fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.Referenceshttps://github.com/fish-shell/fish-shell/issues/1438http://www.openwall.com/lists/oss-security/2014/04/28/4