Impact
The vulnerability is a type confusion bug in the exsltFuncResultComp() function of libxslt, which processes EXSLT <func:result> elements during stylesheet parsing. It arises from improper type handling, causing an XML document node to be treated as a regular element node, leading to unintended memory reads. This flaw corresponds to CWE-843 (Incorrect Type Checking for a Pointer). The result may cause application instability or a denial of service but does not expose data or provide privileged access.
Affected Systems
Red Hat Enterprise Linux 6, 7, 8, 9, 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4 are affected. No specific patch version details are provided; the defect exists in the default libxslt package shipped with these platforms.
Risk and Exploitability
The CVSS score of 3.1 and an EPSS below 1% indicate a low severity and low probability of exploitation; the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker would need to supply a malicious XSLT stylesheet containing EXSLT <func:result> elements processed by libxslt within a running application, which is not trivial. If successfully triggered, the impact would be a denial of service through a crash, but the overall risk remains low due to the difficulty of crafting the necessary input and the limited scope of the vulnerability.
OpenCVE Enrichment