Out-of-Bounds Affecting texlive-bin package, versions <2018.20180907.48586-2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-TEXLIVEBIN-526421
- published 23 Sep 2018
- disclosed 23 Sep 2018
Introduced: 23 Sep 2018
CVE-2018-17407 Open this link in a new tabHow to fix?
Upgrade Debian:11
texlive-bin
to version 2018.20180907.48586-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream texlive-bin
package and not the texlive-bin
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
References
- https://security-tracker.debian.org/tracker/CVE-2018-17407
- https://www.debian.org/security/2018/dsa-4299
- https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c
- https://lists.debian.org/debian-security-announce/2018/msg00230.html
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-17407
- https://usn.ubuntu.com/3788-1/
- https://usn.ubuntu.com/3788-2/