Name | CVE-2023-32700 |
Description | LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3427-1, DSA-5406-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
texlive-bin (PTS) | bullseye | 2020.20200327.54578-7+deb11u1 | fixed |
| bullseye (security) | 2020.20200327.54578-7+deb11u2 | fixed |
| bookworm | 2022.20220321.62855-5.1+deb12u1 | fixed |
| sid, trixie | 2024.20240313.70630+ds-5 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://tug.org/~mseven/luatex.html
Introduced by: https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/commit/4d8b815d3b53ae72bce12b535d86bdce51834d50 (1.0.4)
Fixed by: https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/commit/5650c067de62cb7d4aaca44f30c8e9115c51bfc6 (1.17.0)
Fixed by: https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/commit/b8b71a256664d17a8b6c81481a835813c61aa661 (1.17.0)