A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDGCONFIGDIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.25-4ubuntu0.14.04.1~esm1", "binary_name": "python-xdg" }, { "binary_version": "0.25-4ubuntu0.14.04.1~esm1", "binary_name": "python3-xdg" } ] }