The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
code.google.com/p/chromium/issues/detail?id=73716
downloads.avaya.com/css/P8/documents/100144158
git.gnome.org/browse/libxslt/commit/?id=ecb6bcb8d1b7e44842edde3929f412d46b40c89f
googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html
scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html
www.mandriva.com/security/advisories?name=MDVSA-2011:079
www.mandriva.com/security/advisories?name=MDVSA-2012:164
www.securityfocus.com/bid/46785
www.vupen.com/english/advisories/2011/0628
bugzilla.redhat.com/show_bug.cgi?id=684386
exchange.xforce.ibmcloud.com/vulnerabilities/65966
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14244