|
|
Message-ID: <927220f8-dc33-449a-80c6-6e1ab51b5594@oracle.com>
Date: Fri, 8 Mar 2024 11:06:35 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Vulnerabilties in FontTools & FontForge
https://www.canva.dev/blog/engineering/fonts-are-still-a-helvetica-of-a-problem/
is a detailed blog about vulnerabilities in some open source font handling software.
It discusses three new vulnerabilities in particular:
- CVE-2023-45139 in FontTools versions >=4.28.2, <4.43.0, fixed in 4.43.0
FontTools uses lxml to process SVG tables in OpenType fonts, and had
not disabled external entity expansion (which lmxl enables by default),
leading to an XML External Entity (XXE) vulnerability.
The project has issued it's own advisory for this at:
https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5
- CVE-2024-25081 & CVE-2024-25082 in FontForge, fixed in git repo
FontForge used the system() function to execute commands to unpack fonts
from archives, and the command line arguments it provides include both the
name of the archive and the name of a font file specified inside the archive,
leading to a classic command injection vulnerability if used to unpack a
specially-named or a specially-crafted archive file.
A patch to switch from system() to glib's g_spawn_sync() was merged
upstream on Feb. 6, but there don't seem to be any new releases yet:
https://github.com/fontforge/fontforge/pull/5367
--
-Alan Coopersmith- alan.coopersmith@...cle.com
Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.