4cec49
diff -up thunderbird-91.7.0/parser/expat/lib/xmlparse.c.expat-CVE-2022-25315 thunderbird-91.7.0/parser/expat/lib/xmlparse.c
4cec49
--- thunderbird-91.7.0/parser/expat/lib/xmlparse.c.expat-CVE-2022-25315	2022-03-02 18:17:50.966583254 +0100
4cec49
+++ thunderbird-91.7.0/parser/expat/lib/xmlparse.c	2022-03-02 18:19:27.636924735 +0100
4cec49
@@ -2479,6 +2479,7 @@ storeRawNames(XML_Parser parser)
4cec49
   while (tag) {
4cec49
     int bufSize;
4cec49
     int nameLen = sizeof(XML_Char) * (tag->name.strLen + 1);
4cec49
+    size_t rawNameLen;
4cec49
     char *rawNameBuf = tag->buf + nameLen;
4cec49
     /* Stop if already stored.  Since tagStack is a stack, we can stop
4cec49
        at the first entry that has already been copied; everything
4cec49
@@ -2490,7 +2491,11 @@ storeRawNames(XML_Parser parser)
4cec49
     /* For re-use purposes we need to ensure that the
4cec49
        size of tag->buf is a multiple of sizeof(XML_Char).
4cec49
     */
4cec49
-    bufSize = nameLen + ROUND_UP(tag->rawNameLength, sizeof(XML_Char));
4cec49
+    rawNameLen = ROUND_UP(tag->rawNameLength, sizeof(XML_Char));
4cec49
+    /* Detect and prevent integer overflow. */
4cec49
+    if (rawNameLen > (size_t)INT_MAX - nameLen)
4cec49
+      return XML_FALSE;
4cec49
+    bufSize = nameLen + (int)rawNameLen;
4cec49
     if (bufSize > tag->bufEnd - tag->buf) {
4cec49
       char *temp = (char *)REALLOC(tag->buf, bufSize);
4cec49
       if (temp == NULL)