Search for packages
purl | pkg:deb/debian/atril@1.24.0-1%2Bdeb11u1 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-ayxt-x1mc-aaas | Atril Document Viewer is the default document reader of the MATE desktop environment for Linux. A path traversal and arbitrary file write vulnerability exists in versions of Atril prior to 1.26.2. This vulnerability is capable of writing arbitrary files anywhere on the filesystem to which the user opening a crafted document has access. The only limitation is that this vulnerability cannot be exploited to overwrite existing files, but that doesn't stop an attacker from achieving Remote Command Execution on the target system. Version 1.26.2 of Atril contains a patch for this vulnerability. |
CVE-2023-52076
|
VCID-g4dd-e3cb-aaaj | The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files. |
CVE-2019-11459
|
VCID-jrm1-d798-aaam | Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6. |
CVE-2023-51698
|
VCID-jt91-yd9q-aaab | Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail. |
CVE-2019-1010006
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-21T05:07:28.932704+00:00 | Debian Importer | Fixing | VCID-ayxt-x1mc-aaas | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T04:21:20.880419+00:00 | Debian Oval Importer | Fixing | VCID-jt91-yd9q-aaab | None | 36.1.3 |
2025-06-21T02:40:14.268665+00:00 | Debian Oval Importer | Fixing | VCID-g4dd-e3cb-aaaj | None | 36.1.3 |
2025-06-20T22:17:40.729224+00:00 | Debian Importer | Fixing | VCID-jrm1-d798-aaam | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-08T11:56:16.291487+00:00 | Debian Oval Importer | Fixing | VCID-jt91-yd9q-aaab | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-07T21:57:29.040094+00:00 | Debian Oval Importer | Fixing | VCID-jt91-yd9q-aaab | None | 36.1.0 |
2025-06-07T20:05:13.555077+00:00 | Debian Oval Importer | Fixing | VCID-g4dd-e3cb-aaaj | None | 36.1.0 |
2025-04-13T00:51:44.308499+00:00 | Debian Oval Importer | Fixing | VCID-jrm1-d798-aaam | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-13T00:51:25.798025+00:00 | Debian Oval Importer | Fixing | VCID-ayxt-x1mc-aaas | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-12T23:59:46.714201+00:00 | Debian Oval Importer | Fixing | VCID-ayxt-x1mc-aaas | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T23:59:16.337157+00:00 | Debian Oval Importer | Fixing | VCID-jrm1-d798-aaam | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T19:27:47.922132+00:00 | Debian Oval Importer | Fixing | VCID-g4dd-e3cb-aaaj | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T17:41:25.201563+00:00 | Debian Oval Importer | Fixing | VCID-jt91-yd9q-aaab | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-07T20:28:07.344127+00:00 | Debian Oval Importer | Fixing | VCID-jt91-yd9q-aaab | None | 36.0.0 |
2025-04-07T18:42:30.529365+00:00 | Debian Oval Importer | Fixing | VCID-g4dd-e3cb-aaaj | None | 36.0.0 |
2025-04-04T07:56:48.405420+00:00 | Debian Importer | Fixing | VCID-ayxt-x1mc-aaas | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-04T00:56:08.019076+00:00 | Debian Importer | Fixing | VCID-jrm1-d798-aaam | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-02-21T15:07:55.365752+00:00 | Debian Importer | Fixing | VCID-ayxt-x1mc-aaas | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-21T15:03:38.251126+00:00 | Debian Importer | Fixing | VCID-jrm1-d798-aaam | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2024-05-20T15:11:50.328521+00:00 | Debian Importer | Fixing | VCID-ayxt-x1mc-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-05-20T15:09:17.549917+00:00 | Debian Importer | Fixing | VCID-jrm1-d798-aaam | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |