First published: Wed Jan 22 2020(Updated: )
A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CESNET libyang | =0.11-r1 | |
CESNET libyang | =0.11-r2 | |
CESNET libyang | =0.12-r1 | |
CESNET libyang | =0.12-r2 | |
CESNET libyang | =0.13-r1 | |
CESNET libyang | =0.13-r2 | |
CESNET libyang | =0.14-r1 | |
CESNET libyang | =0.15-r1 | |
CESNET libyang | =0.16-r1 | |
CESNET libyang | =0.16-r2 | |
CESNET libyang | =0.16-r3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20396 has been classified with a high severity due to the potential for denial of service resulting from a segmentation fault.
To fix CVE-2019-20396, update libyang to version 1.0-r1 or later where the vulnerability is addressed.
CVE-2019-20396 affects multiple versions of libyang including 0.11-r1 through 0.16-r3.
CVE-2019-20396 is a denial of service vulnerability caused by a segmentation fault in the parsing function.
Yes, CVE-2019-20396 can be exploited remotely by sending a malformed pattern statement value that triggers the segmentation fault.