Bugzilla – Bug 992534
VUL-1: CVE-2016-5384: fontconfig: Possible double free due to insufficiently validated cache files
Last modified: 2016-09-28 16:20:24 UTC
Quoting from RH BZ: It was reported that offsets contained in cache files aren't checked if they're in legal ranges or are pointers at all. The lack of validation allows an attacker to trigger arbitrary free() calls, which in turn allows double free attacks and therefore arbitrary code execution. When used with setuid binaries using crafted cachefiles, privilege escalation is possible. rh#1350891 References: https://bugzilla.redhat.com/show_bug.cgi?id=1350891 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5384
https://lists.freedesktop.org/archives/fontconfig/2016-August/005792.html
10sp3 looks not affected (or at least I do not see the code there).
released
SUSE-SU-2016:2186-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 992534 CVE References: CVE-2016-5384 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): fontconfig-2.6.0-10.19.1 SUSE Linux Enterprise Server 11-SP4 (src): fontconfig-2.6.0-10.19.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): fontconfig-2.6.0-10.19.1
SUSE-SU-2016:2190-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 992534 CVE References: CVE-2016-5384 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): fontconfig-2.11.0-6.1 SUSE Linux Enterprise Server 12-SP1 (src): fontconfig-2.11.0-6.1 SUSE Linux Enterprise Desktop 12-SP1 (src): fontconfig-2.11.0-6.1
openSUSE-SU-2016:2272-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 992534 CVE References: CVE-2016-5384 Sources used: openSUSE Leap 42.1 (src): fontconfig-2.11.0-5.1