First published: Wed Jan 22 2020(Updated: )
An invalid memory access flaw is present in libyang before v1.0-r1 in the function resolve_feature_value() when an if-feature statement is used inside a list key node, and the feature used is not defined. Applications that use libyang to parse untrusted input yang files may crash.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libyang | <1.0 | 1.0 |
CESNET libyang | =0.11-r1 | |
CESNET libyang | =0.11-r2 | |
CESNET libyang | =0.12-r1 | |
CESNET libyang | =0.12-r2 | |
CESNET libyang | =0.13-r1 | |
CESNET libyang | =0.13-r2 | |
CESNET libyang | =0.14-r1 | |
CESNET libyang | =0.15-r1 | |
CESNET libyang | =0.16-r1 | |
CESNET libyang | =0.16-r2 | |
CESNET libyang | =0.16-r3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20392 has been classified as a high severity vulnerability due to the potential for application crashes caused by invalid memory access.
To fix CVE-2019-20392, upgrade to libyang version 1.0-r1 or later.
CVE-2019-20392 affects libyang versions below 1.0-r1 as well as earlier versions like 0.11-r1 through 0.16-r3.
Failing to address CVE-2019-20392 may result in application crashes when parsing untrusted YANG files.
Libyang is a YANG data modeling library that is vulnerable in certain versions, specifically due to an invalid memory access issue noted in CVE-2019-20392.