Описание
Security update for libyang
This update for libyang fixes the following issues:
- CVE-2021-28906: Fixed missing check in read_yin_leaf that can lead to DoS (bsc#1186378)
- CVE-2021-28904: Fixed missing check in ext_get_plugin that lead to DoS (bsc#1186376).
- CVE-2021-28903: Fixed stack overflow in lyxml_parse_mem (bsc#1186375).
- CVE-2021-28902: Fixed missing check in read_yin_container that can lead to DoS (bsc#1186374).
Список пакетов
SUSE Linux Enterprise Module for Server Applications 15 SP3
SUSE Linux Enterprise Module for Server Applications 15 SP4
openSUSE Leap 15.3
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2022:3245-1
- E-Mail link for SUSE-SU-2022:3245-1
- SUSE Security Ratings
- SUSE Bug 1186374
- SUSE Bug 1186375
- SUSE Bug 1186376
- SUSE Bug 1186378
- SUSE CVE CVE-2021-28902 page
- SUSE CVE CVE-2021-28903 page
- SUSE CVE CVE-2021-28904 page
- SUSE CVE CVE-2021-28906 page
Описание
In function read_yin_container() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
Затронутые продукты
Ссылки
- CVE-2021-28902
- SUSE Bug 1186374
Описание
A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem(). lyxml_parse_elem() function will be called recursively, which will consume stack space and lead to crash.
Затронутые продукты
Ссылки
- CVE-2021-28903
- SUSE Bug 1186375
Описание
In function ext_get_plugin() in libyang <= v1.0.225, it doesn't check whether the value of revision is NULL. If revision is NULL, the operation of strcmp(revision, ext_plugins[u].revision) will lead to a crash.
Затронутые продукты
Ссылки
- CVE-2021-28904
- SUSE Bug 1186376
Описание
In function read_yin_leaf() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
Затронутые продукты
Ссылки
- CVE-2021-28906
- SUSE Bug 1186378