It was discovered that GitPython did not block insecure options from user inputs in the clone command. An attacker could possibly use this issue to execute arbitrary commands on the host.
{ "binaries": [ { "binary_name": "python-git", "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2" }, { "binary_name": "python-git-doc", "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2" }, { "binary_name": "python3-git", "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "python-git", "binary_version": "2.1.8-1ubuntu0.1~esm2" }, { "binary_name": "python-git-doc", "binary_version": "2.1.8-1ubuntu0.1~esm2" }, { "binary_name": "python3-git", "binary_version": "2.1.8-1ubuntu0.1~esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }