Description
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
References (5)
Core 5
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19334
Patch, Third Party Advisory x_refsource_confirm
https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PETB6TVMFV5KUD4IKVP2JPLBCYHUGSAJ/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RL54JMS7XW7PI6JC4BFSNNLSX5AINQUL/
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4360
Scores
CVSS v3
9.8
EPSS
0.0066
EPSS Percentile
71.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-121
CWE-787
Status
published
Products (9)
cesnet/libyang
0.11 r1 (2 CPE variants)
cesnet/libyang
0.12 r1 (2 CPE variants)
cesnet/libyang
0.13 r1 (2 CPE variants)
cesnet/libyang
0.14 r1
cesnet/libyang
0.15 r1
cesnet/libyang
0.16 r1 (3 CPE variants)
cesnet/libyang
1.0 r1 (4 CPE variants)
fedoraproject/fedora
31
redhat/enterprise_linux
8.0
Published
Dec 06, 2019
Tracked Since
Feb 18, 2026