Upstream information

CVE-2014-2914 at MITRE

Description

fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

No SUSE Bugzilla entries cross referenced.

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub for SUSE Linux Enterprise 12
  • fish >= 2.2.0-6.1
Patchnames:
openSUSE-2016-790
openSUSE Leap 15.0
  • fish3 >= 3.0.0-lp150.3.1
  • fish3-debuginfo >= 3.0.0-lp150.3.1
  • fish3-debugsource >= 3.0.0-lp150.3.1
  • fish3-devel >= 3.0.0-lp150.3.1
Patchnames:
openSUSE-2019-2177
openSUSE Leap 15.1
  • fish3 >= 3.0.0-lp151.2.1
  • fish3-debuginfo >= 3.0.0-lp151.2.1
  • fish3-debugsource >= 3.0.0-lp151.2.1
  • fish3-devel >= 3.0.0-lp151.2.1
Patchnames:
openSUSE-2019-2188
openSUSE Tumbleweed
  • fish >= 2.4.0-1.1
Patchnames:
openSUSE Tumbleweed GA fish