Cesnet

Libyang

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 11.04.2023 12:15:07
  • Zuletzt bearbeitet 11.02.2025 16:15:36

libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lysp_stmt_validate_value at lys_parse_mem.c.

  • EPSS 0.06%
  • Veröffentlicht 03.04.2023 22:15:07
  • Zuletzt bearbeitet 18.02.2025 17:15:16

libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lys_parse_mem at lys_parse_mem.c.

Exploit
  • EPSS 0.13%
  • Veröffentlicht 20.05.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:22

In function read_yin_leaf() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.

Exploit
  • EPSS 0.41%
  • Veröffentlicht 20.05.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:22

In function lys_node_free() in libyang <= v1.0.225, it asserts that the value of node->module can't be NULL. But in some cases, node->module can be null, which triggers a reachable assertion (CWE-617).

Exploit
  • EPSS 0.37%
  • Veröffentlicht 20.05.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:22

In function ext_get_plugin() in libyang <= v1.0.225, it doesn't check whether the value of revision is NULL. If revision is NULL, the operation of strcmp(revision, ext_plugins[u].revision) will lead to a crash.

Exploit
  • EPSS 1.02%
  • Veröffentlicht 20.05.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:22

A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem(). lyxml_parse_elem() function will be called recursively, which will consume stack space and lead to crash.

Exploit
  • EPSS 0.13%
  • Veröffentlicht 20.05.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:22

In function read_yin_container() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.

  • EPSS 0.4%
  • Veröffentlicht 22.01.2020 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:38:23

A double-free is present in libyang before v1.0-r1 in the function yyparse() when an organization field is not terminated. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or ...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 22.01.2020 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:38:23

A NULL pointer dereference is present in libyang before v1.0-r3 in the function lys_extension_instances_free() due to a copy of unresolved extensions in lys_restr_dup(). Applications that use libyang to parse untrusted input yang files may crash.

Exploit
  • EPSS 0.26%
  • Veröffentlicht 22.01.2020 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:38:23

A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing.