First published: Wed Jan 22 2020(Updated: )
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libyang | <1.0 | 1.0 |
CESNET libyang | =0.11-r1 | |
CESNET libyang | =0.11-r2 | |
CESNET libyang | =0.12-r1 | |
CESNET libyang | =0.12-r2 | |
CESNET libyang | =0.13-r1 | |
CESNET libyang | =0.13-r2 | |
CESNET libyang | =0.14-r1 | |
CESNET libyang | =0.15-r1 | |
CESNET libyang | =0.16-r1 | |
CESNET libyang | =0.16-r2 | |
CESNET libyang | =0.16-r3 | |
CESNET libyang | =1.0-r1 | |
CESNET libyang | =1.0-r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20391 has a moderate severity level due to the potential for application crashes when processing untrusted yang files.
To fix CVE-2019-20391, upgrade libyang to version 1.0-r3 or later.
CVE-2019-20391 affects libyang versions up to 1.0-r2, including earlier versions.
Applications that use libyang to parse untrusted input yang files are impacted by CVE-2019-20391.
While CVE-2019-20391 primarily causes application crashes, using vulnerable versions poses a risk when handling untrusted input.