In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type bits. An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libyang | Cesnet | 0.11-r1 (including) | 0.11-r1 (including) |
Libyang | Cesnet | 0.11-r2 (including) | 0.11-r2 (including) |
Libyang | Cesnet | 0.12-r1 (including) | 0.12-r1 (including) |
Libyang | Cesnet | 0.12-r2 (including) | 0.12-r2 (including) |
Libyang | Cesnet | 0.13-r1 (including) | 0.13-r1 (including) |
Libyang | Cesnet | 0.13-r2 (including) | 0.13-r2 (including) |
Libyang | Cesnet | 0.14-r1 (including) | 0.14-r1 (including) |
Libyang | Cesnet | 0.15-r1 (including) | 0.15-r1 (including) |
Libyang | Cesnet | 0.16-r1 (including) | 0.16-r1 (including) |
Libyang | Cesnet | 0.16-r2 (including) | 0.16-r2 (including) |
Libyang | Cesnet | 0.16-r3 (including) | 0.16-r3 (including) |
Libyang | Cesnet | 1.0-r1 (including) | 1.0-r1 (including) |
Libyang | Cesnet | 1.0-r2 (including) | 1.0-r2 (including) |
Libyang | Cesnet | 1.0-r3 (including) | 1.0-r3 (including) |
Libyang | Cesnet | 1.0-r4 (including) | 1.0-r4 (including) |
Libyang | Ubuntu | disco | * |
Libyang | Ubuntu | eoan | * |
Libyang | Ubuntu | trusty | * |
Libyang | Ubuntu | upstream | * |
Red Hat Enterprise Linux 8 | RedHat | libyang-0:0.16.105-3.el8_1.2 | * |