CVE-2024-8176

Name
CVE-2024-8176
Description
A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vdb-entry https://access.redhat.com/security/cve/CVE-2024-8176
issue-tracking https://bugzilla.redhat.com/show_bug.cgi?id=2310137
secalert@redhat.com https://github.com/libexpat/libexpat/issues/893
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/03/15/1
af854a3a-2127-422b-91ae-364da2661108 https://blog.hartwork.org/posts/expat-2-7-0-released/
af854a3a-2127-422b-91ae-364da2661108 https://bugzilla.suse.com/show_bug.cgi?id=1239618
af854a3a-2127-422b-91ae-364da2661108 https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52
af854a3a-2127-422b-91ae-364da2661108 https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53
af854a3a-2127-422b-91ae-364da2661108 https://security-tracker.debian.org/tracker/CVE-2024-8176
af854a3a-2127-422b-91ae-364da2661108 https://ubuntu.com/security/CVE-2024-8176
af854a3a-2127-422b-91ae-364da2661108 https://security.netapp.com/advisory/ntap-20250328-0009/
vendor-advisory https://access.redhat.com/errata/RHSA-2025:3531
vendor-advisory https://access.redhat.com/errata/RHSA-2025:3734
vendor-advisory https://access.redhat.com/errata/RHSA-2025:3913
vendor-advisory https://access.redhat.com/errata/RHSA-2025:4048
vendor-advisory https://access.redhat.com/errata/RHSA-2025:4447
vendor-advisory https://access.redhat.com/errata/RHSA-2025:4446
vendor-advisory https://access.redhat.com/errata/RHSA-2025:4448
vendor-advisory https://access.redhat.com/errata/RHSA-2025:4449
af854a3a-2127-422b-91ae-364da2661108 https://www.kb.cert.org/vuls/id/760160
vendor-advisory https://access.redhat.com/errata/RHSA-2025:7444
vendor-advisory https://access.redhat.com/errata/RHSA-2025:7512
vendor-advisory https://access.redhat.com/errata/RHSA-2025:8385
vendor-advisory https://access.redhat.com/errata/RHSA-2025:13681
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2025/May/10
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2025/May/11
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2025/May/12
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2025/May/6
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2025/May/7
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2025/May/8
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/09/24/11
secalert@redhat.com https://access.redhat.com/errata/RHSA-2025:22033
secalert@redhat.com https://access.redhat.com/errata/RHSA-2025:22035
secalert@redhat.com https://access.redhat.com/errata/RHSA-2025:22034
secalert@redhat.com https://access.redhat.com/errata/RHSA-2025:22607
secalert@redhat.com https://access.redhat.com/errata/RHSA-2025:22785
secalert@redhat.com https://access.redhat.com/errata/RHSA-2025:22842
secalert@redhat.com https://access.redhat.com/errata/RHSA-2025:22871

Match rules

CPE URI Source package Min version Max version
shopxo >= 0 < 2.7.0
cpe:/o:redhat:enterprise_linux:8::baseos shopxo >= 0:2.2.5-17.el8_10 < *
cpe:/o:redhat:rhel_aus:8.2::baseos shopxo >= 0:1.51.0-5.el8_2.2 < *
cpe:/o:redhat:enterprise_linux:10.0 shopxo >= 0:2.7.1-1.el10_0 < *
cpe:/a:redhat:enterprise_linux:9::appstream shopxo >= 0:2.5.0-3.el9_5.3 < *
cpe:/a:redhat:enterprise_linux:9::appstream shopxo >= 0:2.5.0-5.el9_6 < *
cpe:/o:redhat:rhel_aus:8.6::baseos shopxo >= 0:1.51.0-6.el8_6.1 < *
cpe:/a:redhat:discovery:1.14::el9 shopxo >= sha256:ad1045aa0de937c3a6969ec377f7bfeda9a44ee434a954e8245e9840316ffc1c < *
cpe:/o:redhat:enterprise_linux:8::baseos shopxo >= 0:1.51.0-11.el8_10 < *
cpe:/o:redhat:rhel_e4s:8.4::baseos shopxo >= 0:1.51.0-5.el8_4.2 < *
cpe:/o:redhat:rhel_eus:8.8::baseos shopxo >= 0:1.51.0-8.el8_8.1 < *
cpe:/a:redhat:devworkspace:0.33::el9 shopxo >= sha256:b41c498da32fde3fa636594ef93d2206ca1a3bc306e401eaae035dc18d30654a < *
cpe:/a:redhat:discovery:1.14::el9 shopxo >= sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644 < *

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
expat edge-main 2.7.0-r0 Carlo Landmeter <clandmeter@alpinelinux.org> fixed
expat 3.22-main 2.7.0-r0 None fixed
expat 3.21-main 2.7.0-r0 Carlo Landmeter <clandmeter@alpinelinux.org> fixed
expat 3.20-main 2.7.0-r0 Carlo Landmeter <clandmeter@alpinelinux.org> fixed
expat 3.19-main 2.7.0-r0 Carlo Landmeter <clandmeter@alpinelinux.org> fixed
expat 3.18-main 2.7.0-r0 Carlo Landmeter <clandmeter@alpinelinux.org> fixed