I am wondering if texlive-full is bearing any security issues? Why everybody does trust it? Are they checked by anybody?
Thanks for helping and educating me on this point :)
I am wondering if texlive-full is bearing any security issues? Why everybody does trust it? Are they checked by anybody?
Thanks for helping and educating me on this point :)
TeX Live consists of a relatively small number of executable items and a large number of 'other things', principally LaTeX packages, fonts and documentation (PDF files). The standard settings for the binary part of the set up are 'cautious' about potential security risks in the (La)TeX parts of the system, but these are likely to be more theoretical than actual. To the best of my knowledge there has not been an attempt to send to CTAN, and thus to TeX Live, a LaTeX package which deliberately tries to use \write18 to cause trouble. The number of people who would be affected is very small, and it's extremely unlikely that a self-replicating approach would be successful. The binary parts of the system are of course of more interest in this regard, but again there are not to my knowledge any actual issues (though see Is luatex as secure as pdftex? for discussion on the affect of Lua scripting on security).
All of that said, there is no-one checking each CTAN upload for security fixes, and the TeX Live team take most of their material more-or-less directly from CTAN. As such, if you are looking for some form of 'assurance' on the code then you will have to find a downstream group doing the work. That I know of, Ubuntu do not do this, although you might be better asking on an Ubunut-specific site about that. Perhaps other operating system teams (most obviously OpenBSD) might do such work if they are very security-focussed, but again that is more about those systems than about TeX.
If you are paranoid enough, then you could download the complete source code, read it and the compile it yourself.
However, due to the fact, that most users are not computer scientists, we have to trust the developers of all software we use. In fact we have to trust the manufacturers of everything we do not build/program/make ourselves.
However, open source software provides you and the rest of the world with the source codes. So, the general idea is, that if there was any flaw in the software, it will be noticed and reported by somebody. With closed source software, there is no such thing.
You can always go minimalist and install only the packages you really need. Then you avoid having packages on your machine that you don't ever use.
– Dohn Joe Sep 23 '13 at 11:44texlive-full is? It is a meta package, that just instructs Ubuntu (and similar) so install a long list of texlive- packages. So asling whether texlive-full has any malware does not make sense.
– daleif
Sep 23 '13 at 11:45
.deb and see for your self. I just did.
– daleif
Sep 23 '13 at 11:59
texlive-full but is more up to date. That probably applies to many other people active here, but that doesn't mean it's general for all TeX users. Most of the binaries are in a small number of packages: almost all of the TeX code is from CTAN, and that I know of there has not been a security-related dodgy uploaded in the time I've used TeX (~ 10 years).
– Joseph Wright
Sep 23 '13 at 12:07
.deb packages being produced. Some volunteers maintain the .deb packages. And yes, you have to trust them. In the same way as you will have to trust all the other providers of the software you use.
– daleif
Sep 23 '13 at 12:58
sudo apt-get ... something from universe, is a lot safer than the human errors being made by users using sudo trying to follow something on a page they found on google.
– daleif
Sep 23 '13 at 12:59
-shell-escape, which allows TeX to start its own sub-shell and do 'extra' things. (And in fact, all the packages which require it that I've used are legit and not harmful.) But if you like to be super-safe, follow @NicolaTalbot's advice (above). Otherwise, the default TeX Live security settings for reading and writing to files is sensible and sane and (definitely) followed in the Debian versions.
– jon
Sep 23 '13 at 13:11
.dll files with predictable results.)
– jon
Sep 23 '13 at 13:14
note that everything in tex live comes from ctan, one way or another.
there have, in my time as a ctan manager, been two notifications of virus "detection" on ctan. the first, back in the '90s, complained about a file whose name matched some known virus at the time; its contents were of course, entirely harmless.
the second was more recent, but again proved a false alarm.
i have heard that at least some people run virus scanners over a copy of the ctan stuff; those people don't report any issues to us.
in my opinion, there is no more than a minuscule chance of problems with tex code from ctan, provided that you're careful with any use of \write 18 to get data from outside tex. i've never heard of any problem reports, even from that (admittedly dodgy) facility.
I believe the vast majority of TeX Live is devoted to fonts and macro packages. These are passive files that do not do anything and cannot be "run" and are therefore safe. There are a small number of executable binary files (e.g., pdflatex) and scripts (latexdiff) that are intended to do things and therefore can pose security risks. From this question of mine, I believe the binaries are built from source by the TeX Live team. This means that there is the additional chance that a malicious CTAN contribution that requires compiling will be caught by the CTAN team. All bets are off for scripts on the other hand. You should be wary when running esoteric scripts and binaries.
For packages, it is possible that a LaTeX file could load a package such that when compiled by pdflatex that it acts as malware. Running a new version of pdflatex, where \openout is sandboxed, without shell-escape enabled should reduce these risks. Again, for esoteric packages, you should take a look at what it does.
texlive package is perfectly safe. Running any of the binaries or scripts, on the other hand, has the potential for bad things to happen.
– StrongBad
Sep 23 '13 at 13:35
texlive-full. In many cases, Linux users will not be using the TL provided by their Linux, since it is not updated at a good enough pace. That being said, I'm not aware of any security problems. There was an article a few years ago. But those problems was mostly MikTeX related (fixed in a week) and the other issues are deemed academic. – daleif Sep 23 '13 at 11:27\write18to execute harmful code you can runtexwith-no-shell-escape– Nicola Talbot Sep 23 '13 at 12:03\write18, and easily checked intexmf.cnffor the paranoid. – Joseph Wright Sep 23 '13 at 12:04sharemethod, of course one can see them inLinkedQ's list irrespective of any format pasted. – texenthusiast Sep 24 '13 at 03:11