It was discovered that Git incorrectly sanitized branch names in the PS1 variable when configured to display the repository status in the shell prompt. If a user were tricked into exploring a malicious repository, a remote attacker could use this issue to execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-all" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-arch" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-bzr" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-core" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-cvs" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-daemon-run" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-daemon-sysvinit" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-doc" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-el" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-email" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-gui" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-man" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-mediawiki" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "git-svn" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "gitk" }, { "binary_version": "1:1.9.1-1ubuntu0.4", "binary_name": "gitweb" } ] }