Description
libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can supply LYB data to any libyang consumer (NETCONF server, sysrepo, etc.) can trigger a crash or potential heap corruption. This vulnerability is fixed in SO 5.2.15.
Published: 2026-05-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The reported flaw resides in the lyb_read_string() routine of the libyang library. An integer overflow occurs when the function processes a maliciously crafted LYB binary blob, resulting in a heap buffer overflow. This can cause the application to crash or, if the memory is overwritten, to corrupt critical data in memory, potentially leading to denial of service or giving an attacker the ability to execute arbitrary code. The weakness is a classic integer overflow leading to uncontrolled memory writes, which is documented as CWE-190.

Affected Systems

This vulnerability affects the CESNET libyang package before the addition of the SO 5.2.15 release. Any program that depends on an unpatched libyang instance – for instance NETCONF servers, sysrepo instances, or other YANG-aware services – may be impacted. The patch is implemented in version 5.2.15 and later, so systems using an older release of this library should verify their version and upgrade promptly.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity. EPSS data is not available, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers who can supply LYB data to the affected program can exploit the overflow; in practice, this means that a remote entity can potentially send maliciousLYB payloads over a network protocol such as NETCONF or other interfaces that accept LYB data. While the description does not enumerate reader restrictions, it is inferred that a remote vector is plausible when the consumer is exposed.

Generated by OpenCVE AI on May 14, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the libyang 5.2.15 or newer release to all affected systems.
  • Upgrade all dependent applications – such as NETCONF servers and sysrepo – to versions that bundle the patched libyang library.
  • If an upgrade cannot be performed immediately, block or enforce strict validation on incoming LYB payloads, or configure the consuming application to reject LYB format entirely.

Generated by OpenCVE AI on May 14, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Cesnet
Cesnet libyang
Vendors & Products Cesnet
Cesnet libyang

Thu, 14 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can supply LYB data to any libyang consumer (NETCONF server, sysrepo, etc.) can trigger a crash or potential heap corruption. This vulnerability is fixed in SO 5.2.15.
Title libyang: lyb_read_string() integer overflow → heap buffer overflow
Weaknesses CWE-190
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T14:19:01.227Z

Reserved: 2026-05-07T16:20:08.659Z

Link: CVE-2026-44673

cve-icon Vulnrichment

Updated: 2026-05-15T14:18:56.857Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T21:16:47.500

Modified: 2026-05-15T15:16:53.830

Link: CVE-2026-44673

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T21:30:12Z

Weaknesses