CVE-2023-32668

LuaTeX before 1.17.0 allows a document (compiled with the default settings) to make arbitrary network requests. This occurs because full access to the socket library is permitted by default, as stated in the documentation. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:luatex_project:luatex:*:*:*:*:*:*:*:*
cpe:2.3:a:miktex:miktex:*:*:*:*:*:*:*:*
cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/blob/b266ef076c96b382cd23a4c93204e247bb98626a/source/texk/web2c/luatexdir/ChangeLog#L1-L3 - Release Notes () https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/blob/b266ef076c96b382cd23a4c93204e247bb98626a/source/texk/web2c/luatexdir/ChangeLog#L1-L3 - Release Notes
References () https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0 - Patch () https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0 - Patch
References () https://tug.org/pipermail/tex-live/2023-May/049188.html - Issue Tracking, Mailing List, Mitigation () https://tug.org/pipermail/tex-live/2023-May/049188.html - Issue Tracking, Mailing List, Mitigation
References () https://tug.org/~mseven/luatex.html#luasocket - Exploit, Vendor Advisory () https://tug.org/~mseven/luatex.html#luasocket - Exploit, Vendor Advisory

Information

Published : 2023-05-11 06:15

Updated : 2024-11-21 08:03


NVD link : CVE-2023-32668

Mitre link : CVE-2023-32668

CVE.ORG link : CVE-2023-32668


JSON object : View

Products Affected

tug

  • tex_live

miktex

  • miktex

luatex_project

  • luatex