Description
A double-free is present in libyang before v1.0-r3 in the function yyparse() when a type statement in used in a notification statement. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
References (5)
Core 5
Core References
Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html
Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1793932
Patch, Third Party Advisory
https://github.com/CESNET/libyang/commit/6cc51b1757dfbb7cff92de074ada65e8523289a6
Third Party Advisory
https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3
Exploit, Third Party Advisory
https://github.com/CESNET/libyang/issues/769
Scores
CVSS v3
8.8
EPSS
0.0029
EPSS Percentile
52.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-415
Status
published
Products (7)
cesnet/libyang
0.11 r1 (2 CPE variants)
cesnet/libyang
0.12 r1 (2 CPE variants)
cesnet/libyang
0.13 r1 (2 CPE variants)
cesnet/libyang
0.14 r1
cesnet/libyang
0.15 r1
cesnet/libyang
0.16 r1 (3 CPE variants)
cesnet/libyang
1.0 r1 (2 CPE variants)
Published
Jan 22, 2020
Tracked Since
Feb 18, 2026