• Patch apply failed for curl 7.74 buster

    From Avinash Roy@21:1/5 to All on Fri Feb 10 10:30:02 2023
    Hello All,

    I was trying to apply the patch curl_7.74.0-1.3+deb11u5.debian.tar.xz and
    got the below issue. How could I fix these?


    Applying: CVE-2021-22898.patch
    Applying: CVE-2021-22945.patch
    Applying: CVE-2021-22946.patch curl-7.74.0/../debian/patches//CVE-2021-22946.patch:193: trailing
    whitespace.
    A001 CAPABILITY
    curl-7.74.0/../debian/patches//CVE-2021-22946.patch:252: trailing
    whitespace.
    CAPA
    curl-7.74.0/../debian/patches//CVE-2021-22946.patch:309: trailing
    whitespace.
    AUTH SSL
    curl-7.74.0/../debian/patches//CVE-2021-22946.patch:310: trailing
    whitespace.
    AUTH TLS
    warning: 4 lines add whitespace errors.
    Applying: CVE-2021-22947.patch
    Applying: CVE-2021-22924.patch
    Applying: CVE-2022-22576.patch
    Applying: CVE-2022-27775.patch
    Applying: CVE-2022-27776.patch
    Applying: CVE-2022-27781.patch
    Applying: CVE-2022-27782_part1.patch
    Applying: CVE-2022-27782_part2.patch
    Applying: CVE-2022-32205.patch
    Applying: CVE-2022-32206.patch
    Applying: CVE-2022-32207.patch
    Applying: CVE-2022-32208.patch
    Applying: CVE-2022-27774_1_of_4.patch
    Applying: CVE-2022-27774_2_of_4.patch
    Applying: CVE-2022-27774_3_of_4.patch
    error: patch failed: curl-7.74.0/tests/data/Makefile.inc:114
    error: curl-7.74.0/tests/data/Makefile.inc: patch does not apply
    Applying: CVE-2022-27774_4_of_4.patch
    error: patch failed: curl-7.74.0/lib/http.c:752
    error: curl-7.74.0/lib/http.c: patch does not apply
    error: patch failed: curl-7.74.0/lib/vtls/openssl.c:2857
    error: curl-7.74.0/lib/vtls/openssl.c: patch does not apply
    Applying: cookie-reject-cookies-with-control-bytes.patch
    Applying: test8-verify-that-ctrl-byte-cookies-are-ignored.patch
    Applying: CVE-2022-32221.patch
    Applying: CVE-2022-43552.patch
    Applying: 90_gnutls.patch
    Applying: 99_nss.patch

    regards,
    Avinash

    <div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div>Hello All,</div><div><br></div><div>I was trying to apply the patch curl_7.74.0-1.3+deb11u5.debian.tar.xz and got the below issue. How could I fix these?</div><div><br></div><div><div><br>
    </div><div>Applying: CVE-2021-22898.patch</div><div>Applying: CVE-2021-22945.patch</div><div>Applying: CVE-2021-22946.patch</div><div>curl-7.74.0/../debian/patches//CVE-2021-22946.patch:193: trailing whitespace.</div><div>A001 CAPABILITY</div><div>curl-7.
    74.0/../debian/patches//CVE-2021-22946.patch:252: trailing whitespace.</div><div>CAPA</div><div>curl-7.74.0/../debian/patches//CVE-2021-22946.patch:309: trailing whitespace.</div><div>AUTH SSL</div><div>curl-7.74.0/../debian/patches//CVE-2021-22946.patch:
    310: trailing whitespace.</div><div>AUTH TLS</div><div>warning: 4 lines add whitespace errors.</div><div>Applying: CVE-2021-22947.patch</div><div>Applying: CVE-2021-22924.patch</div><div>Applying: CVE-2022-22576.patch</div><div>Applying: CVE-2022-27775.
    patch</div><div>Applying: CVE-2022-27776.patch</div><div>Applying: CVE-2022-27781.patch</div><div>Applying: CVE-2022-27782_part1.patch</div><div>Applying: CVE-2022-27782_part2.patch</div><div>Applying: CVE-2022-32205.patch</div><div>Applying: CVE-2022-
    32206.patch</div><div>Applying: CVE-2022-32207.patch</div><div>Applying: CVE-2022-32208.patch</div><div>Applying: CVE-2022-27774_1_of_4.patch</div><div>Applying: CVE-2022-27774_2_of_4.patch</div><div>Applying: CVE-2022-27774_3_of_4.patch</div><div>error:
    patch failed: curl-7.74.0/tests/data/Makefile.inc:114</div><div>error: curl-7.74.0/tests/data/Makefile.inc: patch does not apply</div><div>Applying: CVE-2022-27774_4_of_4.patch</div><div>error: patch failed: curl-7.74.0/lib/http.c:752</div><div>error:
    curl-7.74.0/lib/http.c: patch does not apply</div><div>error: patch failed: curl-7.74.0/lib/vtls/openssl.c:2857</div><div>error: curl-7.74.0/lib/vtls/openssl.c: patch does not apply</div><div>Applying: cookie-reject-cookies-with-control-bytes.patch</div><
    Applying: test8-verify-that-ctrl-byte-cookies-are-ignored.patch</div><div>Applying: CVE-2022-32221.patch</div><div>Applying: CVE-2022-43552.patch</div><div>Applying: 90_gnutls.patch</div><div>Applying: 99_nss.patch</div></div><div><br></div><div>
    regards,</div><div>Avinash</div><div><br></div></div></div></div></div>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roberto =?iso-8859-1?Q?C=2E_S=E1nch@21:1/5 to Avinash Roy on Fri Feb 10 13:50:01 2023
    On Fri, Feb 10, 2023 at 02:33:05PM +0530, Avinash Roy wrote:
    Hello All,
    I was trying to apply the patch curl_7.74.0-1.3+deb11u5.debian.tar.xz and
    got the below issue. How could I fix these?

    Your subject line says 'buster' but the version you indicate is from
    bullseye. Are you certain that you have a matching upstream version?
    How did you obtain the source package? How are you unpacking it? What
    exact commands did you use?

    Regards,

    -Roberto

    --
    Roberto C. Sánchez

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)