-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0222
                      USN-4700-1: PyXDG vulnerability
                              20 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           PyXDG
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-12761  

Reference:         ESB-2019.2125

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-4700-1

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4700-1: PyXDG vulnerability
19 January 2021

PyXDG could be made to run programs as your login if it received specially
crafted input.
Releases

  o Ubuntu 18.04 LTS
  o Ubuntu 16.04 LTS
  o Ubuntu 14.04 ESM

Packages

  o pyxdg - python library to access freedesktop.org standards

Details

Alexandre D'Hondt discovered that PyXDG did not properly sanitize input.
An attacker could exploit this with a crafted .menu file to execute
arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 18.04

  o python-xdg - 0.25-4ubuntu1.1
  o python3-xdg - 0.25-4ubuntu1.1

Ubuntu 16.04

  o python-xdg - 0.25-4ubuntu0.16.04.1
  o python3-xdg - 0.25-4ubuntu0.16.04.1

Ubuntu 14.04

  o python-xdg - 0.25-4ubuntu0.14.04.1~esm1
  o python3-xdg - 0.25-4ubuntu0.14.04.1~esm1

In general, a standard system update will make all the necessary changes.

References

  o CVE-2019-12761

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=EfET
-----END PGP SIGNATURE-----