Home

Description

libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can supply LYB data to any libyang consumer (NETCONF server, sysrepo, etc.) can trigger a crash or potential heap corruption. This vulnerability is fixed in SO 5.2.15.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-14 | Updated 2026-05-15 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

< SO 5.2.15
affected

References

github.com/...ibyang/security/advisories/GHSA-vw2p-pq79-92xh exploit

github.com/...ibyang/security/advisories/GHSA-vw2p-pq79-92xh

cve.org (CVE-2026-44673)

nvd.nist.gov (CVE-2026-44673)

Download JSON