[Bug 220713] security/vuxml: Document security vulnerability in evince and atril (CVE-2017-1000083)
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Thu Jul 13 18:22:36 UTC 2017
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220713
Bug ID: 220713
Summary: security/vuxml: Document security vulnerability in
evince and atril (CVE-2017-1000083)
Product: Ports & Packages
Version: Latest
Hardware: Any
URL: https://bugzilla.gnome.org/show_bug.cgi?id=784630
OS: Any
Status: New
Keywords: patch, security
Severity: Affects Some People
Priority: ---
Component: Individual Port(s)
Assignee: ports-secteam at FreeBSD.org
Reporter: vlad-fbsd at acheronmedia.com
CC: gnome at FreeBSD.org
Flags: maintainer-feedback?(ports-secteam at FreeBSD.org)
Assignee: ports-secteam at FreeBSD.org
Created attachment 184333
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=184333&action=edit
Document CVE-2017-1000083 (evince)
The comic book backend in evince 3.24.0 (and earlier) is vulnerable to a
command injection bug that can be used to execute arbitrary commands when a cbt
file is opened.
The evince port in FreeBSD builds with Comic book archives support enabled by
default (COMICS=on).
* Upstream bug report with details:
https://bugzilla.gnome.org/show_bug.cgi?id=784630
While the report itself only mentions version 3.24.0, the patch has been
backported to earlier versions, and Debian has issued a DSA for all its
supported versions, so I'm assuming everything up to and including 3.24.0 is
vulnerable to this:
* https://security-tracker.debian.org/tracker/CVE-2017-1000083
Also affected is graphics/atril, fork of Evince for MATE desktop, I'm assuming
up to and including 1.19.0:
* https://github.com/mate-desktop/atril/issues/257
Attached is a patch for vuxml.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list