CVE-2016-10243

NameCVE-2016-10243
DescriptionTeX Live allows remote attackers to execute arbitrary commands by leveraging inclusion of mpost in shell_escape_commands in the texmf.cnf config file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-847-1, DSA-3803-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
texlive-base (PTS)bullseye2020.20210202-3fixed
bookworm2022.20230122-3fixed
sid, trixie2024.20240829-2fixed
texlive-bin (PTS)bullseye (security), bullseye2020.20200327.54578-7+deb11u1fixed
bookworm2022.20220321.62855-5.1+deb12u1fixed
sid, trixie2024.20240313.70630+ds-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
texlive-basesourcewheezy2012.20120611-5+deb7u1DLA-847-1
texlive-basesourcejessie2014.20141024-2+deb8u1DSA-3803-1
texlive-basesource(unstable)2016.20161130-1
texlive-binsource(unstable)2019.20190605.51237-2unimportant

Notes

https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/
http://www.tug.org/svn/texlive?view=revision&revision=42605

Search for package or bug name: Reporting problems