File _patchinfo of Package patchinfo.25793

<patchinfo incident="25793">
  <issue tracker="cve" id="2021-28903"/>
  <issue tracker="cve" id="2021-28906"/>
  <issue tracker="cve" id="2021-28902"/>
  <issue tracker="cve" id="2021-28904"/>
  <issue tracker="bnc" id="1186376">VUL-0: CVE-2021-28904: libyang: In function ext_get_plugin() in libyang &lt;= v1.0.225, it doesn't check whether the value of revision is NULL, which could lead to a DoS</issue>
  <issue tracker="bnc" id="1186378">VUL-0: CVE-2021-28906: libyang: In function read_yin_leaf() in libyang &lt;= v1.0.225, it doesn't check whether the value of retval-&gt;ext[r] is NULL. In some cases, it can be NULL, which leads to a DoS</issue>
  <issue tracker="bnc" id="1186375">VUL-0: CVE-2021-28903: libyang: A stack overflow in libyang &lt;= v1.0.225 can cause a denial of service through function lyxml_parse_mem().</issue>
  <issue tracker="bnc" id="1186374">VUL-0: CVE-2021-28902: libyang: In function read_yin_container() in libyang &lt;= v1.0.225, it doesn't check whether the value of retval-&gt;ext[r] is NULL. In some cases, it can be NULL, which leads to a DoS</issue>
  <packager>dspinella</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for libyang</summary>
  <description>This update for libyang fixes the following issues:

- CVE-2021-28906: Fixed missing check in read_yin_leaf that can lead to DoS (bsc#1186378)
- CVE-2021-28904: Fixed missing check in ext_get_plugin that lead to DoS (bsc#1186376).
- CVE-2021-28903: Fixed stack overflow in lyxml_parse_mem (bsc#1186375).
- CVE-2021-28902: Fixed missing check in read_yin_container that can lead to DoS (bsc#1186374).
</description>
</patchinfo>
openSUSE Build Service is sponsored by