Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.
{ "priority_reason": "Remote code execution vulnerability with available exploit and demo video.", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "atril" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "atril-common" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "atril-dbgsym" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "gir1.2-atril" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "gir1.2-atrildocument-1.5.0" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "gir1.2-atrilview-1.5.0" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "libatrildocument-dev" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "libatrildocument3" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "libatrildocument3-dbgsym" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "libatrilview-dev" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "libatrilview3" }, { "binary_version": "1.20.1-2ubuntu2+esm2", "binary_name": "libatrilview3-dbgsym" } ] }
{ "priority_reason": "Remote code execution vulnerability with available exploit and demo video.", "availability": "No subscription required", "binaries": [ { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "atril" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "atril-common" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "atril-dbgsym" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "gir1.2-atril" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "gir1.2-atrildocument-1.5.0" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "gir1.2-atrilview-1.5.0" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "libatrildocument-dev" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "libatrildocument3" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "libatrildocument3-dbgsym" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "libatrilview-dev" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "libatrilview3" }, { "binary_version": "1.24.0-1ubuntu0.2", "binary_name": "libatrilview3-dbgsym" } ] }
{ "priority_reason": "Remote code execution vulnerability with available exploit and demo video.", "availability": "No subscription required", "binaries": [ { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "atril" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "atril-common" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "atril-dbgsym" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "gir1.2-atrildocument-1.5.0" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "gir1.2-atrilview-1.5.0" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "libatrildocument-dev" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "libatrildocument3" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "libatrildocument3-dbgsym" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "libatrilview-dev" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "libatrilview3" }, { "binary_version": "1.26.0-1ubuntu1.2", "binary_name": "libatrilview3-dbgsym" } ] }