texlive-bin: CVE-2023-32668

Related Vulnerabilities: CVE-2023-32668  

Debian Bug report logs - #1036470
texlive-bin: CVE-2023-32668

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 21 May 2023 19:09:05 UTC

Severity: important

Tags: security, upstream

Found in version texlive-bin/2022.20220321.62855-5

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>:
Bug#1036470; Package src:texlive-bin. (Sun, 21 May 2023 19:09:07 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>. (Sun, 21 May 2023 19:09:07 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: texlive-bin: CVE-2023-32668
Date: Sun, 21 May 2023 21:06:55 +0200
Source: texlive-bin
Version: 2022.20220321.62855-5
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for texlive-bin.

CVE-2023-32668[0]:
| LuaTeX before 1.17.0 allows a document (compiled with the default
| settings) to make arbitrary network requests. This occurs because full
| access to the socket library is permitted by default, as stated in the
| documentation. This also affects TeX Live before 2023 r66984 and
| MiKTeX before 23.5.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-32668
    https://www.cve.org/CVERecord?id=CVE-2023-32668
[1] https://tug.org/pipermail/tex-live/2023-May/049188.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>:
Bug#1036470; Package src:texlive-bin. (Sun, 21 May 2023 19:57:02 GMT) (full text, mbox, link).


Acknowledgement sent to Preuße, Hilmar <hille42@web.de>:
Extra info received and forwarded to list. Copy sent to Debian TeX Task Force <debian-tex-maint@lists.debian.org>. (Sun, 21 May 2023 19:57:02 GMT) (full text, mbox, link).


Message #10 received at 1036470@bugs.debian.org (full text, mbox, reply):

From: Preuße, Hilmar <hille42@web.de>
To: Salvatore Bonaccorso <carnil@debian.org>
Cc: 1036470@bugs.debian.org
Subject: Re: Bug#1036470: texlive-bin: CVE-2023-32668
Date: Sun, 21 May 2023 21:54:30 +0200
[Message part 1 (text/plain, inline)]
On 21.05.2023 21:06, Salvatore Bonaccorso wrote:

Hello Salvatore,

> The following vulnerability was published for texlive-bin.
> 
> CVE-2023-32668[0]:
> | LuaTeX before 1.17.0 allows a document (compiled with the default
> | settings) to make arbitrary network requests. This occurs because full
> | access to the socket library is permitted by default, as stated in the
> | documentation. This also affects TeX Live before 2023 r66984 and
> | MiKTeX before 23.5.
> 

I updated to luatex 1.17.0 already in the TeX Live binaries for TL 2023 
in commit 5348a805847c038d92c80a9b208da48dc527decd, the needed adaptions 
for Context were made, but all that needs to be tested.

Is that sufficient or do we need to fix all this in bookworm / bullseye too?

Hilmar
-- 
sigfault

[OpenPGP_0x0C871C4C653C1F59.asc (application/pgp-keys, attachment)]
[OpenPGP_signature (application/pgp-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian TeX Task Force <debian-tex-maint@lists.debian.org>:
Bug#1036470; Package src:texlive-bin. (Mon, 22 May 2023 04:27:02 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian TeX Task Force <debian-tex-maint@lists.debian.org>. (Mon, 22 May 2023 04:27:02 GMT) (full text, mbox, link).


Message #15 received at 1036470@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Preuße, Hilmar <hille42@web.de>
Cc: 1036470@bugs.debian.org
Subject: Re: Bug#1036470: texlive-bin: CVE-2023-32668
Date: Mon, 22 May 2023 06:23:30 +0200
Hi Hilmar!

On Sun, May 21, 2023 at 09:54:30PM +0200, Preuße, Hilmar wrote:
> On 21.05.2023 21:06, Salvatore Bonaccorso wrote:
> 
> Hello Salvatore,
> 
> > The following vulnerability was published for texlive-bin.
> > 
> > CVE-2023-32668[0]:
> > | LuaTeX before 1.17.0 allows a document (compiled with the default
> > | settings) to make arbitrary network requests. This occurs because full
> > | access to the socket library is permitted by default, as stated in the
> > | documentation. This also affects TeX Live before 2023 r66984 and
> > | MiKTeX before 23.5.
> > 
> 
> I updated to luatex 1.17.0 already in the TeX Live binaries for TL 2023 in
> commit 5348a805847c038d92c80a9b208da48dc527decd, the needed adaptions for
> Context were made, but all that needs to be tested.
> 
> Is that sufficient or do we need to fix all this in bookworm / bullseye too?

Correct, I think this is the correct way to address it for trixie. For
bookworm and bullseye, the impact is low enough that we can either
think of including the fix in a point release or ignore it. When
looking at it it was unclear to me apart ConTeXt, if any other reverse
depndencies might be impacted. According to
https://tug.org/~mseven/luatex.html#luasocket at least ConTeXt might
need change for the default change behviour with the new flag.

Thanks for taking care of this.

Regards,
Salvatore



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon May 22 13:14:04 2023; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.