fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2601.html | Third Party Advisory |
http://www.debian.org/security/2016/dsa-3644 | Third Party Advisory |
http://www.securityfocus.com/bid/92339 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-3063-1 | Third Party Advisory |
https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/ | |
https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html | Mailing List Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
12 Feb 2023, 23:23
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file. |
02 Feb 2023, 21:17
Type | Values Removed | Values Added |
---|---|---|
Summary | It was found that cache files were insufficiently validated in fontconfig. A local attacker could create a specially crafted cache file to trigger arbitrary free() calls, which in turn could lead to arbitrary code execution. | |
References |
|
|
31 Jan 2022, 17:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* |
|
References | (UBUNTU) http://www.ubuntu.com/usn/USN-3063-1 - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/92339 - Third Party Advisory, VDB Entry | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ - Mailing List, Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2601.html - Third Party Advisory | |
References | (MLIST) https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html - Mailing List, Patch, Third Party Advisory | |
References | (CONFIRM) https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 - Patch, Third Party Advisory | |
First Time |
Canonical ubuntu Linux
Canonical |
Information
Published : 2016-08-13 01:59
Updated : 2023-12-10 11:46
NVD link : CVE-2016-5384
Mitre link : CVE-2016-5384
CVE.ORG link : CVE-2016-5384
JSON object : View
Products Affected
fedoraproject
- fedora
canonical
- ubuntu_linux
fontconfig_project
- fontconfig
debian
- debian_linux
CWE
CWE-415
Double Free