Source: fontforge
Version: 1:20230101~dfsg-8
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for fontforge.

CVE-2025-15269[0]:
| FontForge SFD File Parsing Use-After-Free Remote Code Execution
| Vulnerability. This vulnerability allows remote attackers to execute
| arbitrary code on affected installations of FontForge. User
| interaction is required to exploit this vulnerability in that the
| target must visit a malicious page or open a malicious file.  The
| specific flaw exists within the parsing of SFD files. The issue
| results from the lack of validating the existence of an object prior
| to performing operations on the object. An attacker can leverage
| this vulnerability to execute code in the context of the current
| user. Was ZDI-CAN-28564.


CVE-2025-15270[1]:
| FontForge SFD File Parsing Improper Validation of Array Index Remote
| Code Execution Vulnerability. This vulnerability allows remote
| attackers to execute arbitrary code on affected installations of
| FontForge. User interaction is required to exploit this
| vulnerability in that the target must visit a malicious page or open
| a malicious file.  The specific flaw exists within the parsing of
| SFD files. The issue results from the lack of proper validation of
| user-supplied data, which can result in a write past the end of an
| allocated array. An attacker can leverage this vulnerability to
| execute code in the context of the current user. Was ZDI-CAN-28563.


CVE-2025-15271[2]:
| FontForge SFD File Parsing Improper Validation of Array Index Remote
| Code Execution Vulnerability. This vulnerability allows remote
| attackers to execute arbitrary code on affected installations of
| FontForge. User interaction is required to exploit this
| vulnerability in that the target must visit a malicious page or open
| a malicious file.  The specific flaw exists within the parsing of
| SFD files. The issue results from the lack of proper validation of
| user-supplied data, which can result in a write past the end of an
| allocated array. An attacker can leverage this vulnerability to
| execute code in the context of the current user. Was ZDI-CAN-28562.


CVE-2025-15272[3]:
| FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code
| Execution Vulnerability. This vulnerability allows remote attackers
| to execute arbitrary code on affected installations of FontForge.
| User interaction is required to exploit this vulnerability in that
| the target must visit a malicious page or open a malicious file.
| The specific flaw exists within the parsing of SFD files. The issue
| results from the lack of proper validation of the length of user-
| supplied data prior to copying it to a heap-based buffer. An
| attacker can leverage this vulnerability to execute code in the
| context of the current user. Was ZDI-CAN-28547.


CVE-2025-15273[4]:
| FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code
| Execution Vulnerability. This vulnerability allows remote attackers
| to execute arbitrary code on affected installations of FontForge.
| User interaction is required to exploit this vulnerability in that
| the target must visit a malicious page or open a malicious file.
| The specific flaw exists within the parsing of PFB files. The issue
| results from the lack of proper validation of the length of user-
| supplied data prior to copying it to a fixed-length stack-based
| buffer. An attacker can leverage this vulnerability to execute code
| in the context of the current user. Was ZDI-CAN-28546.


CVE-2025-15274[5]:
| FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code
| Execution Vulnerability. This vulnerability allows remote attackers
| to execute arbitrary code on affected installations of FontForge.
| User interaction is required to exploit this vulnerability in that
| the target must visit a malicious page or open a malicious file.
| The specific flaw exists within the parsing of SFD files. The issue
| results from the lack of proper validation of the length of user-
| supplied data prior to copying it to a heap-based buffer. An
| attacker can leverage this vulnerability to execute code in the
| context of the current user. Was ZDI-CAN-28544.


CVE-2025-15275[6]:
| FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code
| Execution Vulnerability. This vulnerability allows remote attackers
| to execute arbitrary code on affected installations of FontForge.
| User interaction is required to exploit this vulnerability in that
| the target must visit a malicious page or open a malicious file.
| The specific flaw exists within the parsing of SFD files. The issue
| results from the lack of proper validation of the length of user-
| supplied data prior to copying it to a heap-based buffer. An
| attacker can leverage this vulnerability to execute code in the
| context of the current user. Was ZDI-CAN-28543.


CVE-2025-15276[7]:
| FontForge SFD File Parsing Deserialization of Untrusted Data Remote
| Code Execution Vulnerability. This vulnerability allows remote
| attackers to execute arbitrary code on affected installations of
| FontForge. User interaction is required to exploit this
| vulnerability in that the target must visit a malicious page or open
| a malicious file.  The specific flaw exists within the parsing of
| SFD files. The issue results from the lack of proper validation of
| user-supplied data, which can result in deserialization of untrusted
| data. An attacker can leverage this vulnerability to execute code in
| the context of the current process. Was ZDI-CAN-28198.


CVE-2025-15277[8]:
| FontForge GUtils SGI File Parsing Heap-based Buffer Overflow Remote
| Code Execution Vulnerability. This vulnerability allows remote
| attackers to execute arbitrary code on affected installations of
| FontForge. User interaction is required to exploit this
| vulnerability in that the target must visit a malicious page or open
| a malicious file.  The specific flaw exists within the parsing of
| scanlines within SGI files. The issue results from the lack of
| proper validation of the length of user-supplied data prior to
| copying it to a heap-based buffer. An attacker can leverage this
| vulnerability to execute code in the context of the current process.
| Was ZDI-CAN-27920.


CVE-2025-15278[9]:
| FontForge GUtils XBM File Parsing Integer Overflow Remote Code
| Execution Vulnerability. This vulnerability allows remote attackers
| to execute arbitrary code on affected installations of FontForge.
| User interaction is required to exploit this vulnerability in that
| the target must visit a malicious page or open a malicious file.
| The specific flaw exists within the parsing of pixels within XBM
| files. The issue results from the lack of proper validation of user-
| supplied data, which can result in an integer overflow before
| allocating a buffer. An attacker can leverage this vulnerability to
| execute code in the context of the current process. Was ZDI-
| CAN-27865.


CVE-2025-15279[10]:
| FontForge GUtils BMP File Parsing Heap-based Buffer Overflow Remote
| Code Execution Vulnerability. This vulnerability allows remote
| attackers to execute arbitrary code on affected installations of
| FontForge. User interaction is required to exploit this
| vulnerability in that the target must visit a malicious page or open
| a malicious file.  The specific flaw exists within the parsing of
| pixels within BMP files. The issue results from the lack of proper
| validation of the length of user-supplied data prior to copying it
| to a heap-based buffer. An attacker can leverage this vulnerability
| to execute code in the context of the current user. Was ZDI-
| CAN-27517.


CVE-2025-15280[11]:
| FontForge SFD File Parsing Use-After-Free Remote Code Execution
| Vulnerability. This vulnerability allows remote attackers to execute
| arbitrary code on affected installations of FontForge. User
| interaction is required to exploit this vulnerability in that the
| target must visit a malicious page or open a malicious file.  The
| specific flaw exists within the parsing of SFD files. The issue
| results from the lack of validating the existence of an object prior
| to performing operations on the object. An attacker can leverage
| this vulnerability to execute code in the context of the current
| user. Was ZDI-CAN-28525.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-15269
    https://www.cve.org/CVERecord?id=CVE-2025-15269
[1] https://security-tracker.debian.org/tracker/CVE-2025-15270
    https://www.cve.org/CVERecord?id=CVE-2025-15270
[2] https://security-tracker.debian.org/tracker/CVE-2025-15271
    https://www.cve.org/CVERecord?id=CVE-2025-15271
[3] https://security-tracker.debian.org/tracker/CVE-2025-15272
    https://www.cve.org/CVERecord?id=CVE-2025-15272
[4] https://security-tracker.debian.org/tracker/CVE-2025-15273
    https://www.cve.org/CVERecord?id=CVE-2025-15273
[5] https://security-tracker.debian.org/tracker/CVE-2025-15274
    https://www.cve.org/CVERecord?id=CVE-2025-15274
[6] https://security-tracker.debian.org/tracker/CVE-2025-15275
    https://www.cve.org/CVERecord?id=CVE-2025-15275
[7] https://security-tracker.debian.org/tracker/CVE-2025-15276
    https://www.cve.org/CVERecord?id=CVE-2025-15276
[8] https://security-tracker.debian.org/tracker/CVE-2025-15277
    https://www.cve.org/CVERecord?id=CVE-2025-15277
[9] https://security-tracker.debian.org/tracker/CVE-2025-15278
    https://www.cve.org/CVERecord?id=CVE-2025-15278
[10] https://security-tracker.debian.org/tracker/CVE-2025-15279
    https://www.cve.org/CVERecord?id=CVE-2025-15279
[11] https://security-tracker.debian.org/tracker/CVE-2025-15280
    https://www.cve.org/CVERecord?id=CVE-2025-15280

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to