A double-free is present in libyang before v1.0-r3 in the function yyparse() when a type statement in used in a notification statement. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
References
Link | Resource |
---|---|
https://github.com/CESNET/libyang/commit/6cc51b1757dfbb7cff92de074ada65e8523289a6 | Patch Third Party Advisory |
https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3 | Third Party Advisory |
https://github.com/CESNET/libyang/issues/769 | Exploit Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1793932 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-01-22 14:15
Updated : 2020-01-23 13:29
NVD link : CVE-2019-20394
Mitre link : CVE-2019-20394
JSON object : View
CWE
CWE-415
Double Free
Products Affected
cesnet
- libyang