Skip to main content

CVE-2025-10911: Expired Pointer Dereference

Medium
VulnerabilityCVE-2025-10911cvecve-2025-10911
Published: Thu Sep 25 2025 (09/25/2025, 15:13:14 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.

AI-Powered Analysis

AILast updated: 09/25/2025, 19:45:39 UTC

Technical Analysis

CVE-2025-10911 is a use-after-free vulnerability identified in the libxslt library component of Red Hat Enterprise Linux 10. The vulnerability arises during the parsing of XSL nodes, where the software erroneously dereferences pointers that have already been freed (expired pointers). This flaw can cause the application to crash due to invalid memory access. The vulnerability is classified with a CVSS 3.1 base score of 5.5 (medium severity), reflecting a scenario where the attack vector is local (AV:L), attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The scope remains unchanged (S:U), and the impact affects availability only (A:H) without compromising confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or fixes have been explicitly linked yet. The vulnerability could be triggered by a local user who can supply crafted XSL content to the libxslt parser, potentially causing denial of service through application crashes. Since libxslt is commonly used for XML transformations, any service or application relying on this library within Red Hat Enterprise Linux 10 environments could be affected. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not eliminate the risk of service disruption.

Potential Impact

For European organizations running Red Hat Enterprise Linux 10, this vulnerability primarily poses a risk of denial of service (DoS) due to application crashes when processing maliciously crafted XSL files. This could affect services that rely on XML transformations, such as web services, middleware, or automated data processing pipelines. The impact is particularly relevant for sectors with critical uptime requirements, including finance, healthcare, telecommunications, and government services. While the vulnerability does not allow for privilege escalation or data compromise, repeated exploitation could degrade service availability, leading to operational disruptions and potential financial losses. Additionally, if attackers combine this DoS vector with other vulnerabilities, it could facilitate more complex attack chains. Given the local attack vector and requirement for user interaction, the threat is somewhat limited to insider threats or scenarios where users can be tricked into processing malicious XSL content.

Mitigation Recommendations

European organizations should implement several targeted mitigation strategies beyond generic patching advice. First, restrict access to systems running Red Hat Enterprise Linux 10 to trusted users only, minimizing the risk of local exploitation. Second, implement strict input validation and sanitization for any XML or XSL content processed by applications using libxslt, rejecting or sandboxing untrusted or user-supplied XSL files. Third, monitor application logs and system behavior for signs of crashes or abnormal terminations related to XML processing. Fourth, employ application whitelisting and privilege separation to limit the impact of potential crashes. Fifth, stay updated with Red Hat security advisories and apply patches promptly once available. Finally, consider deploying runtime protection tools that can detect and prevent use-after-free conditions or memory corruption in critical applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-09-24T12:45:24.913Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d59bc858afd90a7d662e29

Added to database: 9/25/2025, 7:45:12 PM

Last enriched: 9/25/2025, 7:45:39 PM

Last updated: 9/25/2025, 9:49:59 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats