aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAlan Somers <asomers@FreeBSD.org>2023-01-21 22:30:29 +0000
committerAlan Somers <asomers@FreeBSD.org>2023-01-21 22:42:45 +0000
commit15a0ee651699dc551e4e41d3976e68ba1c9e90a9 (patch)
tree999d630e7d647c190d70eafffd506ab57b60c5c8
parent65ce3f1684bc6a0457bfc55feb059baf76bbee2a (diff)
downloadports-15a0ee651699dc551e4e41d3976e68ba1c9e90a9.tar.gz
ports-15a0ee651699dc551e4e41d3976e68ba1c9e90a9.zip
security/vuxml: register shells/fish vulnerability
Arbitrary code execution if the attacker can convince the user to cd to a directory the attacker controls. CVE-2022-20001 PR: 263506
-rw-r--r--security/vuxml/vuln/2023.xml44
1 files changed, 44 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 30e741f00766..d43c2aa94ef3 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,47 @@
+ <vuln vid="a3b10c9b-99d9-11ed-aa55-d05099fed512">
+ <topic>shells/fish -- arbitrary code execution via git</topic>
+ <affects>
+ <package>
+ <name>fish</name>
+ <range><ge>3.1.0</ge><lt>3.4.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Peter Ammon reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2022-20001">
+ <p>
+ fish is a command line shell. fish version 3.1.0 through
+ version 3.3.1 is vulnerable to arbitrary code execution.
+ git repositories can contain per-repository
+ configuration that change the behavior of git, including
+ running arbitrary commands. When using the default
+ configuration of fish, changing to a directory
+ automatically runs git commands in order to display
+ information about the current repository in the prompt.
+ If an attacker can convince a user to change their
+ current directory into one controlled by the attacker,
+ such as on a shared file system or extracted archive,
+ fish will run arbitrary commands under the attacker's
+ control. This problem has been fixed in fish 3.4.0. Note
+ that running git in these directories, including using
+ the git tab completion, remains a potential trigger for
+ this issue. As a workaround, remove the
+ fish_git_prompt function from the prompt.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2022-20001</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20001</url>
+ </references>
+ <dates>
+ <discovery>2021-12-26</discovery>
+ <entry>2023-01-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="dc49f6dc-99d2-11ed-86e9-d4c9ef517024">
<topic>MySQL -- Multiple vulnerabilities</topic>
<affects>