First published: Wed Jan 22 2020(Updated: )
A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libyang | <1.0 | 1.0 |
CESNET libyang | =0.11-r1 | |
CESNET libyang | =0.11-r2 | |
CESNET libyang | =0.12-r1 | |
CESNET libyang | =0.12-r2 | |
CESNET libyang | =0.13-r1 | |
CESNET libyang | =0.13-r2 | |
CESNET libyang | =0.14-r1 | |
CESNET libyang | =0.15-r1 | |
CESNET libyang | =0.16-r1 | |
CESNET libyang | =0.16-r2 | |
CESNET libyang | =0.16-r3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20395 has a high severity level due to the potential for a stack overflow leading to application crashes.
To fix CVE-2019-20395, update libyang to version 1.0-r1 or later.
CVE-2019-20395 affects libyang versions prior to 1.0-r1, including various 0.x and 0.1 versions.
CVE-2019-20395 is a stack consumption issue that can cause crashes due to self-referential union types with leafrefs.
Applications that use libyang to parse untrusted YANG files are impacted by CVE-2019-20395.