{"id":"RHEA-2021:1906","summary":"Red Hat Enhancement Advisory: libyang bug fix and enhancement update","modified":"2025-11-22T12:15:36Z","published":"2024-09-16T05:19:16Z","upstream":["CVE-2019-20391","CVE-2019-20392","CVE-2019-20393","CVE-2019-20394","CVE-2019-20395","CVE-2019-20396","CVE-2019-20397","CVE-2019-20398"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHEA-2021:1906"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1910046"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhea-2021_1906.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20391"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20391"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20391"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20392"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793922"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20392"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20392"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20393"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793930"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20393"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20393"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20394"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20394"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20394"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20395"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793924"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20395"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20395"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20396"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20396"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20397"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793928"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20397"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20397"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793935"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20398"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20398"}],"affected":[{"package":{"name":"libyang","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libyang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.184-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2021:1906.json"}},{"package":{"name":"libyang-cpp-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libyang-cpp-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.184-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2021:1906.json"}},{"package":{"name":"libyang-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libyang-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.184-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2021:1906.json"}},{"package":{"name":"libyang-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libyang-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.184-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2021:1906.json"}},{"package":{"name":"python3-libyang-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/python3-libyang-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.184-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2021:1906.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}