Debian Patches

Status for editorconfig-core/0.12.1-1.1+deb11u1

Patch Description Author Forwarded Bugs Origin Last update
1001_fix_manpages.patch Fix errors in manpage generation document Man page generating document was using unescaped hyphen which was
fixed by this patch. There was also a spelling mistake which is fixed
by this patch.
Vasudev Kamath <kamathvasudev@gmail.com> no 2016-03-25
1002_reproducible_builds.patch Disable timestamp generation in doxygen If Doxyfile contains HTML_TIMESTAMP = YES, Doxygen will
add a timestamp to its generated documentation. To allow
reproducible builds this should be disabled.
Vasudev Kamath <kamathvasudev@gmail.com> no 2016-03-25
2001_fix_static_libname.patch Use the same name for static and shared library Upstream uses libeditorconfig_static.a for static library but
d-shlibmove expects both library to have same name. This patch
fixes it.
Vasudev Kamath <kamathvasudev@gmail.com> not-needed 2016-03-25
2002_fix_docs_directory.patch Fix the directory name where docs are installed Upstream installs docs to usr/share/doc/editorconfig but in Debian
we ship these docs as part of editorconfig-doc package. This patch
changes the directory name from editorconfig to editorconfig-doc.
Vasudev Kamath <kamathvasudev@gmail.com> not-needed 2016-03-25
CVE-2023-0341.patch commit 41281ea82fbf24b060a9f69b9c5369350fb0529e

Fix potential buffer overflow in ec_glob (#87)

CVE-2023-0341

Co-authored-by: David Fernandez Gonzalez <david.fernandezgonzalez@canonical.com>

===================================================================
Hong Xu <hong@topbug.net> no 2023-01-19
CVE-2024-53849-1.patch commit 4d5518a0a4e4910c37281ab13a048d0d86999782

Fix pointer overflow in STRING_CAT

The end pointer is positioned one past the end of the destination, and
it is undefined behavior to compute an address beyond the end pointer,
including for comparisons, even temporarily. The UB occurs exactly when
buffer overflow would have occurred, so the buffer overflow check could
be optimized away by compilers. Even if this wasn't the case, the check
could produce a false negative if the computed address overflowed the
address space, which is, after all, why the C standard doesn't define
behavior in the first place.

The fix is simple: Check using sizes, not addresses. The explicit cast
suppresses warnings about signed-unsigned comparisons, and the assertion
checks the cast.

===================================================================
Christopher Wellons <wellons@nullprogram.com> no 2024-02-17
CVE-2024-53849-2.patch commit fca7cf19e0fb800c2d38f173c1f69ad40bf2a2f5

Fix a few more stack buffer overflows

Several overflows may occur in switch case '[' when the input pattern
contains many escaped characters. The added backslashes leave too little
space in the output pattern when processing nested brackets such that
the remaining input length exceeds the output capacity. Therefore all
these concatenations must also be checked.

The ADD_CHAR was missed in 41281ea (#87). The switch can exit exactly at
capacity, leaving no room for the finishing '$', causing an overflow.

These overflows were discovered through fuzz testing with afl.

===================================================================
Christopher Wellons <wellons@nullprogram.com> no 2024-02-17

All known versions for source package 'editorconfig-core'

Links