http://bugzilla.opensuse.org/show_bug.cgi?id=1158631 Bug ID: 1158631 Summary: VUL-0: CVE-2019-19333: libyang: stack-based buffer overflow in make_canonical when bits leaf type is used Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.1 Hardware: Other URL: https://smash.suse.de/issue/248485/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: mardnh@gmx.de Reporter: rfrohl@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- rh#1779573 libyang up to version 1 release 4 has a stack-based buffer overflow in function make_canonical() in parser.c, when dealing with "bits" types with a name longer than 511 bytes. An application that uses libyang to validate untrusted YANG files could be vulnerable to this flaw, which could be used by an attacker to cause a denial of service or possibly gain code execution. References: https://bugzilla.redhat.com/show_bug.cgi?id=1779573 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19333 -- You are receiving this mail because: You are on the CC list for the bug.