CVE-2018-19591
Published: 04 December 2018
In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
eglibc Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(code not present)
|
|
glibc Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.29)
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(2.29-0ubuntu2)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(2.29-0ubuntu2)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2.27-3ubuntu1.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not present)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Patches: Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d527c860f5a3f0ed687bd03f0cb464612dc23408 (master) Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ce6ba630dbc96f49eb1f30366aa62261df4792f9 (2.28) Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9f433fc791ca4f9d678903ff45b504b524c886fb (2.27) Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=a0bc5dd3bed4b04814047265b3bcead7ab973b87 (2.26) |
Notes
Author | Note |
---|---|
ebarretto | In trusty and precise the code that introduced the issue is not present. |
sbeattie | reproducer testcase in upstream bug report introduced in 2180fee114b778515b3f560e5ff1e795282e60b0 (2.27 cycle) |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591
- https://usn.ubuntu.com/usn/usn-4416-1
- NVD
- Launchpad
- Debian