Name | CVE-2016-10243 |
Description | TeX Live allows remote attackers to execute arbitrary commands by leveraging inclusion of mpost in shell_escape_commands in the texmf.cnf config file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-847-1, DSA-3803-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
texlive-base (PTS) | buster | 2018.20190227-2 | fixed |
| bullseye | 2020.20210202-3 | fixed |
| bookworm | 2022.20230122-3 | fixed |
| sid, trixie | 2023.20231007-1 | fixed |
texlive-bin (PTS) | buster | 2018.20181218.49446-1 | vulnerable |
| buster (security) | 2018.20181218.49446-1+deb10u2 | vulnerable |
| bullseye (security), bullseye | 2020.20200327.54578-7+deb11u1 | fixed |
| bookworm | 2022.20220321.62855-5.1+deb12u1 | fixed |
| sid, trixie | 2023.20230311.66589-8 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/
http://www.tug.org/svn/texlive?view=revision&revision=42605