CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
40.5%
textlive is vulnerable to Arbitrary Code Execution. The vulnerability exits because the TeX file was not properly validated, which allowed an attacker to execute untrusted input into the system.
github.com/TeX-Live/texlive-source/releases/tag/build-svn66984
gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLY43MIRONJSJVNBDFQHQ26MP3JIOB3H/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TF6YXUUFRGBIXIIIEV5SGBJXXT2SMUK5/
lists.fedoraproject.org/archives/list/[email protected]/message/RLY43MIRONJSJVNBDFQHQ26MP3JIOB3H/
lists.fedoraproject.org/archives/list/[email protected]/message/TF6YXUUFRGBIXIIIEV5SGBJXXT2SMUK5/
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.18/community.yaml
tug.org/pipermail/tex-live/2023-May/049188.html
tug.org/~mseven/luatex.html