CVE-2018-19591

NameCVE-2018-19591
DescriptionIn the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs914837

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)bullseye (security), bullseye2.31-13+deb11u10fixed
bookworm, bookworm (security)2.36-9+deb12u7fixed
trixie2.38-14fixed
sid2.39-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)(unfixed)
glibcsourcejessie(not affected)
glibcsourcestretch(not affected)
glibcsource(unstable)2.28-1914837

Notes

[stretch] - glibc <not-affected> (Vulnerable code introduced later and not backported to stretch)
[jessie] - glibc <not-affected> (Vulnerable code introduced later and not backported to jessie)
https://sourceware.org/bugzilla/show_bug.cgi?id=23927
Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d527c860f5a3f0ed687bd03f0cb464612dc23408
Introduced by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=2180fee114b778515b3f560e5ff1e795282e60b0

Search for package or bug name: Reporting problems