CVE-2019-18197
Description
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In libxslt 1.1.33, a pointer variable in xsltCopyText is not reset, leading to a use-after-free that can cause out-of-bounds write or information disclosure.
The vulnerability resides in the xsltCopyText function within transform.c of libxslt 1.1.33. A pointer variable is not properly reset under certain conditions, which can lead to a use-after-free scenario if the freed memory is later reused. This flaw can cause a bounds check to fail, resulting in writes outside allocated buffers or the disclosure of uninitialized memory [2].
An attacker could exploit this by providing a specially crafted XSLT stylesheet or XML document that triggers the vulnerable code path. The exploitation requires that the freed memory be reused in a specific manner, which may increase complexity but remains feasible [2].
Successful exploitation could allow an attacker to corrupt memory, potentially leading to arbitrary code execution or the leakage of sensitive information from uninitialized memory [2].
The issue is fixed in libxslt 1.1.34. Red Hat has released RHSA-2020:0514 to address the vulnerability in affected Red Hat Enterprise Linux versions [1]. Additionally, the Nokogiri Ruby gem, which bundles libxslt, released version 1.10.5 to mitigate this CVE [4]. Users are advised to update to patched versions.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
nokogiriRubyGems | < 1.10.5 | 1.10.5 |
Affected products
30- libxslt/libxsltdescription
- ghsa-coords29 versionspkg:gem/nokogiripkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/chromium&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/libxslt&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/libxslt&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/libxslt-python&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2012pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2012%20SP3pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP1pkg:rpm/suse/libxslt&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/libxslt&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/libxslt&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/libxslt&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/libxslt&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/re2&distro=SUSE%20Package%20Hub%2012pkg:rpm/suse/re2&distro=SUSE%20Package%20Hub%2012%20SP3
< 1.10.5+ 28 more
- (no CPE)range: < 1.10.5
- (no CPE)range: < 80.0.3987.87-lp151.2.63.1
- (no CPE)range: < 93.0.4577.82-1.1
- (no CPE)range: < 1.1.32-lp151.3.6.1
- (no CPE)range: < 1.1.34-3.2
- (no CPE)range: < 1.1.32-lp151.3.6.1
- (no CPE)range: < 80.0.3987.87-31.1
- (no CPE)range: < 80.0.3987.87-31.1
- (no CPE)range: < 80.0.3987.87-bp151.3.59.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.32-3.8.24
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 1.1.28-17.9.1
- (no CPE)range: < 20200101-25.1
- (no CPE)range: < 20200101-25.1
Patches
12232473733b7Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
23- lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.htmlghsavendor-advisoryx_refsource_SUSEWEB
- lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.htmlghsavendor-advisoryx_refsource_SUSEWEB
- lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.htmlghsavendor-advisoryx_refsource_SUSEWEB
- lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.htmlghsavendor-advisoryx_refsource_SUSEWEB
- access.redhat.com/errata/RHSA-2020:0514ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-242x-7cm6-4w8jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-18197ghsaADVISORY
- usn.ubuntu.com/4164-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.openwall.com/lists/oss-security/2019/11/17/2ghsamailing-listx_refsource_MLISTWEB
- bugs.chromium.org/p/oss-fuzz/issues/detailghsax_refsource_MISCWEB
- bugs.chromium.org/p/oss-fuzz/issues/detailghsax_refsource_MISCWEB
- bugs.chromium.org/p/oss-fuzz/issues/detailghsax_refsource_MISCWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-18197.ymlghsaWEB
- github.com/sparklemotion/nokogiri/blob/01ab95f3e37429ed8d3b380a8d2f73902eb325d9/CHANGELOG.mdghsaWEB
- github.com/sparklemotion/nokogiri/issues/1943ghsaWEB
- gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285ghsax_refsource_MISCWEB
- lists.debian.org/debian-lts-announce/2019/10/msg00037.htmlghsamailing-listx_refsource_MLISTWEB
- security.netapp.com/advisory/ntap-20191031-0004ghsaWEB
- security.netapp.com/advisory/ntap-20191031-0004/mitrex_refsource_CONFIRM
- security.netapp.com/advisory/ntap-20200416-0004ghsaWEB
- security.netapp.com/advisory/ntap-20200416-0004/mitrex_refsource_CONFIRM
- usn.ubuntu.com/4164-1ghsaWEB
- www.oracle.com/security-alerts/cpuapr2020.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.