Name | CVE-2016-10243 |
Description | TeX Live allows remote attackers to execute arbitrary commands by leveraging inclusion of mpost in shell_escape_commands in the texmf.cnf config file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-847-1, DSA-3803-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
texlive-base (PTS) | bullseye | 2020.20210202-3 | fixed |
| bookworm | 2022.20230122-3 | fixed |
| sid, trixie | 2024.20241115-1 | fixed |
texlive-bin (PTS) | bullseye | 2020.20200327.54578-7+deb11u1 | fixed |
| bullseye (security) | 2020.20200327.54578-7+deb11u2 | fixed |
| bookworm | 2022.20220321.62855-5.1+deb12u1 | fixed |
| sid, trixie | 2024.20240313.70630+ds-5 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/
http://www.tug.org/svn/texlive?view=revision&revision=42605