It was discovered that GitPython did not properly sanitize user inputs for remote URLs in the clone command. By injecting a maliciously crafted remote URL, an attacker could possibly use this issue to execute arbitrary commands on the host.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-git", "binary_version": "0.3.2~RC1-3ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-git", "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1" }, { "binary_name": "python3-git", "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-git", "binary_version": "2.1.8-1ubuntu0.1~esm1" }, { "binary_name": "python3-git", "binary_version": "2.1.8-1ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "python3-git", "binary_version": "3.0.7-1ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "python3-git", "binary_version": "3.1.24-1ubuntu0.1~esm1" } ] }