Evaluate expat CVE-2022-40674 fix
Categories
(Core :: XML, defect)
Tracking
()
People
(Reporter: RyanVM, Assigned: peterv)
References
Details
(Keywords: sec-moderate, Whiteboard: [adv-main107+])
Attachments
(2 files)
The new expat 2.4.9 release shipped today included a CVE fix:
#629 #640 CVE-2022-40674 -- Heap use-after-free vulnerability in function doContent. Expected impact is denial of service or potentially arbitrary code execution.
https://github.com/libexpat/libexpat/pull/629/commits/4a32da87e931ba54393d465bb77c40b5c33d343b
While our RLBox sandboxing likely mitigates the severity of this issue, we still might want to consider cherry-picking the fix to our import for safety's sake.
Assignee | ||
Updated•2 years ago
|
Comment 2•2 years ago
|
||
[Tracking Requested - why for this release]: From a background conversation with Tom -- RLBoxing makes this less severe, but we should get this fixed and uplifted
Updated•2 years ago
|
Comment 4•2 years ago
|
||
The 2.4.9-based patch linked in comment 0 doesn't apply cleanly because of some object restructuring, though it totally applies functionally. Debian is maintaining a 2.2.10-based fork so their version of the patch might be easier to use.
Reporter | ||
Updated•2 years ago
|
Assignee | ||
Comment 6•2 years ago
|
||
Updated•2 years ago
|
Comment 8•2 years ago
|
||
Peter, are you going to request an uplift to release and esr branches?
Comment 9•2 years ago
|
||
bugherder |
Reporter | ||
Updated•2 years ago
|
Assignee | ||
Comment 10•2 years ago
|
||
I spent some time writing a testcase for this (which was a bit tricky, have to block the parser at the right time and pause sending data to force a boundary in the buffer in the right spot). It turns out that we ran into this issue while fixing some crashes and intermittent failures after landing RLBox, and bholley landed a similar fix (bug 1746996). I had vaguely assumed that the failure was specific to our copy of Expat, but apparently not :-/. So we don't need to port this to branches that already have the fix for bug 1746996 (which landed in 96).
Reporter | ||
Updated•2 years ago
|
Comment 11•2 years ago
|
||
Hi Ryan,
I might have a silly question: Why not backporting this to ESR102? Does it mean that the CVE-2022-40674 was already fixed by https://bugzilla.mozilla.org/show_bug.cgi?id=1746996 as mentioned by :peterv? So, in this case, I would expect no change needed also in FF107 or that the fix lands in both FF107 and ESR102.5, right?
Sorry for the confusion, but I would like to understand the severity of this fix and if it is okay to still use ESR102 or wait until ESR115 to use it again.
Reporter | ||
Comment 12•2 years ago
|
||
That was my understanding of comment 10, yes. We effectively fixed this bug already in 96.
Reporter | ||
Comment 13•2 years ago
|
||
That said, Peter, can you confirm that comment 10 applies in the non-RLBox scenario (as I understand it, some distros don't have it enabled in their builds)?
Assignee | ||
Comment 14•2 years ago
|
||
(In reply to Ryan VanderMeulen [:RyanVM] from comment #13)
That said, Peter, can you confirm that comment 10 applies in the non-RLBox scenario (as I understand it, some distros don't have it enabled in their builds)?
Yes.
Reporter | ||
Updated•2 years ago
|
Updated•2 years ago
|
Comment 15•2 years ago
|
||
Updated•2 years ago
|
Description
•