Bug 2310137 (CVE-2024-8176)

Summary: CVE-2024-8176 libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhraj, adudiak, asdas, bdettelb, bmontgom, caswilli, cmoore, crizzo, csutherl, dfreiber, doconnor, dpaolell, drow, eparis, gmccullo, gotiwari, jahealy, jburrell, jclere, jdelft, jmitchel, jtanner, jupierce, kaycoth, kshier, lgarciaa, lphiri, mbiarnes, mvyas, npecka, nstielau, omaciel, pjindal, plodge, rcritten, security-response-team, sidsharm, sponnaga, stcannon, szappis, talessio, teagle, vkumar, vlaad, ximhan, yguenane, yuxzhu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-09-05 06:52:55 UTC
The libexpat library is vulnerable to a stack overflow due to uncontrolled recursion when processing deeply nested XML entities. This can cause the application to crash, resulting in a denial of service (DoS) or potentially leading to memory corruption, depending on the user's environment and how the library is used. The issue is triggered by supplying a specially crafted XML document designed to create a long chain of recursive entities.

Comment 2 errata-xmlrpc 2025-04-02 14:46:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:3531 https://access.redhat.com/errata/RHSA-2025:3531

Comment 3 errata-xmlrpc 2025-04-15 16:21:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:3913 https://access.redhat.com/errata/RHSA-2025:3913

Comment 4 errata-xmlrpc 2025-04-22 01:20:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:4048 https://access.redhat.com/errata/RHSA-2025:4048

Comment 5 errata-xmlrpc 2025-05-05 01:25:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:4447 https://access.redhat.com/errata/RHSA-2025:4447

Comment 6 errata-xmlrpc 2025-05-05 01:44:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:4448 https://access.redhat.com/errata/RHSA-2025:4448

Comment 7 errata-xmlrpc 2025-05-05 01:46:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:4446 https://access.redhat.com/errata/RHSA-2025:4446

Comment 8 errata-xmlrpc 2025-05-05 01:51:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:4449 https://access.redhat.com/errata/RHSA-2025:4449

Comment 9 errata-xmlrpc 2025-05-13 11:58:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7444 https://access.redhat.com/errata/RHSA-2025:7444

Comment 10 errata-xmlrpc 2025-05-13 16:01:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:7512 https://access.redhat.com/errata/RHSA-2025:7512