==========================================================================
Ubuntu Security Notice USN-3351-1
July 13, 2017
evince vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Evince could be made run programs as your login if it opened a
specially crafted file.
Software Description:
– evince: Document viewer
Details:
Felix Wilhelm discovered that Evince did not safely invoke tar when
handling tar comic book (cbt) files. An attacker could use this to
construct a malicious cbt comic book format file that, when opened
in Evince, executes arbitrary code. Please note that this update
disables support for cbt files in Evince.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
evince 3.24.0-0ubuntu1.1
evince-common 3.24.0-0ubuntu1.1
Ubuntu 16.10:
evince 3.22.0-0ubuntu1.1
evince-common 3.22.0-0ubuntu1.1
Ubuntu 16.04 LTS:
evince 3.18.2-1ubuntu4.1
evince-common 3.18.2-1ubuntu4.1
Ubuntu 14.04 LTS:
evince 3.10.3-0ubuntu10.3
evince-common 3.10.3-0ubuntu10.3
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3351-1
CVE-2017-1000083
Package Information:
https://launchpad.net/ubuntu/+source/evince/3.24.0-0ubuntu1.1
https://launchpad.net/ubuntu/+source/evince/3.22.0-0ubuntu1.1
https://launchpad.net/ubuntu/+source/evince/3.18.2-1ubuntu4.1
https://launchpad.net/ubuntu/+source/evince/3.10.3-0ubuntu10.3
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=nriD
—–END PGP SIGNATURE—–
—