vulnerability
Red Hat: CVE-2019-19333: CVE-2019-19333 libyang: stack-based buffer overflow in make_canonical when bits leaf type is used (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | 2019-12-06 | 2019-12-27 | 2023-12-15 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
2019-12-06
Added
2019-12-27
Modified
2023-12-15
Description
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "bits". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
Solution(s)
redhat-upgrade-libyangredhat-upgrade-libyang-cpp-debuginforedhat-upgrade-libyang-debuginforedhat-upgrade-libyang-debugsourceredhat-upgrade-python3-libyang-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.