Bug 2310137 (CVE-2024-8176)
Summary: | CVE-2024-8176 libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abhraj, adudiak, asdas, bdettelb, bmontgom, caswilli, cmoore, crizzo, csutherl, dfreiber, doconnor, dpaolell, drow, eparis, gmccullo, gotiwari, jahealy, jburrell, jclere, jdelft, jmitchel, jtanner, jupierce, kaycoth, kshier, lgarciaa, lphiri, mbiarnes, mvyas, npecka, nstielau, omaciel, pjindal, plodge, rcritten, security-response-team, sidsharm, sponnaga, stcannon, szappis, talessio, teagle, vkumar, vlaad, ximhan, yguenane, yuxzhu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2024-09-05 06:52:55 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:3531 https://access.redhat.com/errata/RHSA-2025:3531 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:3913 https://access.redhat.com/errata/RHSA-2025:3913 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:4048 https://access.redhat.com/errata/RHSA-2025:4048 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:4447 https://access.redhat.com/errata/RHSA-2025:4447 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2025:4448 https://access.redhat.com/errata/RHSA-2025:4448 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:4446 https://access.redhat.com/errata/RHSA-2025:4446 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:4449 https://access.redhat.com/errata/RHSA-2025:4449 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7444 https://access.redhat.com/errata/RHSA-2025:7444 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:7512 https://access.redhat.com/errata/RHSA-2025:7512 |