On Thu, Dec 29, 2022 at 12:12:34PM +0100, Kamil Dudka wrote:
> On Thursday, December 29, 2022 11:56:59 AM CET Kamil Dudka wrote:
> > 
> > You can have a look how I backported the fixes, including the regression 
> > tests,
> > for curl-7.76.1 in CentOS Stream:
> > 
> >     
> > https://gitlab.com/redhat/centos-stream/rpms/curl/-/blob/c9s/0013-curl-7.76.1-CVE-2022-27774.patch
> 
> ... or the more complicated backport for curl-7.61.1, which also passes
> the upstream tests:
> 
>     
> https://gitlab.com/redhat/centos-stream/rpms/curl/-/blob/c8s/0038-curl-7.61.1-CVE-2022-27774.patch
> 
Kamil,

Thank you!  These patches were extremely helpful in developing a working
fix for CVE-2022-27774 in Debian.  My first stop was 7.74.0, which
looked quite close to your patch for 7.76.1, with just a small bit of
teaking.  The upstream unit tests were most helpful here.  The next
stops are 7.64.0, then 7.52.1, and 7.38.0.  My hope is that your 7.61.1
patch requires little to no change for 7.64.0 and perhaps some minor
tweaking for 7.52.1.  It is not clear what will happen with 7.38.0,
given how old it is.  However, I will make an attempt.

Once I have completed all the backporting and ensured that the fix works
and the tests pass I will post a complete set of patches, as well as any
commentary on obstacles I might not have been able to overcome, for
those who are interested.

Regards,

-Roberto

-- 
Roberto C. Sánchez
-- 
Unsubscribe: https://lists.haxx.se/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to