Kpathsea: User-assisted execution of arbitrary code — GLSA 201709-07

A vulnerability in Kpathsea allows remote attackers to execute arbitrary commands by manipulating the -tex option from mpost program.

Affected packages

dev-libs/kpathsea on all architectures
Affected versions < 6.2.2_p20160523
Unaffected versions >= 6.2.2_p20160523

Background

Kpathsea is a library to do path searching. It is used by TeX Live and others TeX related software.

Description

It was discovered that the mpost program from the shell_escape_commands list is capable of executing arbitrary external programs during the conversion of .tex files. The responsible function is runpopen() (texmfmp.c).

Impact

A remote attacker, by enticing a user to open a specially crafted .tex file, could possibly execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All Kpathsea users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=dev-libs/kpathsea-6.2.2_p20160523"
 

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.

References

Release date
September 17, 2017

Latest revision
September 17, 2017: 1

Severity
normal

Exploitable
remote

Bugzilla entries