MGASA-2024-0224

Source
https://advisories.mageia.org/MGASA-2024-0224.html
Import Source
https://advisories.mageia.org/MGASA-2024-0224.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0224
Related
Published
2024-06-15T23:07:50Z
Modified
2024-06-15T22:48:02Z
Summary
Updated atril packages fix security vulnerability
Details

Atril Document Viewer is the default document reader of the MATE desktop environment for Linux. A path traversal and arbitrary file write vulnerability exists in versions of Atril prior to 1.26.2. This vulnerability is capable of writing arbitrary files anywhere on the filesystem to which the user opening a crafted document has access. The only limitation is that this vulnerability cannot be exploited to overwrite existing files, but that doesn't stop an attacker from achieving Remote Command Execution on the target system. (CVE-2023-52076)

References
Credits

Affected packages

Mageia:9 / atril

Package

Name
atril
Purl
pkg:rpm/mageia/atril?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.26.1-1.1.mga9

Ecosystem specific

{
    "section": "core"
}