Description
LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3427-1 | texlive-bin security update |
Debian DLA |
DLA-3427-2 | texlive-bin regression update |
Debian DLA |
DLA-3946-1 | context bugfix update |
Debian DSA |
DSA-5406-1 | texlive-bin security update |
EUVD |
EUVD-2023-36927 | LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5. |
Ubuntu USN |
USN-6115-1 | TeX Live vulnerability |
References
History
Fri, 31 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-31T15:30:02.807Z
Reserved: 2023-05-11T00:00:00.000Z
Link: CVE-2023-32700
Updated: 2024-08-02T15:25:36.342Z
Status : Modified
Published: 2023-05-20T18:15:09.370
Modified: 2025-01-31T16:15:29.803
Link: CVE-2023-32700
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN