Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-2230

Опубликовано: 09 фев. 2026
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2026-2230: fontforge security update (IMPORTANT)

[20230101-14]

  • Resolves: RHEL-138159 CVE-2025-15279 GUtils BMP File Parsing Heap-based Buffer Overflow
  • Resolves: RHEL-138144 CVE-2025-15275 SFD File Parsing Heap-based Buffer Overflow
  • Resolves: RHEL-138126 CVE-2025-15269 SFD File Parsing Use-After-Free

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

fontforge

20230101-14.el10_1

Oracle Linux x86_64

fontforge

20230101-14.el10_1

Связанные уязвимости

oracle-oval
2 месяца назад

ELSA-2026-2039: fontforge security update (IMPORTANT)

suse-cvrf
около 2 месяцев назад

Security update for fontforge

CVSS3: 8.8
ubuntu
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

CVSS3: 8.8
redhat
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

CVSS3: 8.8
nvd
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.