It was discovered that GitPython did not properly sanitize user inputs for remote URLs in the clone command. By injecting a maliciously crafted remote URL, an attacker could possibly use this issue to execute arbitrary commands on the host.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1", "binary_name": "python-git" }, { "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1", "binary_name": "python-git-doc" }, { "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm1", "binary_name": "python3-git" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.1.8-1ubuntu0.1~esm1", "binary_name": "python-git" }, { "binary_version": "2.1.8-1ubuntu0.1~esm1", "binary_name": "python-git-doc" }, { "binary_version": "2.1.8-1ubuntu0.1~esm1", "binary_name": "python3-git" } ] }