Impact
The flaw in libxslt arises because the memory field psvi is reused for both stylesheet and input data. This improper type handling can lead to an attacker causing the library to misinterpret data, resulting in memory corruption or an application crash. The impact may manifest as a denial of service or unexpected behavior in programs that rely on XML transformations.
Affected Systems
Affected platforms include GNOME's libxslt and several Red Hat distributions (RHEL 6 through RHEL 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4). The advisory does not list specific version numbers, but any system that contains the vulnerable libxslt release is potentially at risk.
Risk and Exploitability
With a CVSS score of 7.5 the vulnerability is considered high risk, yet the EPSS score of less than 1% indicates a low probability that it is actively exploited in the wild. It is not currently listed in the CISA KEV catalog. An attacker could trigger the flaw by delivering crafted XML to any service that processes data with libxslt, potentially causing a crash or memory corruption. No public exploit has been disclosed at the time of this analysis.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN