Debian Bug report logs -
#1036470
texlive-bin: CVE-2023-32668
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>
:
Bug#1036470
; Package src:texlive-bin
.
(Sun, 21 May 2023 19:09:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>
.
(Sun, 21 May 2023 19:09:07 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: texlive-bin
Version: 2022.20220321.62855-5
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Hi,
The following vulnerability was published for texlive-bin.
CVE-2023-32668[0]:
| LuaTeX before 1.17.0 allows a document (compiled with the default
| settings) to make arbitrary network requests. This occurs because full
| access to the socket library is permitted by default, as stated in the
| documentation. This also affects TeX Live before 2023 r66984 and
| MiKTeX before 23.5.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-32668
https://www.cve.org/CVERecord?id=CVE-2023-32668
[1] https://tug.org/pipermail/tex-live/2023-May/049188.html
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>
:
Bug#1036470
; Package src:texlive-bin
.
(Sun, 21 May 2023 19:57:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Preuße, Hilmar <hille42@web.de>
:
Extra info received and forwarded to list. Copy sent to Debian TeX Task Force <debian-tex-maint@lists.debian.org>
.
(Sun, 21 May 2023 19:57:02 GMT) (full text, mbox, link).
Message #10 received at 1036470@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On 21.05.2023 21:06, Salvatore Bonaccorso wrote:
Hello Salvatore,
> The following vulnerability was published for texlive-bin.
>
> CVE-2023-32668[0]:
> | LuaTeX before 1.17.0 allows a document (compiled with the default
> | settings) to make arbitrary network requests. This occurs because full
> | access to the socket library is permitted by default, as stated in the
> | documentation. This also affects TeX Live before 2023 r66984 and
> | MiKTeX before 23.5.
>
I updated to luatex 1.17.0 already in the TeX Live binaries for TL 2023
in commit 5348a805847c038d92c80a9b208da48dc527decd, the needed adaptions
for Context were made, but all that needs to be tested.
Is that sufficient or do we need to fix all this in bookworm / bullseye too?
Hilmar
--
sigfault
[OpenPGP_0x0C871C4C653C1F59.asc (application/pgp-keys, attachment)]
[OpenPGP_signature (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>
:
Bug#1036470
; Package src:texlive-bin
.
(Mon, 22 May 2023 04:27:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Debian TeX Task Force <debian-tex-maint@lists.debian.org>
.
(Mon, 22 May 2023 04:27:02 GMT) (full text, mbox, link).
Message #15 received at 1036470@bugs.debian.org (full text, mbox, reply):
Hi Hilmar!
On Sun, May 21, 2023 at 09:54:30PM +0200, Preuße, Hilmar wrote:
> On 21.05.2023 21:06, Salvatore Bonaccorso wrote:
>
> Hello Salvatore,
>
> > The following vulnerability was published for texlive-bin.
> >
> > CVE-2023-32668[0]:
> > | LuaTeX before 1.17.0 allows a document (compiled with the default
> > | settings) to make arbitrary network requests. This occurs because full
> > | access to the socket library is permitted by default, as stated in the
> > | documentation. This also affects TeX Live before 2023 r66984 and
> > | MiKTeX before 23.5.
> >
>
> I updated to luatex 1.17.0 already in the TeX Live binaries for TL 2023 in
> commit 5348a805847c038d92c80a9b208da48dc527decd, the needed adaptions for
> Context were made, but all that needs to be tested.
>
> Is that sufficient or do we need to fix all this in bookworm / bullseye too?
Correct, I think this is the correct way to address it for trixie. For
bookworm and bullseye, the impact is low enough that we can either
think of including the fix in a point release or ignore it. When
looking at it it was unclear to me apart ConTeXt, if any other reverse
depndencies might be impacted. According to
https://tug.org/~mseven/luatex.html#luasocket at least ConTeXt might
need change for the default change behviour with the new flag.
Thanks for taking care of this.
Regards,
Salvatore
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Mon May 22 13:14:04 2023;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.