From e4433528106cfb856d60221c13a832e88dec06b5 Mon Sep 17 00:00:00 2001 From: Tristan Cacqueray Date: Tue, 22 Aug 2023 21:01:41 +0000 Subject: [PATCH] Assign HSEC id --- .../hackage/pandoc/{HSEC-0000-0000.md => HSEC-2023-0014.md} | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) rename advisories/hackage/pandoc/{HSEC-0000-0000.md => HSEC-2023-0014.md} (96%) diff --git a/advisories/hackage/pandoc/HSEC-0000-0000.md b/advisories/hackage/pandoc/HSEC-2023-0014.md similarity index 96% rename from advisories/hackage/pandoc/HSEC-0000-0000.md rename to advisories/hackage/pandoc/HSEC-2023-0014.md index 286076e7..4fe6be14 100644 --- a/advisories/hackage/pandoc/HSEC-0000-0000.md +++ b/advisories/hackage/pandoc/HSEC-2023-0014.md @@ -1,7 +1,6 @@ ```toml [advisory] -id = "HSEC-0000-0000" -date = 2021-01-31 +id = "HSEC-2023-0014" keywords = ["file write"] aliases = ["CVE-2023-35936", "GHSA-xj5q-fv23-575g"] cwe = [20] @@ -26,4 +25,3 @@ Pandoc is susceptible to an arbitrary file write vulnerability, which can be tri This vulnerability only affects systems that (a) pass untrusted user input to pandoc and (b) allow pandoc to be used to produce a PDF or with the --extract-media option. The vulnerability is patched in pandoc 3.1.4. -