A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption. |
Title | libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr | Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Thu, 10 Jul 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr | |
Weaknesses | CWE-416 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-07-10T13:53:37.295Z
Updated: 2025-07-10T15:21:30.858Z
Reserved: 2025-07-10T08:44:06.287Z
Link: CVE-2025-7425

Updated: 2025-07-10T15:21:22.561Z

Status : Received
Published: 2025-07-10T14:15:27.877
Modified: 2025-07-10T16:15:25.460
Link: CVE-2025-7425
