MGASA-2024-0108

Source
https://advisories.mageia.org/MGASA-2024-0108.html
Import Source
https://advisories.mageia.org/MGASA-2024-0108.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0108
Related
Published
2024-04-05T18:24:25Z
Modified
2024-04-05T18:03:43Z
Summary
Updated texlive-20220321 packages fix security vulnerabilities
Details

LuaTeX before 1.17.0 allows a document (compiled with the default settings) to make arbitrary network requests. This occurs because full access to the socket library is permitted by default, as stated in the documentation. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5. (CVE-2023-32668) texlive-bin commit c515e was discovered to contain heap buffer overflow via the function ttfLoadHDMX:ttfdump. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted TTF file. (CVE-2024-25262)

References
Credits

Affected packages

Mageia:9 / texlive

Package

Name
texlive
Purl
pkg:rpm/mageia/texlive?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20220321-7.1.mga9

Ecosystem specific

{
    "section": "core"
}