{"id":"USN-7917-1","summary":"fonttools vulnerabilities","details":"It was discovered that the subsetting module of fontTools was vulnerable to\nan XML External Entity (XEE) attack. An unauthenticated remote attacker\ncould possibly use this issue to include arbitrary files from the file\nsystem or make web requests from the host system. This issue only  affected\nUbuntu 22.04 LTS. (CVE-2023-45139)\n\nIt was discovered that fontTools was vulnerable to path traversal attacks.\nIf a user or automated system were tricked into extracting a specially\ncrafted .designspace file, an attacker could possibly use this issue to\nwrite arbitrary files outside the target directory, resulting in remote\ncode execution. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.04\nand Ubuntu 25.10. (CVE-2025-66034)","modified":"2026-04-27T18:30:23.719267Z","published":"2025-12-09T17:08:58Z","related":["UBUNTU-CVE-2023-45139","UBUNTU-CVE-2025-66034"],"upstream":["CVE-2023-45139","CVE-2025-66034","UBUNTU-CVE-2023-45139","UBUNTU-CVE-2025-66034"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7917-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45139"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-66034"}],"affected":[{"package":{"name":"fonttools","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/fonttools@4.29.1-2ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.29.1-2ubuntu0.1~esm1"}]}],"versions":["4.23.1-1","4.27.1-1","4.28.3-1","4.28.5-1","4.29.1-1","4.29.1-2build1"],"ecosystem_specific":{"binaries":[{"binary_name":"fonttools","binary_version":"4.29.1-2ubuntu0.1~esm1"},{"binary_name":"python3-fonttools","binary_version":"4.29.1-2ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:22.04:LTS","cves":[{"id":"CVE-2023-45139","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7917-1.json"}},{"package":{"name":"fonttools","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/fonttools@4.46.0-1ubuntu0.1~esm1?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.46.0-1ubuntu0.1~esm1"}]}],"versions":["4.38.0-1build1","4.38.0-1build2","4.46.0-1","4.46.0-1build2"],"ecosystem_specific":{"binaries":[{"binary_name":"fonttools","binary_version":"4.46.0-1ubuntu0.1~esm1"},{"binary_name":"python3-fonttools","binary_version":"4.46.0-1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:24.04:LTS","cves":[{"id":"CVE-2025-66034","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7917-1.json"}},{"package":{"name":"fonttools","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/fonttools@4.55.3-2ubuntu0.25.10.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.55.3-2ubuntu0.25.10.1"}]}],"versions":["4.55.3-2build1"],"ecosystem_specific":{"binaries":[{"binary_name":"fonttools","binary_version":"4.55.3-2ubuntu0.25.10.1"},{"binary_name":"python3-fonttools","binary_version":"4.55.3-2ubuntu0.25.10.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:25.10","cves":[{"id":"CVE-2025-66034","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7917-1.json"}}],"schema_version":"1.7.5"}