Package: pandoc / 2.17.1.1-2~deb12u1
Metadata
Package | Version | Patches format |
---|---|---|
pandoc | 2.17.1.1-2~deb12u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
020220218~2a70d9c.patch | (download) |
pandoc.cabal |
4 2 + 2 - 0 ! |
require skylighting 0.12.3. |
020220531~9aff861.patch | (download) |
pandoc.cabal |
4 2 + 2 - 0 ! |
require skylighting 0.12.3.1 and update tests. |
020230620~5e381e3.patch | (download) |
src/Text/Pandoc/Class/IO.hs |
14 7 + 7 - 0 ! |
fix a security vulnerability in mediabag and t.p.class.io.writemedia This vulnerability, discovered by Entroy C, allows users to write arbitrary files to any location by feeding pandoc a specially crafted URL in an image element. The vulnerability is serious for anyone using pandoc to process untrusted input. The vulnerability does not affect pandoc when run with the `--sandbox` flag. |
020230623.1~54561e9.patch | (download) |
src/Text/Pandoc/Class/IO.hs |
2 1 + 1 - 0 ! |
fix bug in git commit 5e381e3 In the new code a comma mysteriously turned into a period. This would have prevented proper separation of the mime type and content in data uris. Thanks to @hseg for catching this. |
020230623.2~df4f13b.patch | (download) |
src/Text/Pandoc/Class/IO.hs |
6 3 + 3 - 0 ! |
more fixes to git commit 5e381e3 These changes recognize that parseURI does not unescape the path. . Another change is that the canonical form of the path used as the MediaBag key retains percent-encoding, if present; we only unescape the string when writing to a file. . Some tests are needed before the issue can be closed. |
020230623.3~fe62da6.patch | (download) |
pandoc.cabal |
2 2 + 0 - 0 ! |
add tests for fillmediabag/extractmedia |
020230623.4~5246f02.patch | (download) |
test/Tests/MediaBag.hs |
16 7 + 9 - 0 ! |
improve tests for fillmediabag/extractmedia Ensure that the current directory is not changed up if a test fails, and fix messages for the assertion failures. |
020230720~eddedbf.patch | (download) |
src/Text/Pandoc/Class/IO.hs |
2 2 + 0 - 0 ! |
ix new variant of the vulnerability in cve-2023-35936 Guilhem Moulin noticed that the fix to CVE-2023-35936 was incomplete. An attacker could get around it by double-encoding the malicious extension to create or override arbitrary files. . $ echo '' >b.md $ .cabal/bin/pandoc b.md --extract-media=bar <p><img src="bar/2a0eaa89f43fada3e6c577beea4f2f8f53ab6a1d.lua+%2f%2e%2e%2f%2e%2e%2fb%2elua" /></p> $ cat b.lua print "hello" $ find bar bar/ bar/2a0eaa89f43fada3e6c577beea4f2f8f53ab6a1d.lua+ . This commit adds a test case for this more complex attack and fixes the vulnerability. (The fix is quite simple: if the URL-unescaped filename or extension contains a '%', we just use the sha1 hash of the contents as the canonical name, just as we do if the filename contains '..'.) |
2001_templates_avoid_privacy_breach.patch | (download) |
data/dzslides/template.html |
9 3 + 6 - 0 ! |
avoid potential privacy breaches in templates |
2002_program_package_hint.patch | (download) |
src/Text/Pandoc/Error.hs |
2 1 + 1 - 0 ! |
improve error message when pdf program is missing |