Name | CVE-2023-32700 |
Description | LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
References | DLA-3427-1, DSA-5406-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
texlive-bin (PTS) | buster | 2018.20181218.49446-1 | vulnerable |
buster (security) | 2018.20181218.49446-1+deb10u2 | fixed | |
bullseye | 2020.20200327.54578-7 | vulnerable | |
bullseye (security) | 2020.20200327.54578-7+deb11u1 | fixed | |
bookworm, sid | 2022.20220321.62855-5.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
texlive-bin | source | buster | 2018.20181218.49446-1+deb10u1 | DLA-3427-1 | ||
texlive-bin | source | bullseye | 2020.20200327.54578-7+deb11u1 | DSA-5406-1 | ||
texlive-bin | source | (unstable) | 2022.20220321.62855-5.1 |
https://tug.org/~mseven/luatex.html
Introduced by: https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/commit/4d8b815d3b53ae72bce12b535d86bdce51834d50 (1.0.4)
Fixed by: https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/commit/5650c067de62cb7d4aaca44f30c8e9115c51bfc6 (1.17.0)
Fixed by: https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/commit/b8b71a256664d17a8b6c81481a835813c61aa661 (1.17.0)