{"id":"CVE-2019-20394","details":"A double-free is present in libyang before v1.0-r3 in the function yyparse() when a type statement in used in a notification statement. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.","modified":"2026-04-11T09:39:53.236695Z","published":"2020-01-22T22:15:10.330Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html"},{"type":"ADVISORY","url":"https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793932"},{"type":"FIX","url":"https://github.com/CESNET/libyang/commit/6cc51b1757dfbb7cff92de074ada65e8523289a6"},{"type":"EVIDENCE","url":"https://github.com/CESNET/libyang/issues/769"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cesnet/libyang","events":[{"introduced":"0"},{"last_affected":"14a95280b2bd77b5fd1d9b5f8af71b15679f1a8f"},{"introduced":"0"},{"last_affected":"ebcf465b4250c869eeb727e64b0caa419ba15465"},{"introduced":"0"},{"last_affected":"4ebd79ec4fc92f7989e45532abc55ef6593b60aa"},{"introduced":"0"},{"last_affected":"7e811613b335afc8e1b2c0ee77e7b3f371bc9175"},{"introduced":"0"},{"last_affected":"ca88008d7068eaefd9cc04b18a523283dae3561e"},{"introduced":"0"},{"last_affected":"0ee330494a94ada40da59ad6037fd3138fe8ec9a"},{"introduced":"0"},{"last_affected":"5ccd6dea3eb7256dbc835507d7253eb5596c31b2"},{"introduced":"0"},{"last_affected":"054ed1fcd480dc4130d98206548c8fe1ac512356"},{"introduced":"0"},{"last_affected":"13b20f94f080cc493b3fd22604d0635585194231"},{"introduced":"0"},{"last_affected":"2ec826a984204d034f43a7ad72d835bc99974ede"},{"introduced":"0"},{"last_affected":"9e316f344e73316bf058ef88bd5ba852ad65ba25"},{"introduced":"0"},{"last_affected":"a3e312c65573d90dd5bedf0744e473a9bbd2ece3"},{"introduced":"0"},{"last_affected":"347246611b85e05d16f54faaa5697c4b2ee4b468"},{"fixed":"6cc51b1757dfbb7cff92de074ada65e8523289a6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.11-r1"},{"introduced":"0"},{"last_affected":"0.11-r2"},{"introduced":"0"},{"last_affected":"0.12-r1"},{"introduced":"0"},{"last_affected":"0.12-r2"},{"introduced":"0"},{"last_affected":"0.13-r1"},{"introduced":"0"},{"last_affected":"0.13-r2"},{"introduced":"0"},{"last_affected":"0.14-r1"},{"introduced":"0"},{"last_affected":"0.15-r1"},{"introduced":"0"},{"last_affected":"0.16-r1"},{"introduced":"0"},{"last_affected":"0.16-r2"},{"introduced":"0"},{"last_affected":"0.16-r3"},{"introduced":"0"},{"last_affected":"1.0-r1"},{"introduced":"0"},{"last_affected":"1.0-r2"}]}}],"versions":["v0.11-r1","v0.11-r2","v0.12-r1","v0.12-r2","v0.13-r1","v0.13-r2","v0.14-r1","v0.15-r1","v0.16-r1","v0.16-r2","v0.16-r3","v1.0-r1","v1.0-r2"],"database_specific":{"vanir_signatures_modified":"2026-04-11T09:39:53Z","vanir_signatures":[{"deprecated":false,"id":"CVE-2019-20394-41732613","signature_version":"v1","signature_type":"Function","source":"https://github.com/cesnet/libyang/commit/6cc51b1757dfbb7cff92de074ada65e8523289a6","target":{"function":"yyparse","file":"src/parser_yang_bis.c"},"digest":{"function_hash":"334333495555913111835902825800076662424","length":121759}},{"deprecated":false,"id":"CVE-2019-20394-c15508ec","signature_version":"v1","signature_type":"Line","source":"https://github.com/cesnet/libyang/commit/6cc51b1757dfbb7cff92de074ada65e8523289a6","target":{"file":"src/parser_yang_bis.c"},"digest":{"line_hashes":["164382308562417233091935855972747064438","44550129803751250994624942069642899974","132892422234432367498765861481733659786","71028133021889715123863036278562934561"],"threshold":0.9}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20394.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}