Description

A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.

INFO

Published Date :

2025-03-14T08:19:48.962Z

Last Modified :

2026-03-20T03:02:16.301Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2024-8176 vulnerability.

Vendors Products
Redhat
  • Devworkspace
  • Discovery
  • Enterprise Linux
  • Jboss Core Services
  • Openshift
  • Rhel Aus
  • Rhel E4s
  • Rhel Eus
  • Rhel Eus Long Life
  • Rhel Tus
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-8176.

URL Resource
http://seclists.org/fulldisclosure/2025/May/10 cve-icon
http://seclists.org/fulldisclosure/2025/May/11 cve-icon
http://seclists.org/fulldisclosure/2025/May/12 cve-icon
http://seclists.org/fulldisclosure/2025/May/6 cve-icon
http://seclists.org/fulldisclosure/2025/May/7 cve-icon
http://seclists.org/fulldisclosure/2025/May/8 cve-icon
http://www.openwall.com/lists/oss-security/2025/03/15/1 cve-icon
http://www.openwall.com/lists/oss-security/2025/09/24/11 cve-icon
https://access.redhat.com/errata/RHSA-2025:13681 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22033 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22034 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22035 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22607 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22785 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22842 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22871 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:3531 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:3734 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:3913 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:4048 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:4446 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:4447 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:4448 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:4449 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:7444 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:7512 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:8385 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2024-8176 cve-icon cve-icon
https://blog.hartwork.org/posts/expat-2-7-0-released/ cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2310137 cve-icon cve-icon
https://bugzilla.suse.com/show_bug.cgi?id=1239618 cve-icon
https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52 cve-icon
https://github.com/libexpat/libexpat/issues/893 cve-icon cve-icon cve-icon
https://github.com/libexpat/libexpat/pull/973 cve-icon cve-icon
https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53 cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2024-8176 cve-icon
https://security-tracker.debian.org/tracker/CVE-2024-8176 cve-icon
https://security.netapp.com/advisory/ntap-20250328-0009/ cve-icon
https://ubuntu.com/security/CVE-2024-8176 cve-icon
https://www.cve.org/CVERecord?id=CVE-2024-8176 cve-icon
https://www.kb.cert.org/vuls/id/760160 cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact