fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.
{ "urgency": "low" }
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-2905.json"