Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.
{
"binaries": [
{
"binary_name": "evince",
"binary_version": "3.18.2-1ubuntu4.6"
},
{
"binary_name": "evince-common",
"binary_version": "3.18.2-1ubuntu4.6"
},
{
"binary_name": "evince-gtk",
"binary_version": "3.18.2-1ubuntu4.6"
},
{
"binary_name": "gir1.2-evince-3.0",
"binary_version": "3.18.2-1ubuntu4.6"
},
{
"binary_name": "libevdocument3-4",
"binary_version": "3.18.2-1ubuntu4.6"
},
{
"binary_name": "libevince-dev",
"binary_version": "3.18.2-1ubuntu4.6"
},
{
"binary_name": "libevview3-3",
"binary_version": "3.18.2-1ubuntu4.6"
}
],
"priority_reason": "Remote code execution vulnerability with available exploit and demo video."
}
{
"binaries": [
{
"binary_name": "browser-plugin-evince",
"binary_version": "3.28.4-0ubuntu1.2"
},
{
"binary_name": "evince",
"binary_version": "3.28.4-0ubuntu1.2"
},
{
"binary_name": "evince-common",
"binary_version": "3.28.4-0ubuntu1.2"
},
{
"binary_name": "gir1.2-evince-3.0",
"binary_version": "3.28.4-0ubuntu1.2"
},
{
"binary_name": "libevdocument3-4",
"binary_version": "3.28.4-0ubuntu1.2"
},
{
"binary_name": "libevince-dev",
"binary_version": "3.28.4-0ubuntu1.2"
},
{
"binary_name": "libevview3-3",
"binary_version": "3.28.4-0ubuntu1.2"
}
],
"priority_reason": "Remote code execution vulnerability with available exploit and demo video."
}
{
"binaries": [
{
"binary_name": "atril",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "atril-common",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "gir1.2-atril",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "gir1.2-atrildocument-1.5.0",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "gir1.2-atrilview-1.5.0",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "libatrildocument-dev",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "libatrildocument3",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "libatrilview-dev",
"binary_version": "1.20.1-2ubuntu2+esm2"
},
{
"binary_name": "libatrilview3",
"binary_version": "1.20.1-2ubuntu2+esm2"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "Remote code execution vulnerability with available exploit and demo video."
}
{
"binaries": [
{
"binary_name": "atril",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "atril-common",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "gir1.2-atril",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "gir1.2-atrildocument-1.5.0",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "gir1.2-atrilview-1.5.0",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "libatrildocument-dev",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "libatrildocument3",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "libatrilview-dev",
"binary_version": "1.24.0-1ubuntu0.2"
},
{
"binary_name": "libatrilview3",
"binary_version": "1.24.0-1ubuntu0.2"
}
],
"availability": "No subscription required",
"priority_reason": "Remote code execution vulnerability with available exploit and demo video."
}
{
"binaries": [
{
"binary_name": "atril",
"binary_version": "1.26.0-1ubuntu1.2"
},
{
"binary_name": "atril-common",
"binary_version": "1.26.0-1ubuntu1.2"
},
{
"binary_name": "gir1.2-atrildocument-1.5.0",
"binary_version": "1.26.0-1ubuntu1.2"
},
{
"binary_name": "gir1.2-atrilview-1.5.0",
"binary_version": "1.26.0-1ubuntu1.2"
},
{
"binary_name": "libatrildocument-dev",
"binary_version": "1.26.0-1ubuntu1.2"
},
{
"binary_name": "libatrildocument3",
"binary_version": "1.26.0-1ubuntu1.2"
},
{
"binary_name": "libatrilview-dev",
"binary_version": "1.26.0-1ubuntu1.2"
},
{
"binary_name": "libatrilview3",
"binary_version": "1.26.0-1ubuntu1.2"
}
],
"availability": "No subscription required",
"priority_reason": "Remote code execution vulnerability with available exploit and demo video."
}