fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2601.html | Third Party Advisory |
http://www.debian.org/security/2016/dsa-3644 | Third Party Advisory |
http://www.securityfocus.com/bid/92339 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-3063-1 | Third Party Advisory |
https://cgit.freedesktop.org/fontconfig/commit/?id=7a4a5bd7897d216f0794ca9dbce0a4a5c9d14940 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CJ45VRAMCIISHOVKFVOQYQUSTUJP7FC/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGOS4YYB7UYAWX5AEXJZHDIX4ZMSXSW5/ | |
https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html | Mailing List Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2016-08-12T16:00:00
Updated: 2017-01-12T22:57:01
Reserved: 2016-06-10T00:00:00
Link: CVE-2016-5384
JSON object: View
NVD Information
Status : Modified
Published: 2016-08-13T01:59:05.273
Modified: 2023-02-12T23:23:25.953
Link: CVE-2016-5384
JSON object: View
Redhat Information
No data.
CWE