Bugzilla – Bug 1186375
VUL-0: CVE-2021-28903: libyang: A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem().
Last modified: 2024-05-23 09:45:06 UTC
CVE-2021-28903 A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem(). lyxml_parse_elem() function will be called recursively, which will consume stack space and lead to crash. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28903 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28903 https://github.com/CESNET/libyang/issues/1453
Affected packages: - SUSE:SLE-15-SP3:Update/libyang 1.0.184 - openSUSE:Factory/libyang 1.0.184 Upstream patch [0]. [0] https://github.com/CESNET/libyang/commit/298b30ea4ebee137226acf9bb38678bd82704582.patch
(In reply to Gianluca Gabrielli from comment #1) > Affected packages: > > - SUSE:SLE-15-SP3:Update/libyang 1.0.184 Hi, could you please provide a fix for this bug please? :)
Thanks to Danilo Spinella, done for 15sp3/libyang. Reassigning to openSUSE maintainer. When done, please reassign to security-team@suse.de. Might be that libyang in Factory is not affected at all. Could you please help us by stating this fact in *.changes file?
SUSE-SU-2022:3245-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1186374,1186375,1186376,1186378 CVE References: CVE-2021-28902,CVE-2021-28903,CVE-2021-28904,CVE-2021-28906 JIRA References: Sources used: openSUSE Leap 15.4 (src): libyang-1.0.184-150300.3.6.1 openSUSE Leap 15.3 (src): libyang-1.0.184-150300.3.6.1 SUSE Linux Enterprise Module for Server Applications 15-SP4 (src): libyang-1.0.184-150300.3.6.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): libyang-1.0.184-150300.3.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Closing bug as resolved.