Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-2039

Опубликовано: 05 фев. 2026
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2026-2039: fontforge security update (IMPORTANT)

[20201107-7]

  • Resolves: RHEL-138206 CVE-2025-15279 GUtils BMP File Parsing Heap-based Buffer Overflow
  • Resolves: RHEL-138228 CVE-2025-15275 SFD File Parsing Heap-based Buffer Overflow
  • Resolves: RHEL-138158 CVE-2025-15269 SFD File Parsing Use-After-Free

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

fontforge

20201107-7.el9_7

Oracle Linux x86_64

fontforge

20201107-7.el9_7

Связанные уязвимости

oracle-oval
около 2 месяцев назад

ELSA-2026-2230: fontforge security update (IMPORTANT)

suse-cvrf
около 2 месяцев назад

Security update for fontforge

CVSS3: 8.8
ubuntu
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

CVSS3: 8.8
redhat
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

CVSS3: 8.8
nvd
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.