GNU TeXmacs: Privilege escalation
Gentoo Linux Security Advisory
||GLSA 201401-27 / texmacs
||January 26, 2014
||January 26, 2014: 2
All supported architectures
A vulnerability in GNU TeXmacs could result in privilege
GNU TeXmacs is a free WYSIWYG editing platform with special features for
The texmacs and tm_mupad_help scripts in TeXmacs place a zero-length
directory name in the LD_LIBRARY_PATH, which might result in the current
working directory (.) to be included when searching for dynamically
A local attacker could gain escalated privileges via a specially crafted
There is no known workaround at this time.
All GNU TeXmacs users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/texmacs-18.104.22.168-r1"
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since April 02, 2011. It is likely that your system is already
no longer affected by this issue.