Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 672228 (CVE-2018-19591)

Summary: <sys-libs/glibc-2.28-r4 - if_nametoindex may not close descriptor
Product: Gentoo Security Reporter: Jeroen Roovers (RETIRED) <jer>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: toolchain
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=patch;h=d527c860f5a3f0ed687bd03f0cb464612dc23408
See Also: https://sourceware.org/bugzilla/show_bug.cgi?id=23927
Whiteboard: A3 [glsa+ cve]
Package list:
Runtime testing required: ---

Description Jeroen Roovers (RETIRED) gentoo-dev 2018-11-29 11:46:49 UTC
In sysdeps/unix/sysv/linux/if_index.c, __if_nametoindex() creates a socket descriptor but does not close it if the 'ifname' parameter is too long. This is a resource leak (CWE-404).

Additionally, it is possible to call getaddrinfo() with a crafted 'node' parameter, that leads to the offending code in __if_nametoindex().

In short, untrusted hostname resolutions (via getaddrinfo()) lead to descriptor exhaustion.

MITRE has assigned CVE-2018-19591 for this issue.

Attribution: Guido Vranken
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2019-05-01 18:50:11 UTC
All affected packages are masked. No cleanup (toolchain package).
Security please proceed.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2019-08-15 15:40:11 UTC
This issue was resolved and addressed in
 GLSA 201908-06 at https://security.gentoo.org/glsa/201908-06
by GLSA coordinator Aaron Bauman (b-man).