Bug 1218806 (CVE-2023-51698) - VUL-0: CVE-2023-51698: atril: vulnerable to Command Injection Vulnerability
Summary: VUL-0: CVE-2023-51698: atril: vulnerable to Command Injection Vulnerability
Status: NEW
Alias: CVE-2023-51698
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Alexei Sorokin
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/391099/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-15 10:27 UTC by SMASH SMASH
Modified: 2024-01-15 11:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-01-15 10:27:49 UTC
Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-51698
https://www.cve.org/CVERecord?id=CVE-2023-51698
https://github.com/mate-desktop/atril/commit/ce41df6467521ff9fd4f16514ae7d6ebb62eb1ed
https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2
https://bugzilla.redhat.com/show_bug.cgi?id=2258391
Comment 1 Thomas Leroy 2024-01-15 10:30:33 UTC
Affected:
- openSUSE:Factory
- openSUSE:Backports:SLE-15-SP6
- openSUSE:Backports:SLE-15-SP5