ArchLinux: 201605-9: latex2rtf: arbitrary code execution
Summary
A format string vulnerability was found in the CmdKeywords() function, where the user-controlled variable 'keywords' is passed as a format argument to vnsprintf(), when processing the \keywords command in a TeX file.
Resolution
Upgrade to 2.3.10-1.
# pacman -Syu "latex2rtf>=2.3.10-1"
The problem has been fixed upstream in version 2.3.10.
References
https://www.openwall.com/lists/oss-security/2015/11/16/39 https://access.redhat.com/security/cve/CVE-2015-8106
Workaround
None.