In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "bits". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.16.105-2", "binary_name": "libyang-cpp-dev" }, { "binary_version": "0.16.105-2", "binary_name": "libyang-cpp0.16" }, { "binary_version": "0.16.105-2", "binary_name": "libyang-cpp0.16-dbgsym" }, { "binary_version": "0.16.105-2", "binary_name": "libyang-dev" }, { "binary_version": "0.16.105-2", "binary_name": "libyang0.16" }, { "binary_version": "0.16.105-2", "binary_name": "libyang0.16-dbgsym" }, { "binary_version": "0.16.105-2", "binary_name": "python3-yang" }, { "binary_version": "0.16.105-2", "binary_name": "python3-yang-dbg" }, { "binary_version": "0.16.105-2", "binary_name": "yang-tools" }, { "binary_version": "0.16.105-2", "binary_name": "yang-tools-dbgsym" } ] }