It was discovered that GitPython did not properly sanitize user inputs for remote URLs in the clone command. By injecting a maliciously crafted remote URL, an attacker could possibly use this issue to execute arbitrary commands on the host.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "python-git": "0.3.2~RC1-3ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "python-git-doc": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1", "python-git": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1", "python3-git": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "python-git-doc": "2.1.8-1ubuntu0.1~esm1", "python-git": "2.1.8-1ubuntu0.1~esm1", "python3-git": "2.1.8-1ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "python-git-doc": "3.0.7-1ubuntu0.1~esm1", "python3-git": "3.0.7-1ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "python-git-doc": "3.1.24-1ubuntu0.1~esm1", "python3-git": "3.1.24-1ubuntu0.1~esm1" } ] }