In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
[
{
"target": {
"file": "src/parser.c"
},
"source": "https://github.com/cesnet/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6",
"digest": {
"threshold": 0.9,
"line_hashes": [
"292995609282841363669975935046566204682",
"149517033522983099106477072070701937564",
"297297297624460440254951196547675551567",
"72996930533404138982397399557811059557",
"274334248161745766359455477880545863750",
"199060229445835364465972116034786537046"
]
},
"signature_version": "v1",
"id": "CVE-2019-19334-0fc85d57",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"file": "src/parser.c",
"function": "make_canonical"
},
"source": "https://github.com/cesnet/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6",
"digest": {
"length": 3550.0,
"function_hash": "264754062392839519042860666898880122305"
},
"signature_version": "v1",
"id": "CVE-2019-19334-8e9f3d59",
"deprecated": false,
"signature_type": "Function"
}
]