Recent expat CVEs
Categories
(Core :: XML, defect)
Tracking
()
People
(Reporter: jhorak, Assigned: peterv)
References
Details
(Keywords: sec-high, Whiteboard: sec-high for ESR which has no RLBox[sec-survey])
Attachments
(3 files, 1 obsolete file)
48 bytes,
text/x-phabricator-request
|
RyanVM
:
approval-mozilla-release+
RyanVM
:
approval-mozilla-esr91+
tjr
:
sec-approval+
|
Details | Review |
48 bytes,
text/x-phabricator-request
|
RyanVM
:
approval-mozilla-release+
RyanVM
:
approval-mozilla-esr91+
tjr
:
sec-approval+
|
Details | Review |
48 bytes,
text/x-phabricator-request
|
RyanVM
:
approval-mozilla-release+
RyanVM
:
approval-mozilla-esr91+
tjr
:
sec-approval+
|
Details | Review |
Lately some expat CVEs popped up [1], the expat is sandboxed in the version 96+
but the ESR seems not to be covered. Could you please investigate if the vulnerabilities has any relevancy for the Firefox?
Comment 1•3 years ago
|
||
[Tracking Requested - why for this release]: possible sec issues
Assignee | ||
Updated•3 years ago
|
Bobby, do you think RLBoxing expat on ESR was feasible?
(as a possible alternative to updating expat)
Assignee | ||
Comment 3•3 years ago
|
||
-
CVE-2021-45960, CVE-2021-46143, CVE-2022-22822 to CVE-2022-22827: needs to be verified, but on first glance I don't think we allow enough data into the parser to hit these.
-
CVE-2022-23852: doesn't affect us, only affects "configurations with a nonzero XML_CONTEXT_BYTES", we don't set XML_CONTEXT_BYTES to nonzero.
-
CVE-2022-23990: on first glance I don't think we're affected: the patch has a comment saying "when there is an element declaration handler present (from a prior call to XML_SetElementDeclHandler)". We never set an element declaration handler.
-
CVE-2022-25236: on first glance I don't think we're affected: our namespace separator (0xFFFF) shouldn't make it into the data being parsed in the first place.
-
CVE-2022-25313 needs to be verified, we might be vulnerable.
-
CVE-2022-25314 was introduced in 2.2.2, which we haven't updated to.
-
CVE-2022-25315 doesn't affect us, we define XML_UNICODE.
Comment 4•3 years ago
|
||
(In reply to Olli Pettay [:smaug] from comment #2)
Bobby, do you think RLBoxing expat on ESR was feasible?
(as a possible alternative to updating expat)
There was a bunch of rlbox infrastructure that landed over the summer, so my guess is that cherry-picking expat fixes will be less work than trying to uplift the expat sandbox.
Comment 5•3 years ago
|
||
Apparently glandium has patches already to uplift RLBox to ESR, so that might in fact happen anyway.
Updated•3 years ago
|
Comment 6•3 years ago
•
|
||
(In reply to Peter Van der Beken [:peterv] from comment #3)
- CVE-2021-45960, CVE-2021-46143, CVE-2022-22822 to CVE-2022-22827: needs to be verified, but on first glance I don't think we allow enough data into the parser to hit these.
Peter assessed that these are simple fixes that we should just cherry-pick.
CVE-2022-23852: doesn't affect us, only affects "configurations with a nonzero XML_CONTEXT_BYTES", we don't set XML_CONTEXT_BYTES to nonzero.
CVE-2022-23990: on first glance I don't think we're affected: the patch has a comment saying "when there is an element declaration handler present (from a prior call to XML_SetElementDeclHandler)". We never set an element declaration handler.
CVE-2022-25236: on first glance I don't think we're affected: our namespace separator (0xFFFF) shouldn't make it into the data being parsed in the first place.
CVE-2022-25313 needs to be verified, we might be vulnerable.
CVE-2022-25314 was introduced in 2.2.2, which we haven't updated to.
CVE-2022-25315 doesn't affect us, we define XML_UNICODE.
Reporter | ||
Comment 7•3 years ago
|
||
Cool, will it make it to the 91.7 esr? Thanks.
Comment 8•3 years ago
|
||
(In reply to Jan Horak [:jhorak] from comment #7)
Cool, will it make it to the 91.7 esr? Thanks.
No, that candidate was already created.
Assignee | ||
Comment 9•3 years ago
|
||
Assignee | ||
Comment 10•3 years ago
|
||
Depends on D140165
Assignee | ||
Comment 11•3 years ago
|
||
Depends on D140166
Assignee | ||
Comment 12•3 years ago
|
||
Depends on D140167
Reporter | ||
Comment 13•3 years ago
|
||
What about the CVE-2022-25235?
Updated•3 years ago
|
Assignee | ||
Comment 14•3 years ago
|
||
(In reply to Jan Horak [:jhorak] from comment #13)
What about the CVE-2022-25235?
We don't use Expat in utf-8 mode, so I don't think that affects us.
Assignee | ||
Comment 15•3 years ago
|
||
Comment on attachment 9266234 [details]
Bug 1754724 - Clear up some computations in expat code. r?farre!
Security Approval Request
- How easily could an exploit be constructed based on the patch?: Probably, yes.
- Do comments in the patch, the check-in comment, or tests included in the patch paint a bulls-eye on the security problem?: Yes
- Which older supported branches are affected by this flaw?: All
- If not all supported branches, which bug introduced the flaw?: None
- Do you have backports for the affected branches?: No
- If not, how different, hard to create, and risky will they be?: Patches should apply as-is.
- How likely is this patch to cause regressions; how much testing does it need?: Patches look low-risk, they just add overflow checks in various places.
Assignee | ||
Updated•3 years ago
|
Updated•3 years ago
|
Updated•3 years ago
|
Comment 16•3 years ago
|
||
uplift |
https://hg.mozilla.org/mozilla-central/rev/9ce921b12e75bf03a08630c238ee6580eddd1465
https://hg.mozilla.org/mozilla-central/rev/72005f937f46878a51e070a5b4477db38635e1f3
https://hg.mozilla.org/mozilla-central/rev/ebdf17f86850b3f5e2c53abbec867156cc06ae00
https://hg.mozilla.org/releases/mozilla-release/rev/1e64d3320bbc46520fecfd57e288278a92fdd6ae
https://hg.mozilla.org/releases/mozilla-release/rev/f73871dde9f6798e29f859c082a8e83f115417e2
https://hg.mozilla.org/releases/mozilla-release/rev/1b20c84cd140d14859be41e1715ff886ac301836
https://hg.mozilla.org/releases/mozilla-esr91/rev/c084e1e90301ca414be9dee690a3ca9ebc2a0a0e
https://hg.mozilla.org/releases/mozilla-esr91/rev/1ff49f5abe2f44fb90250abac9e71204e1e55ea2
https://hg.mozilla.org/releases/mozilla-esr91/rev/4a180bbf2d1b4114f66be985e35e2642a902aa19
Comment 17•3 years ago
•
|
||
Comment on attachment 9266234 [details]
Bug 1754724 - Clear up some computations in expat code. r?farre!
Adding 98.0rc3 & 91.7esr RC2 branch approvals to go with Tom's sec-approval.
Updated•3 years ago
|
Updated•3 years ago
|
Comment 18•3 years ago
|
||
uplift |
Comment 20•3 years ago
|
||
Should we call these out in the advisories for 98/91.7esr?
Comment 21•3 years ago
|
||
As part of a security bug pattern analysis, we are requesting your help with a high level analysis of this bug. It is our hope to develop static analysis (or potentially runtime/dynamic analysis) in the future to identify classes of bugs.
Please visit this google form to reply.
Comment 22•3 years ago
|
||
Dan and I's reading of this was that we don't think any of the issues apply to us, and we took them to be safe, so we decided they don't need to be included.
Updated•3 years ago
|
Updated•3 years ago
|
Comment 24•1 year ago
•
|
||
(In reply to BugBot [:suhaib / :marco/ :calixte] from comment #21)
As part of a security bug pattern analysis, we are requesting your help with a high level analysis of this bug. It is our hope to develop static analysis (or potentially runtime/dynamic analysis) in the future to identify classes of bugs.
Please visit this google form to reply.
The form is no longer accepting responses.
Description
•