Bug 2064331 (CVE-2022-20001) - CVE-2022-20001 fish: Arbitrary Code Execution
Summary: CVE-2022-20001 fish: Arbitrary Code Execution
Alias: CVE-2022-20001
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 2064332
TreeView+ depends on / blocked
Reported: 2022-03-15 14:50 UTC by Patrick Del Bello
Modified: 2022-03-15 21:46 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2022-03-15 21:46:16 UTC

Attachments (Terms of Use)

Description Patrick Del Bello 2022-03-15 14:50:05 UTC
fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the `fish_git_prompt` function from the prompt.


Comment 1 Patrick Del Bello 2022-03-15 14:50:21 UTC
Created fish tracking bugs for this issue:

Affects: fedora-all [bug 2064332]

Comment 2 Product Security DevOps Team 2022-03-15 21:46:15 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.

Note You need to log in before you can comment on or make changes to this bug.