It was discovered that GitPython did not block insecure options from user inputs in the clone command. An attacker could possibly use this issue to execute arbitrary commands on the host.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2", "binary_name": "python-git" }, { "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2", "binary_name": "python-git-doc" }, { "binary_version": "1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2", "binary_name": "python3-git" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.1.8-1ubuntu0.1~esm2", "binary_name": "python-git" }, { "binary_version": "2.1.8-1ubuntu0.1~esm2", "binary_name": "python-git-doc" }, { "binary_version": "2.1.8-1ubuntu0.1~esm2", "binary_name": "python3-git" } ] }