vulnerability

Red Hat: CVE-2019-19333: CVE-2019-19333 libyang: stack-based buffer overflow in make_canonical when bits leaf type is used (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
2019-12-06
Added
2019-12-27
Modified
2023-12-15

Description

In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "bits". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.

Solution(s)

redhat-upgrade-libyangredhat-upgrade-libyang-cpp-debuginforedhat-upgrade-libyang-debuginforedhat-upgrade-libyang-debugsourceredhat-upgrade-python3-libyang-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.