Justin Steven discovered that fish was not properly filtering local git configuration directives when running background git commands. A remote unauthenticated attacker could possibly use this issue to execute arbitrary code.
{ "binaries": [ { "binary_name": "fish", "binary_version": "3.1.0-1.2ubuntu0.1~esm1" }, { "binary_name": "fish-common", "binary_version": "3.1.0-1.2ubuntu0.1~esm1" }, { "binary_name": "fish-dbgsym", "binary_version": "3.1.0-1.2ubuntu0.1~esm1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "fish", "binary_version": "3.3.1+ds-3ubuntu0.1~esm1" }, { "binary_name": "fish-common", "binary_version": "3.3.1+ds-3ubuntu0.1~esm1" }, { "binary_name": "fish-dbgsym", "binary_version": "3.3.1+ds-3ubuntu0.1~esm1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }