryuhcqA7N30c+4gkyIyybmE2k/k+PhDD182npXaQn
> +32B+SVKKf1vRQxBM2gDXNskjzsxZF2IoNiX+Medx4DtxCGpdoSmplUyeqEotgzr
> rRGdV/QoOhRh4AgSqVknwjgaQrFDe31UXexhKZ56Qm7feZNPNjnOwNzcxXOWBexD
> VhFBz5TwekCVckj4vAdLLBia9eskykjEFm61Et2w6lBjb4n3+VxMoQiKP/MUw0bk
> qjGUaZU4Wt0fpep0FN0AOfQfAJ8v6XrZyRt0JmGvCf71Fgrp3IrmGP7AH9x6magf
> XbJRiKDyj2mL+l5RA9/dYR1YXHSi0m6stNJa2mqOC3uIwuFRlfkNKxKvjk7kWgVw
> iLRfM7nQOhJouMSNhE4t5iwQ9GkTRVZtFI3JipY6eI8BQiikiyigs0XwS3p6auqk
> OdfLItIlA+v8NYtKT87lN7Q+soUL0ehCrfItNrAuN/Yj004l19kURlFAFcfPOjvQ
> G1um1JAI81L3SFx4o7LI+4mlfBssVqQrkcoHsGRqDwIHNYAU4DteW9ViGAT+sITB
> RqN6vDzUyRRhBMPiXr/g
> =xkj7
> -----END PGP SIGNATURE-----
> 
> ------------------------------------------------------------------------------
> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS
> Reports Are you Audit-Ready for PCI DSS 3.0 Compliance? Download
> White paper Comply to PCI DSS 3.0 Requirement 10 and 11.5 with
> EventLog Analyzer
> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
> _______________________________________________ Fish-users mailing
> list Fish-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/fish-users


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Fish-users mailing list
Fish-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fish-users

Reply via email to