Debian Package Tracker
Register | Log in
Subscribe

mathtex

Generate image from LaTeX command

Choose email to subscribe with

general
  • source: mathtex (main)
  • version: 1.03-1.1
  • maintainer: Johan Henriksson (DMD)
  • arch: any
  • std-ver: 3.8.0
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.03-1
  • oldstable: 1.03-1
  • stable: 1.03-1.1
versioned links
  • 1.03-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.03-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • mathtex
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
5 security issues in trixie high

There are 5 open security issues in trixie.

5 important issues:
  • CVE-2023-51885: Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via the length of the LaTeX string component.
  • CVE-2023-51886: Buffer Overflow vulnerability in the main() function in Mathtex 1.05 and before allows a remote attacker to cause a denial of service when using \convertpath.
  • CVE-2023-51887: Command Injection vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in application URL.
  • CVE-2023-51888: Buffer Overflow vulnerability in the nomath() function in Mathtex v.1.05 and before allows a remote attacker to cause a denial of service via a crafted string in the application URL.
  • CVE-2023-51889: Stack Overflow vulnerability in the validate() function in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in the application URL.
Created: 2024-01-24 Last update: 2024-11-11 23:30
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2023-51885: Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via the length of the LaTeX string component.
  • CVE-2023-51886: Buffer Overflow vulnerability in the main() function in Mathtex 1.05 and before allows a remote attacker to cause a denial of service when using \convertpath.
  • CVE-2023-51887: Command Injection vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in application URL.
  • CVE-2023-51888: Buffer Overflow vulnerability in the nomath() function in Mathtex v.1.05 and before allows a remote attacker to cause a denial of service via a crafted string in the application URL.
  • CVE-2023-51889: Stack Overflow vulnerability in the validate() function in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in the application URL.
Created: 2024-01-24 Last update: 2024-08-15 08:30
5 low-priority security issues in bookworm low

There are 5 open security issues in bookworm.

5 issues left for the package maintainer to handle:
  • CVE-2023-51885: (needs triaging) Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via the length of the LaTeX string component.
  • CVE-2023-51886: (needs triaging) Buffer Overflow vulnerability in the main() function in Mathtex 1.05 and before allows a remote attacker to cause a denial of service when using \convertpath.
  • CVE-2023-51887: (needs triaging) Command Injection vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in application URL.
  • CVE-2023-51888: (needs triaging) Buffer Overflow vulnerability in the nomath() function in Mathtex v.1.05 and before allows a remote attacker to cause a denial of service via a crafted string in the application URL.
  • CVE-2023-51889: (needs triaging) Stack Overflow vulnerability in the validate() function in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in the application URL.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-01-24 Last update: 2025-02-27 05:02
news
[rss feed]
  • [2024-11-12] mathtex REMOVED from testing (Debian testing watch)
  • [2024-05-09] mathtex 1.03-3 MIGRATED to testing (Debian testing watch)
  • [2024-05-04] Accepted mathtex 1.03-3 (source) into unstable (Petter Reinholdtsen)
  • [2023-08-22] mathtex 1.03-2 MIGRATED to testing (Debian testing watch)
  • [2023-08-17] Accepted mathtex 1.03-2 (source) into unstable (Bastian Germann) (signed by: bage@debian.org)
  • [2022-04-09] mathtex 1.03-1.1 MIGRATED to testing (Debian testing watch)
  • [2022-04-03] Accepted mathtex 1.03-1.1 (source) into unstable (Marcos Talau) (signed by: Joao Eriberto Mota Filho)
  • [2021-12-29] mathtex REMOVED from testing (Debian testing watch)
  • [2009-12-12] mathtex 1.03-1 MIGRATED to testing (Debian testing watch)
  • [2009-12-02] mathtex REMOVED from testing (Debian testing watch)
  • [2009-12-02] Accepted mathtex 1.03-1 (source i386) (Johan Henriksson)
  • [2009-03-18] mathtex 1.01-1 MIGRATED to testing (Debian testing watch)
  • [2009-03-07] Accepted mathtex 1.01-1 (source i386) (Johan Henriksson)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing