Source: atril Version: 1.26.1-3 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for atril. CVE-2023-51698[0]: | Atril is a simple multi-page document viewer. Atril is vulnerable to | a critical Command Injection Vulnerability. This vulnerability gives | the attacker immediate access to the target system when the target | user opens a crafted document or clicks on a crafted link/URL using | a maliciously crafted CBT document which is a TAR archive. A patch | is available at commit ce41df6. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-51698 https://www.cve.org/CVERecord?id=CVE-2023-51698 [1] https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2 [2] https://github.com/mate-desktop/atril/commit/ce41df6467521ff9fd4f16514ae7d6ebb62eb1ed Please adjust the affected versions in the BTS as needed. Regards, Salvatore