CVE Vulnerabilities

CVE-2016-5384

Double Free

Published: Aug 13, 2016 | Modified: Apr 12, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
3.7 MODERATE
AV:L/AC:H/Au:N/C:P/I:P/A:P
RedHat/V3
4.5 MODERATE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.

Weakness

The product calls free() twice on the same memory address.

Affected Software

NameVendorStart VersionEnd Version
FedoraFedoraproject23 (including)23 (including)
FedoraFedoraproject24 (including)24 (including)
Red Hat Enterprise Linux 7RedHatfontconfig-0:2.10.95-10.el7*
FontconfigUbuntudevel*
FontconfigUbuntuesm-infra-legacy/trusty*
FontconfigUbuntuesm-infra/xenial*
FontconfigUbuntuprecise*
FontconfigUbuntutrusty*
FontconfigUbuntutrusty/esm*
FontconfigUbuntuupstream*
FontconfigUbuntuvivid/stable-phone-overlay*
FontconfigUbuntuxenial*
FontconfigUbuntuyakkety*
FontconfigUbuntuzesty*

Potential Mitigations

References