Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-15270 (GCVE-0-2025-15270)
Vulnerability from cvelistv5 – Published: 2025-12-31 06:58 – Updated: 2025-12-31 16:58- CWE-129 - Improper Validation of Array Index
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-15270",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-31T16:50:13.386457Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-31T16:58:50.233Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "FontForge",
"vendor": "FontForge",
"versions": [
{
"status": "affected",
"version": "aca4f524c6cb14cdc7bc4cd493492a33f5154797"
}
]
}
],
"dateAssigned": "2025-12-29T20:00:37.054Z",
"datePublic": "2025-12-29T22:57:07.701Z",
"descriptions": [
{
"lang": "en",
"value": "FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-129",
"description": "CWE-129: Improper Validation of Array Index",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-31T06:58:49.796Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-25-1194",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2025-15270",
"datePublished": "2025-12-31T06:58:49.796Z",
"dateReserved": "2025-12-29T20:00:37.012Z",
"dateUpdated": "2025-12-31T16:58:50.233Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-15270\",\"sourceIdentifier\":\"zdi-disclosures@trendmicro.com\",\"published\":\"2025-12-31T07:15:50.897\",\"lastModified\":\"2026-01-07T16:11:14.940\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-129\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fontforge:fontforge:2025-11-17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A9337A-AD25-4C56-964A-CCD44CEF611F\"}]}]}],\"references\":[{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-25-1194/\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-15270\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-31T16:50:13.386457Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-31T16:50:14.189Z\"}}], \"cna\": {\"title\": \"FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability\", \"source\": {\"lang\": \"en\", \"value\": \"Anonymous\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"FontForge\", \"product\": \"FontForge\", \"versions\": [{\"status\": \"affected\", \"version\": \"aca4f524c6cb14cdc7bc4cd493492a33f5154797\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2025-12-29T22:57:07.701Z\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-25-1194/\", \"name\": \"ZDI-25-1194\", \"tags\": [\"x_research-advisory\"]}], \"dateAssigned\": \"2025-12-29T20:00:37.054Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\\n\\nThe specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-129\", \"description\": \"CWE-129: Improper Validation of Array Index\"}]}], \"providerMetadata\": {\"orgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"shortName\": \"zdi\", \"dateUpdated\": \"2025-12-31T06:58:49.796Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-15270\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-31T16:58:50.233Z\", \"dateReserved\": \"2025-12-29T20:00:37.012Z\", \"assignerOrgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"datePublished\": \"2025-12-31T06:58:49.796Z\", \"assignerShortName\": \"zdi\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:6631
Vulnerability from csaf_redhat - Published: 2026-04-06 06:36 - Updated: 2026-04-08 13:34A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fontforge is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts. \n\nSecurity Fix(es):\n\n* fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6631",
"url": "https://access.redhat.com/errata/RHSA-2026:6631"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6631.json"
}
],
"title": "Red Hat Security Advisory: fontforge security update",
"tracking": {
"current_release_date": "2026-04-08T13:34:40+00:00",
"generator": {
"date": "2026-04-08T13:34:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:6631",
"initial_release_date": "2026-04-06T06:36:19+00:00",
"revision_history": [
{
"date": "2026-04-06T06:36:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-06T06:36:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-08T13:34:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20230101-15.el10_1.src",
"product": {
"name": "fontforge-0:20230101-15.el10_1.src",
"product_id": "fontforge-0:20230101-15.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20230101-15.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20230101-15.el10_1.aarch64",
"product": {
"name": "fontforge-0:20230101-15.el10_1.aarch64",
"product_id": "fontforge-0:20230101-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20230101-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"product": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"product_id": "fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20230101-15.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"product": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"product_id": "fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20230101-15.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20230101-15.el10_1.ppc64le",
"product": {
"name": "fontforge-0:20230101-15.el10_1.ppc64le",
"product_id": "fontforge-0:20230101-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20230101-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"product": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"product_id": "fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20230101-15.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"product": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"product_id": "fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20230101-15.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20230101-15.el10_1.s390x",
"product": {
"name": "fontforge-0:20230101-15.el10_1.s390x",
"product_id": "fontforge-0:20230101-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20230101-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20230101-15.el10_1.s390x",
"product": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.s390x",
"product_id": "fontforge-debugsource-0:20230101-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20230101-15.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"product": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"product_id": "fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20230101-15.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20230101-15.el10_1.x86_64",
"product": {
"name": "fontforge-0:20230101-15.el10_1.x86_64",
"product_id": "fontforge-0:20230101-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20230101-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20230101-15.el10_1.x86_64",
"product": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.x86_64",
"product_id": "fontforge-debugsource-0:20230101-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20230101-15.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"product": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"product_id": "fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20230101-15.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20230101-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-0:20230101-15.el10_1.aarch64"
},
"product_reference": "fontforge-0:20230101-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20230101-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-0:20230101-15.el10_1.ppc64le"
},
"product_reference": "fontforge-0:20230101-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20230101-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-0:20230101-15.el10_1.s390x"
},
"product_reference": "fontforge-0:20230101-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20230101-15.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-0:20230101-15.el10_1.src"
},
"product_reference": "fontforge-0:20230101-15.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20230101-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-0:20230101-15.el10_1.x86_64"
},
"product_reference": "fontforge-0:20230101-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.aarch64"
},
"product_reference": "fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.ppc64le"
},
"product_reference": "fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.s390x"
},
"product_reference": "fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20230101-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.x86_64"
},
"product_reference": "fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.aarch64"
},
"product_reference": "fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.ppc64le"
},
"product_reference": "fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.s390x"
},
"product_reference": "fontforge-debugsource-0:20230101-15.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20230101-15.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.x86_64"
},
"product_reference": "fontforge-debugsource-0:20230101-15.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-15270",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2025-12-31T08:01:41.978441+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426434"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows remote code execution in FontForge. Exploitation requires user interaction, where a target must open a specially crafted SFD file. This affects systems where FontForge is installed and used to process untrusted font files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.src",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15270"
},
{
"category": "external",
"summary": "RHBZ#2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15270"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/"
}
],
"release_date": "2025-12-31T06:58:49.796000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-06T06:36:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.src",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6631"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted SFD (Spline Font Database) files with FontForge. If FontForge is not required, consider removing the `fontforge` package to eliminate the attack surface.\n\nTo remove the package on Red Hat Enterprise Linux:\n`sudo yum remove fontforge` (for RHEL 6/7)\n`sudo dnf remove fontforge` (for RHEL 8/9/10 and Fedora)\n\nRemoving this package may impact functionality that relies on FontForge.",
"product_ids": [
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.src",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.src",
"CRB-10.1.Z:fontforge-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debuginfo-0:20230101-15.el10_1.x86_64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.aarch64",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.ppc64le",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.s390x",
"CRB-10.1.Z:fontforge-debugsource-0:20230101-15.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing"
}
]
}
RHSA-2026:7001
Vulnerability from csaf_redhat - Published: 2026-04-08 07:20 - Updated: 2026-04-08 13:34A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fontforge is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts. \n\nSecurity Fix(es):\n\n* fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7001",
"url": "https://access.redhat.com/errata/RHSA-2026:7001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7001.json"
}
],
"title": "Red Hat Security Advisory: fontforge security update",
"tracking": {
"current_release_date": "2026-04-08T13:34:40+00:00",
"generator": {
"date": "2026-04-08T13:34:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:7001",
"initial_release_date": "2026-04-08T07:20:26+00:00",
"revision_history": [
{
"date": "2026-04-08T07:20:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-08T07:20:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-08T13:34:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-7.el9_4.src",
"product": {
"name": "fontforge-0:20201107-7.el9_4.src",
"product_id": "fontforge-0:20201107-7.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-7.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-7.el9_4.aarch64",
"product": {
"name": "fontforge-0:20201107-7.el9_4.aarch64",
"product_id": "fontforge-0:20201107-7.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-7.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"product": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"product_id": "fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-7.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"product": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"product_id": "fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-7.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-7.el9_4.ppc64le",
"product": {
"name": "fontforge-0:20201107-7.el9_4.ppc64le",
"product_id": "fontforge-0:20201107-7.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-7.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"product": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"product_id": "fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-7.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"product": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"product_id": "fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-7.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-7.el9_4.i686",
"product": {
"name": "fontforge-0:20201107-7.el9_4.i686",
"product_id": "fontforge-0:20201107-7.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-7.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-7.el9_4.i686",
"product": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.i686",
"product_id": "fontforge-debugsource-0:20201107-7.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-7.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-7.el9_4.i686",
"product": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.i686",
"product_id": "fontforge-debuginfo-0:20201107-7.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-7.el9_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-7.el9_4.x86_64",
"product": {
"name": "fontforge-0:20201107-7.el9_4.x86_64",
"product_id": "fontforge-0:20201107-7.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-7.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-7.el9_4.x86_64",
"product": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.x86_64",
"product_id": "fontforge-debugsource-0:20201107-7.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-7.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"product": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"product_id": "fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-7.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-7.el9_4.s390x",
"product": {
"name": "fontforge-0:20201107-7.el9_4.s390x",
"product_id": "fontforge-0:20201107-7.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-7.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-7.el9_4.s390x",
"product": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.s390x",
"product_id": "fontforge-debugsource-0:20201107-7.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-7.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"product": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"product_id": "fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-7.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-7.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.aarch64"
},
"product_reference": "fontforge-0:20201107-7.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-7.el9_4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.i686"
},
"product_reference": "fontforge-0:20201107-7.el9_4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-7.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.ppc64le"
},
"product_reference": "fontforge-0:20201107-7.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-7.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.s390x"
},
"product_reference": "fontforge-0:20201107-7.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-7.el9_4.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.src"
},
"product_reference": "fontforge-0:20201107-7.el9_4.src",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-7.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.x86_64"
},
"product_reference": "fontforge-0:20201107-7.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.aarch64"
},
"product_reference": "fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.i686"
},
"product_reference": "fontforge-debuginfo-0:20201107-7.el9_4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.ppc64le"
},
"product_reference": "fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.s390x"
},
"product_reference": "fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-7.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.x86_64"
},
"product_reference": "fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.aarch64"
},
"product_reference": "fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.i686"
},
"product_reference": "fontforge-debugsource-0:20201107-7.el9_4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.ppc64le"
},
"product_reference": "fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.s390x"
},
"product_reference": "fontforge-debugsource-0:20201107-7.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-7.el9_4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.x86_64"
},
"product_reference": "fontforge-debugsource-0:20201107-7.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-15270",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2025-12-31T08:01:41.978441+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426434"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows remote code execution in FontForge. Exploitation requires user interaction, where a target must open a specially crafted SFD file. This affects systems where FontForge is installed and used to process untrusted font files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.src",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15270"
},
{
"category": "external",
"summary": "RHBZ#2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15270"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/"
}
],
"release_date": "2025-12-31T06:58:49.796000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T07:20:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.src",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7001"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted SFD (Spline Font Database) files with FontForge. If FontForge is not required, consider removing the `fontforge` package to eliminate the attack surface.\n\nTo remove the package on Red Hat Enterprise Linux:\n`sudo yum remove fontforge` (for RHEL 6/7)\n`sudo dnf remove fontforge` (for RHEL 8/9/10 and Fedora)\n\nRemoving this package may impact functionality that relies on FontForge.",
"product_ids": [
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.src",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.src",
"CRB-9.4.0.Z.EUS:fontforge-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debuginfo-0:20201107-7.el9_4.x86_64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.aarch64",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.i686",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.ppc64le",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.s390x",
"CRB-9.4.0.Z.EUS:fontforge-debugsource-0:20201107-7.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing"
}
]
}
RHSA-2026:6628
Vulnerability from csaf_redhat - Published: 2026-04-06 05:23 - Updated: 2026-04-08 13:34A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fontforge is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts. \n\nSecurity Fix(es):\n\n* fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6628",
"url": "https://access.redhat.com/errata/RHSA-2026:6628"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6628.json"
}
],
"title": "Red Hat Security Advisory: fontforge security update",
"tracking": {
"current_release_date": "2026-04-08T13:34:36+00:00",
"generator": {
"date": "2026-04-08T13:34:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:6628",
"initial_release_date": "2026-04-06T05:23:14+00:00",
"revision_history": [
{
"date": "2026-04-06T05:23:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-06T05:23:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-08T13:34:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_7.x86_64",
"product": {
"name": "fontforge-0:20201107-8.el9_7.x86_64",
"product_id": "fontforge-0:20201107-8.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_7.x86_64",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.x86_64",
"product_id": "fontforge-debugsource-0:20201107-8.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_7.i686",
"product": {
"name": "fontforge-0:20201107-8.el9_7.i686",
"product_id": "fontforge-0:20201107-8.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_7.i686",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.i686",
"product_id": "fontforge-debugsource-0:20201107-8.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_7.i686",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.i686",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_7.s390x",
"product": {
"name": "fontforge-0:20201107-8.el9_7.s390x",
"product_id": "fontforge-0:20201107-8.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_7.s390x",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.s390x",
"product_id": "fontforge-debugsource-0:20201107-8.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_7.src",
"product": {
"name": "fontforge-0:20201107-8.el9_7.src",
"product_id": "fontforge-0:20201107-8.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_7.aarch64",
"product": {
"name": "fontforge-0:20201107-8.el9_7.aarch64",
"product_id": "fontforge-0:20201107-8.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"product_id": "fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_7.ppc64le",
"product": {
"name": "fontforge-0:20201107-8.el9_7.ppc64le",
"product_id": "fontforge-0:20201107-8.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"product_id": "fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.aarch64"
},
"product_reference": "fontforge-0:20201107-8.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.i686"
},
"product_reference": "fontforge-0:20201107-8.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.ppc64le"
},
"product_reference": "fontforge-0:20201107-8.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.s390x"
},
"product_reference": "fontforge-0:20201107-8.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.src"
},
"product_reference": "fontforge-0:20201107-8.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.x86_64"
},
"product_reference": "fontforge-0:20201107-8.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.aarch64"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.i686"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.ppc64le"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.s390x"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.x86_64"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.aarch64"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.i686"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.ppc64le"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.s390x"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.x86_64"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-15270",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2025-12-31T08:01:41.978441+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426434"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows remote code execution in FontForge. Exploitation requires user interaction, where a target must open a specially crafted SFD file. This affects systems where FontForge is installed and used to process untrusted font files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.src",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15270"
},
{
"category": "external",
"summary": "RHBZ#2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15270"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/"
}
],
"release_date": "2025-12-31T06:58:49.796000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-06T05:23:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.src",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6628"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted SFD (Spline Font Database) files with FontForge. If FontForge is not required, consider removing the `fontforge` package to eliminate the attack surface.\n\nTo remove the package on Red Hat Enterprise Linux:\n`sudo yum remove fontforge` (for RHEL 6/7)\n`sudo dnf remove fontforge` (for RHEL 8/9/10 and Fedora)\n\nRemoving this package may impact functionality that relies on FontForge.",
"product_ids": [
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.src",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.src",
"CRB-9.7.0.Z.MAIN:fontforge-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debuginfo-0:20201107-8.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.i686",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:fontforge-debugsource-0:20201107-8.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing"
}
]
}
RHSA-2026:6635
Vulnerability from csaf_redhat - Published: 2026-04-06 07:50 - Updated: 2026-04-08 13:34A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fontforge is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts. \n\nSecurity Fix(es):\n\n* fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6635",
"url": "https://access.redhat.com/errata/RHSA-2026:6635"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6635.json"
}
],
"title": "Red Hat Security Advisory: fontforge security update",
"tracking": {
"current_release_date": "2026-04-08T13:34:43+00:00",
"generator": {
"date": "2026-04-08T13:34:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:6635",
"initial_release_date": "2026-04-06T07:50:34+00:00",
"revision_history": [
{
"date": "2026-04-06T07:50:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-06T07:50:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-08T13:34:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_6.src",
"product": {
"name": "fontforge-0:20201107-8.el9_6.src",
"product_id": "fontforge-0:20201107-8.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_6.aarch64",
"product": {
"name": "fontforge-0:20201107-8.el9_6.aarch64",
"product_id": "fontforge-0:20201107-8.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"product_id": "fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_6.ppc64le",
"product": {
"name": "fontforge-0:20201107-8.el9_6.ppc64le",
"product_id": "fontforge-0:20201107-8.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"product_id": "fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_6.i686",
"product": {
"name": "fontforge-0:20201107-8.el9_6.i686",
"product_id": "fontforge-0:20201107-8.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_6.i686",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.i686",
"product_id": "fontforge-debugsource-0:20201107-8.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_6.i686",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.i686",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_6.x86_64",
"product": {
"name": "fontforge-0:20201107-8.el9_6.x86_64",
"product_id": "fontforge-0:20201107-8.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_6.x86_64",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.x86_64",
"product_id": "fontforge-debugsource-0:20201107-8.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-0:20201107-8.el9_6.s390x",
"product": {
"name": "fontforge-0:20201107-8.el9_6.s390x",
"product_id": "fontforge-0:20201107-8.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge@20201107-8.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debugsource-0:20201107-8.el9_6.s390x",
"product": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.s390x",
"product_id": "fontforge-debugsource-0:20201107-8.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debugsource@20201107-8.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"product": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"product_id": "fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fontforge-debuginfo@20201107-8.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.aarch64"
},
"product_reference": "fontforge-0:20201107-8.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.i686"
},
"product_reference": "fontforge-0:20201107-8.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.ppc64le"
},
"product_reference": "fontforge-0:20201107-8.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.s390x"
},
"product_reference": "fontforge-0:20201107-8.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.src"
},
"product_reference": "fontforge-0:20201107-8.el9_6.src",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-0:20201107-8.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.x86_64"
},
"product_reference": "fontforge-0:20201107-8.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.aarch64"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.i686"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.ppc64le"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.s390x"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debuginfo-0:20201107-8.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.x86_64"
},
"product_reference": "fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.aarch64"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.i686"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.ppc64le"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.s390x"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-debugsource-0:20201107-8.el9_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.x86_64"
},
"product_reference": "fontforge-debugsource-0:20201107-8.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-15270",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2025-12-31T08:01:41.978441+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426434"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FontForge. This vulnerability allows a remote attacker to execute arbitrary code by tricking a user into opening a specially crafted SFD (Spline Font Database) file. The issue stems from improper validation of array indexes during SFD file parsing, which can lead to writing data beyond the allocated memory boundary. Successful exploitation results in arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows remote code execution in FontForge. Exploitation requires user interaction, where a target must open a specially crafted SFD file. This affects systems where FontForge is installed and used to process untrusted font files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.src",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15270"
},
{
"category": "external",
"summary": "RHBZ#2426434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15270"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/"
}
],
"release_date": "2025-12-31T06:58:49.796000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-06T07:50:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.src",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6635"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted SFD (Spline Font Database) files with FontForge. If FontForge is not required, consider removing the `fontforge` package to eliminate the attack surface.\n\nTo remove the package on Red Hat Enterprise Linux:\n`sudo yum remove fontforge` (for RHEL 6/7)\n`sudo dnf remove fontforge` (for RHEL 8/9/10 and Fedora)\n\nRemoving this package may impact functionality that relies on FontForge.",
"product_ids": [
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.src",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.src",
"CRB-9.6.0.Z.EUS:fontforge-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debuginfo-0:20201107-8.el9_6.x86_64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.aarch64",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.i686",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.ppc64le",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.s390x",
"CRB-9.6.0.Z.EUS:fontforge-debugsource-0:20201107-8.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "fontforge: FontForge: Remote Code Execution via malicious SFD file parsing"
}
]
}
OPENSUSE-SU-2026:10513-1
Vulnerability from csaf_opensuse - Published: 2026-04-09 00:00 - Updated: 2026-04-09 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "fontforge-20251009-6.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the fontforge-20251009-6.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10513",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10513-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15270 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15270/"
}
],
"title": "fontforge-20251009-6.1 on GA media",
"tracking": {
"current_release_date": "2026-04-09T00:00:00Z",
"generator": {
"date": "2026-04-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10513-1",
"initial_release_date": "2026-04-09T00:00:00Z",
"revision_history": [
{
"date": "2026-04-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fontforge-20251009-6.1.aarch64",
"product": {
"name": "fontforge-20251009-6.1.aarch64",
"product_id": "fontforge-20251009-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "fontforge-devel-20251009-6.1.aarch64",
"product": {
"name": "fontforge-devel-20251009-6.1.aarch64",
"product_id": "fontforge-devel-20251009-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "fontforge-doc-20251009-6.1.aarch64",
"product": {
"name": "fontforge-doc-20251009-6.1.aarch64",
"product_id": "fontforge-doc-20251009-6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-20251009-6.1.ppc64le",
"product": {
"name": "fontforge-20251009-6.1.ppc64le",
"product_id": "fontforge-20251009-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "fontforge-devel-20251009-6.1.ppc64le",
"product": {
"name": "fontforge-devel-20251009-6.1.ppc64le",
"product_id": "fontforge-devel-20251009-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "fontforge-doc-20251009-6.1.ppc64le",
"product": {
"name": "fontforge-doc-20251009-6.1.ppc64le",
"product_id": "fontforge-doc-20251009-6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-20251009-6.1.s390x",
"product": {
"name": "fontforge-20251009-6.1.s390x",
"product_id": "fontforge-20251009-6.1.s390x"
}
},
{
"category": "product_version",
"name": "fontforge-devel-20251009-6.1.s390x",
"product": {
"name": "fontforge-devel-20251009-6.1.s390x",
"product_id": "fontforge-devel-20251009-6.1.s390x"
}
},
{
"category": "product_version",
"name": "fontforge-doc-20251009-6.1.s390x",
"product": {
"name": "fontforge-doc-20251009-6.1.s390x",
"product_id": "fontforge-doc-20251009-6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fontforge-20251009-6.1.x86_64",
"product": {
"name": "fontforge-20251009-6.1.x86_64",
"product_id": "fontforge-20251009-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "fontforge-devel-20251009-6.1.x86_64",
"product": {
"name": "fontforge-devel-20251009-6.1.x86_64",
"product_id": "fontforge-devel-20251009-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "fontforge-doc-20251009-6.1.x86_64",
"product": {
"name": "fontforge-doc-20251009-6.1.x86_64",
"product_id": "fontforge-doc-20251009-6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-20251009-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-20251009-6.1.aarch64"
},
"product_reference": "fontforge-20251009-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-20251009-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-20251009-6.1.ppc64le"
},
"product_reference": "fontforge-20251009-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-20251009-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-20251009-6.1.s390x"
},
"product_reference": "fontforge-20251009-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-20251009-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-20251009-6.1.x86_64"
},
"product_reference": "fontforge-20251009-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-devel-20251009-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-devel-20251009-6.1.aarch64"
},
"product_reference": "fontforge-devel-20251009-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-devel-20251009-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-devel-20251009-6.1.ppc64le"
},
"product_reference": "fontforge-devel-20251009-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-devel-20251009-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-devel-20251009-6.1.s390x"
},
"product_reference": "fontforge-devel-20251009-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-devel-20251009-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-devel-20251009-6.1.x86_64"
},
"product_reference": "fontforge-devel-20251009-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-doc-20251009-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-doc-20251009-6.1.aarch64"
},
"product_reference": "fontforge-doc-20251009-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-doc-20251009-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-doc-20251009-6.1.ppc64le"
},
"product_reference": "fontforge-doc-20251009-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-doc-20251009-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-doc-20251009-6.1.s390x"
},
"product_reference": "fontforge-doc-20251009-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fontforge-doc-20251009-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fontforge-doc-20251009-6.1.x86_64"
},
"product_reference": "fontforge-doc-20251009-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-15270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15270"
}
],
"notes": [
{
"category": "general",
"text": "FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fontforge-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-20251009-6.1.x86_64",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.x86_64",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15270",
"url": "https://www.suse.com/security/cve/CVE-2025-15270"
},
{
"category": "external",
"summary": "SUSE Bug 1256031 for CVE-2025-15270",
"url": "https://bugzilla.suse.com/1256031"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fontforge-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-20251009-6.1.x86_64",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.x86_64",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:fontforge-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-20251009-6.1.x86_64",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-devel-20251009-6.1.x86_64",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.aarch64",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.ppc64le",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.s390x",
"openSUSE Tumbleweed:fontforge-doc-20251009-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-15270"
}
]
}
FKIE_CVE-2025-15270
Vulnerability from fkie_nvd - Published: 2025-12-31 07:15 - Updated: 2026-01-07 16:11| URL | Tags | ||
|---|---|---|---|
| zdi-disclosures@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-25-1194/ | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fontforge:fontforge:2025-11-17:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A9337A-AD25-4C56-964A-CCD44CEF611F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por validaci\u00f3n incorrecta del \u00edndice de la matriz en el an\u00e1lisis de archivos SFD de FontForge. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de FontForge. Se requiere interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso.\n\nLa falla espec\u00edfica reside en el an\u00e1lisis de archivos SFD. El problema se debe a la falta de validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede resultar en una escritura m\u00e1s all\u00e1 del final de una matriz asignada. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. Fue ZDI-CAN-28563."
}
],
"id": "CVE-2025-15270",
"lastModified": "2026-01-07T16:11:14.940",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary"
}
]
},
"published": "2025-12-31T07:15:50.897",
"references": [
{
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194/"
}
],
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-129"
}
],
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary"
}
]
}
GHSA-HP8X-4H95-9799
Vulnerability from github – Published: 2025-12-31 09:30 – Updated: 2025-12-31 09:30FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563.
{
"affected": [],
"aliases": [
"CVE-2025-15270"
],
"database_specific": {
"cwe_ids": [
"CWE-129"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-31T07:15:50Z",
"severity": "HIGH"
},
"details": "FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563.",
"id": "GHSA-hp8x-4h95-9799",
"modified": "2025-12-31T09:30:18Z",
"published": "2025-12-31T09:30:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15270"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1194"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-0967
Vulnerability from csaf_certbund - Published: 2026-04-06 22:00 - Updated: 2026-04-09 22:00| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux (fontforge) ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0967 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0967.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0967 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0967"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6628 vom 2026-04-06",
"url": "https://access.redhat.com/errata/RHSA-2026:6628"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6631 vom 2026-04-06",
"url": "https://access.redhat.com/errata/RHSA-2026:6631"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6635 vom 2026-04-06",
"url": "https://access.redhat.com/errata/RHSA-2026:6635"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7001 vom 2026-04-08",
"url": "https://access.redhat.com/errata/RHSA-2026:7001"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:6628 vom 2026-04-08",
"url": "https://errata.build.resf.org/RLSA-2026:6628"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6628 vom 2026-04-07",
"url": "https://linux.oracle.com/errata/ELSA-2026-6628.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6631 vom 2026-04-08",
"url": "https://linux.oracle.com/errata/ELSA-2026-6631.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:6631 vom 2026-04-09",
"url": "https://errata.build.resf.org/RLSA-2026:6631"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (fontforge): Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:04:24.462+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0967",
"initial_release_date": "2026-04-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10",
"product": {
"name": "Red Hat Enterprise Linux \u003c10",
"product_id": "T052406"
}
},
{
"category": "product_version",
"name": "10",
"product": {
"name": "Red Hat Enterprise Linux 10",
"product_id": "T052406-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9",
"product": {
"name": "Red Hat Enterprise Linux \u003c9",
"product_id": "T052407"
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T052407-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
},
{
"category": "product_version_range",
"name": "Extended Update Support \u003c9.6",
"product": {
"name": "Red Hat Enterprise Linux Extended Update Support \u003c9.6",
"product_id": "T052408"
}
},
{
"category": "product_version",
"name": "Extended Update Support 9.6",
"product": {
"name": "Red Hat Enterprise Linux Extended Update Support 9.6",
"product_id": "T052408-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:extended_update_support__9.6"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-15270",
"product_status": {
"known_affected": [
"T052407",
"67646",
"T052408",
"T052406",
"T004914",
"T032255"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2025-15270"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.