fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
References
Link | Resource |
---|---|
https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html | Mailing List Patch Third Party Advisory |
https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 | Patch Third Party Advisory |
http://www.debian.org/security/2016/dsa-3644 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-3063-1 | Third Party Advisory |
http://www.securityfocus.com/bid/92339 | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2016-2601.html | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2016-08-12 18:59
Updated : 2023-02-12 15:23
NVD link : CVE-2016-5384
Mitre link : CVE-2016-5384
JSON object : View
CWE
CWE-415
Double Free
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
fontconfig_project
- fontconfig
fedoraproject
- fedora