In all versions of libyang prior to 1.0-r5, a stack-based buffer overflow exists in the way libyang parses YANG files with a leaf of type "bits". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an malicious user to cause a denial of service or possibly gain code execution.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cesnet libyang 1.0 |
||
cesnet libyang 0.16 |
||
cesnet libyang 0.13 |
||
cesnet libyang 0.12 |
||
cesnet libyang 0.11 |
||
cesnet libyang 0.14 |
||
cesnet libyang 0.15 |
||
redhat enterprise linux 8.0 |