OESA-2022-1689

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1689
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1689.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2022-1689
Upstream
Published
2022-06-02T11:03:50Z
Modified
2025-09-03T06:17:57.151503Z
Summary
fish security update
Details

fish is a fully-equipped command line shell (like bash or zsh) that is smart and user-friendly. fish supports powerful features like syntax highlighting, autosuggestions, and tab completions that just work, with nothing to learn or configure.

Security Fix(es):

fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the fish_git_prompt function from the prompt.(CVE-2022-20001)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / fish

Package

Name
fish
Purl
pkg:rpm/openEuler/fish&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.1-2.oe1

Ecosystem specific

{
    "src": [
        "fish-3.3.1-2.oe1.src.rpm"
    ],
    "x86_64": [
        "fish-debugsource-3.3.1-2.oe1.x86_64.rpm",
        "fish-debuginfo-3.3.1-2.oe1.x86_64.rpm",
        "fish-3.3.1-2.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "fish-3.3.1-2.oe1.aarch64.rpm",
        "fish-debugsource-3.3.1-2.oe1.aarch64.rpm",
        "fish-debuginfo-3.3.1-2.oe1.aarch64.rpm"
    ]
}

openEuler:20.03-LTS-SP3 / fish

Package

Name
fish
Purl
pkg:rpm/openEuler/fish&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.1-2.oe1

Ecosystem specific

{
    "src": [
        "fish-3.3.1-2.oe1.src.rpm"
    ],
    "x86_64": [
        "fish-3.3.1-2.oe1.x86_64.rpm",
        "fish-debugsource-3.3.1-2.oe1.x86_64.rpm",
        "fish-debuginfo-3.3.1-2.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "fish-debuginfo-3.3.1-2.oe1.aarch64.rpm",
        "fish-3.3.1-2.oe1.aarch64.rpm",
        "fish-debugsource-3.3.1-2.oe1.aarch64.rpm"
    ]
}

openEuler:22.03-LTS / fish

Package

Name
fish
Purl
pkg:rpm/openEuler/fish&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.1-4.oe2203

Ecosystem specific

{
    "src": [
        "fish-3.3.1-4.oe2203.src.rpm"
    ],
    "x86_64": [
        "fish-3.3.1-4.oe2203.x86_64.rpm",
        "fish-debuginfo-3.3.1-4.oe2203.x86_64.rpm",
        "fish-debugsource-3.3.1-4.oe2203.x86_64.rpm"
    ],
    "aarch64": [
        "fish-3.3.1-4.oe2203.aarch64.rpm",
        "fish-debuginfo-3.3.1-4.oe2203.aarch64.rpm",
        "fish-debugsource-3.3.1-4.oe2203.aarch64.rpm"
    ]
}