CVE-2016-5384

fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-2601.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3644 Third Party Advisory
http://www.securityfocus.com/bid/92339 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3063-1 Third Party Advisory
https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/
https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html Mailing List Patch Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2601.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3644 Third Party Advisory
http://www.securityfocus.com/bid/92339 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3063-1 Third Party Advisory
https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/
https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:fontconfig_project:fontconfig:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2601.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2601.html - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3644 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3644 - Third Party Advisory
References () http://www.securityfocus.com/bid/92339 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92339 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-3063-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3063-1 - Third Party Advisory
References () https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 - Patch, Third Party Advisory () https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 - Patch, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/ -
References () https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html - Mailing List, Patch, Third Party Advisory () https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html - Mailing List, Patch, Third Party Advisory

Information

Published : 2016-08-13 01:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5384

Mitre link : CVE-2016-5384

CVE.ORG link : CVE-2016-5384


JSON object : View

Products Affected

canonical

  • ubuntu_linux

debian

  • debian_linux

fedoraproject

  • fedora

fontconfig_project

  • fontconfig
CWE
CWE-415

Double Free