In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
| Software | From | Fixed in |
|---|---|---|
| cesnet / libyang | 1.0-r1 | 1.0-r1.x |
| cesnet / libyang | 1.0-r2 | 1.0-r2.x |
| cesnet / libyang | 1.0-r3 | 1.0-r3.x |
| cesnet / libyang | 1.0-r4 | 1.0-r4.x |
| cesnet / libyang | 0.16-r1 | 0.16-r1.x |
| cesnet / libyang | 0.16-r2 | 0.16-r2.x |
| cesnet / libyang | 0.16-r3 | 0.16-r3.x |
| cesnet / libyang | 0.13-r1 | 0.13-r1.x |
| cesnet / libyang | 0.13-r2 | 0.13-r2.x |
| cesnet / libyang | 0.12-r1 | 0.12-r1.x |
| cesnet / libyang | 0.12-r2 | 0.12-r2.x |
| cesnet / libyang | 0.11-r1 | 0.11-r1.x |
| cesnet / libyang | 0.11-r2 | 0.11-r2.x |
| cesnet / libyang | 0.14-r1 | 0.14-r1.x |
| cesnet / libyang | 0.15-r1 | 0.15-r1.x |
| redhat / enterprise_linux | 8.0 | 8.0.x |
| fedoraproject / fedora | 31 | 31.x |