SB2023052503 - Multiple vulnerabilities in TeX Live
Published: May 25, 2023 Updated: November 25, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) OS Command Injection (CVE-ID: CVE-2023-32700)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation when processing a TeX file, obtain from an untrusted source. A remote attacker can pass specially crafted file to the application and execute arbitrary OS commands on the target system.
2) Protection mechanism failure (CVE-ID: CVE-2023-32668)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to the application allows a document (compiled with the default settings) to make arbitrary network requests. A remote attacker can trick the victim into opening a specially crafted document and gain access to sensitive information.
Remediation
Install update from vendor's website.
References
- https://tug.org/pipermail/tex-live/2023-May/049188.html
- https://github.com/TeX-Live/texlive-source/releases/tag/build-svn66984
- https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/blob/b266ef076c96b382cd23a4c93204e247bb98626a/source/texk/web2c/luatexdir/ChangeLog#L1-L3
- https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0
- https://lists.debian.org/debian-lts-announce/2024/10/msg00032.html