Package: pandoc / 2.9.2.1-1+deb11u1
Metadata
Package | Version | Patches format |
---|---|---|
pandoc | 2.9.2.1-1+deb11u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
020200417~a9ef15b.patch | (download) |
pandoc.cabal |
72 41 + 31 - 0 ! |
revert dependency on base-noprelude |
2001_templates_avoid_privacy_breach.patch | (download) |
data/dzslides/template.html |
9 3 + 6 - 0 ! |
avoid potential privacy breaches in templates |
2002_program_package_hint.patch | (download) |
src/Text/Pandoc/Error.hs |
2 1 + 1 - 0 ! |
improve error message when pdf program is missing |
Adjust tests.patch | (download) |
pandoc.cabal |
4 2 + 2 - 0 ! |
use latest skylighting. This adds `aria-hidden="true"` to the empty a elements, which helps people who use screen readers. |
CVE 2023 35936.patch | (download) |
pandoc.cabal |
1 1 + 0 - 0 ! |
fix a security vulnerability in mediabag and T.P.Class.IO.writeMedia. This vulnerability, discovered by Entroy C, allows users to write arbitrary files to any location by feeding pandoc a specially crafted URL in an image element. The vulnerability is serious for anyone using pandoc to process untrusted input. |
CVE 2023 38745.patch | (download) |
src/Text/Pandoc/Class/PandocMonad.hs |
10 5 + 5 - 0 ! |
fix new variant of the vulnerability in cve-2023-35936. Guilhem Moulin noticed that the fix to CVE-2023-35936 was incomplete. An attacker could get around it by double-encoding the malicious extension to create or override arbitrary files. $ echo '' >b.md $ .cabal/bin/pandoc b.md --extract-media=bar <p><img src="bar/2a0eaa89f43fada3e6c577beea4f2f8f53ab6a1d.lua+%2f%2e%2e%2f%2e%2e%2fb%2elua" /></p> $ cat b.lua print "hello" $ find bar bar/ bar/2a0eaa89f43fada3e6c577beea4f2f8f53ab6a1d.lua+ This commit adds a test case for this more complex attack and fixes the vulnerability. |