Justin Steven discovered that fish was not properly filtering local git configuration directives when running background git commands. A remote unauthenticated attacker could possibly use this issue to execute arbitrary code.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "3.1.0-1.2ubuntu0.1~esm1", "binary_name": "fish" }, { "binary_version": "3.1.0-1.2ubuntu0.1~esm1", "binary_name": "fish-common" }, { "binary_version": "3.1.0-1.2ubuntu0.1~esm1", "binary_name": "fish-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "3.3.1+ds-3ubuntu0.1~esm1", "binary_name": "fish" }, { "binary_version": "3.3.1+ds-3ubuntu0.1~esm1", "binary_name": "fish-common" }, { "binary_version": "3.3.1+ds-3ubuntu0.1~esm1", "binary_name": "fish-dbgsym" } ] }