In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "bits". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libyang-cpp-dev", "binary_version": "0.16.105-2" }, { "binary_name": "libyang-cpp0.16", "binary_version": "0.16.105-2" }, { "binary_name": "libyang-cpp0.16-dbgsym", "binary_version": "0.16.105-2" }, { "binary_name": "libyang-dev", "binary_version": "0.16.105-2" }, { "binary_name": "libyang0.16", "binary_version": "0.16.105-2" }, { "binary_name": "libyang0.16-dbgsym", "binary_version": "0.16.105-2" }, { "binary_name": "python3-yang", "binary_version": "0.16.105-2" }, { "binary_name": "python3-yang-dbg", "binary_version": "0.16.105-2" }, { "binary_name": "yang-tools", "binary_version": "0.16.105-2" }, { "binary_name": "yang-tools-dbgsym", "binary_version": "0.16.105-2" } ], "ubuntu_priority": "medium" }