CVE-2025-7425

NameCVE-2025-7425
DescriptionA flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1109122

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxslt (PTS)bullseye1.1.34-4+deb11u1vulnerable
bullseye (security)1.1.34-4+deb11u2vulnerable
bookworm, bookworm (security)1.1.35-1+deb12u2vulnerable
trixie (security), trixie1.1.35-1.2+deb13u1vulnerable
forky, sid1.1.43-0.2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxsltsource(unstable)(unfixed)1109122

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=2379274
https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
While the issue is underlying in libxslt (and the CVE assigned for it), a
mitigation can be implemented in src:libxml2, cf.
https://gitlab.gnome.org/GNOME/libxslt/-/issues/140#note_2479674
and followups.
Mitigated by https://gitlab.gnome.org/GNOME/libxml2/-/commit/9de92ed78d8495527c5d7a4d0cc76c1f83768195 (2.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/f1e1f13b766eb580a8dcc0c4e7a447346dfd862e (master)
Mitigation landed in sid in 2.14.5+dfsg-0.1. Additionally the update for libxml2 as provided
via DSA 5990-1 (for trixie: 2.12.7+dfsg+really2.9.14-2.1+deb13u1, for bookworm
2.9.14+dfsg-1.3~deb12u4) mitigate the issue in trixie and bookworm.
Potential libxslt-only solution: https://gitlab.gnome.org/GNOME/libxslt/-/issues/140#note_2513942

Search for package or bug name: Reporting problems