CVE Vulnerabilities

CVE-2023-32700

Published: May 20, 2023 | Modified: Jan 31, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.8 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.

Affected Software

NameVendorStart VersionEnd Version
LuatexLuatex_project1.04 (including)1.16.2 (excluding)
MiktexMiktex2.9.6300 (including)23.5 (excluding)
Tex_liveTug2017 (including)2023 (excluding)
Red Hat Enterprise Linux 8RedHattexlive-7:20180414-29.el8_8*
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRedHattexlive-7:20180414-15.el8_1*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHattexlive-7:20180414-15.el8_2*
Red Hat Enterprise Linux 8.2 Telecommunications Update ServiceRedHattexlive-7:20180414-15.el8_2*
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionsRedHattexlive-7:20180414-15.el8_2*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHattexlive-7:20180414-21.el8_4*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHattexlive-7:20180414-21.el8_4*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHattexlive-7:20180414-21.el8_4*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHattexlive-7:20180414-26.el8_6*
Red Hat Enterprise Linux 9RedHattexlive-9:20200406-26.el9_2*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHattexlive-9:20200406-26.el9_0*
Texlive-binUbuntubionic*
Texlive-binUbuntuesm-infra/bionic*
Texlive-binUbuntuesm-infra/focal*
Texlive-binUbuntufocal*
Texlive-binUbuntujammy*
Texlive-binUbuntukinetic*
Texlive-binUbuntulunar*
Texlive-binUbuntutrusty*
Texlive-binUbuntuupstream*
Texlive-binUbuntuxenial*

References