Lucene search

K
ubuntuUbuntuUSN-6695-1
HistoryMar 14, 2024 - 12:00 a.m.

TeX Live vulnerabilities

2024-03-1400:00:00
ubuntu.com
17
tex live
ubuntu
vulnerabilities
denial of service
network security
truetype fonts
cve-2019-18604
cve-2023-32668
cve-2024-25262

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.8%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • texlive-bin - Binaries for TeX Live

Details

It was discovered that TeX Live incorrectly handled certain memory
operations in the embedded axodraw2 tool. An attacker could possibly use
this issue to cause TeX Live to crash, resulting in a denial of service.
This issue only affected Ubuntu 20.04 LTS. (CVE-2019-18604)

It was discovered that TeX Live allowed documents to make arbitrary
network requests. If a user or automated system were tricked into opening a
specially crafted document, a remote attacker could possibly use this issue
to exfiltrate sensitive information, or perform other network-related
attacks. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2023-32668)

It was discovered that TeX Live incorrectly handled certain TrueType fonts.
If a user or automated system were tricked into opening a specially crafted
TrueType font, a remote attacker could use this issue to cause TeX Live to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2024-25262)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchtexlive-binaries< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibkpathsea-dev< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibkpathsea6< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibkpathsea6-dbgsym< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibptexenc-dev< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibptexenc1< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibptexenc1-dbgsym< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibsynctex-dev< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibsynctex2< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibsynctex2-dbgsym< 2023.20230311.66589-6ubuntu0.1UNKNOWN
Rows per page:
1-10 of 551

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.8%