Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2566 - Security Advisory
Issued:
2026-02-11
Updated:
2026-02-11

RHSA-2026:2566 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: fontforge security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for fontforge is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts.

Security Fix(es):

  • fontforge: command injection via crafted archives or compressed files (CVE-2024-25082)
  • fontforge: command injection via crafted filenames (CVE-2024-25081)
  • fontforge: FontForge: Remote Code Execution via heap-based buffer overflow in BMP file parsing (CVE-2025-15279)
  • fontforge: FontForge: Remote Code Execution via Use-After-Free in SFD file parsing (CVE-2025-15269)
  • fontforge: FontForge: Arbitrary code execution via SFD file parsing buffer overflow (CVE-2025-15275)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64

Fixes

  • BZ - 2266180 - CVE-2024-25082 fontforge: command injection via crafted archives or compressed files
  • BZ - 2266181 - CVE-2024-25081 fontforge: command injection via crafted filenames
  • BZ - 2426421 - CVE-2025-15279 fontforge: FontForge: Remote Code Execution via heap-based buffer overflow in BMP file parsing
  • BZ - 2426423 - CVE-2025-15269 fontforge: FontForge: Remote Code Execution via Use-After-Free in SFD file parsing
  • BZ - 2426429 - CVE-2025-15275 fontforge: FontForge: Arbitrary code execution via SFD file parsing buffer overflow

CVEs

  • CVE-2024-25081
  • CVE-2024-25082
  • CVE-2025-15269
  • CVE-2025-15275
  • CVE-2025-15279

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4

SRPM
fontforge-20201107-6.el9_4.src.rpm SHA-256: b3fe1c59ed9aee27ccc8aa326aa3a9678c3ca0b7d48b19be9a6088953dc50684
x86_64
fontforge-20201107-6.el9_4.i686.rpm SHA-256: 86a2b678ae5a62d1b351c0269dbbaf0f5898265a2ff3e46ca41e9bafb5d47906
fontforge-20201107-6.el9_4.x86_64.rpm SHA-256: b87e79bc09945dfc1f77e7c21e3c9263a31a6b3110f2d182a0f1bd68cedc9245
fontforge-debuginfo-20201107-6.el9_4.i686.rpm SHA-256: 226a2858d1f83a2cd96ed04f8f01e5a97dbe0de25e99580d01a863d5582322cc
fontforge-debuginfo-20201107-6.el9_4.x86_64.rpm SHA-256: ec3d1d08aeab7daf3ba2c1aedd94186b3f518e1e01f22ddc71b84f7c9e8bf58e
fontforge-debugsource-20201107-6.el9_4.i686.rpm SHA-256: 5bc759c900d3a13ab6ba18c582bb0311f95ecda23d4253722dc86e6ac2487540
fontforge-debugsource-20201107-6.el9_4.x86_64.rpm SHA-256: 0d949b7f6ec6fdc323c8f652d390c9eb61c7b3b5e9b0420b8b048df1efd51c6e

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4

SRPM
fontforge-20201107-6.el9_4.src.rpm SHA-256: b3fe1c59ed9aee27ccc8aa326aa3a9678c3ca0b7d48b19be9a6088953dc50684
ppc64le
fontforge-20201107-6.el9_4.ppc64le.rpm SHA-256: ed9763edda8523057b3d229ee5aba88ec34ce0f9c37d27417b72bd710682d42a
fontforge-debuginfo-20201107-6.el9_4.ppc64le.rpm SHA-256: e26863620c46eff9845f7c9dda7da732a53f171c7223017bcacbbc1ac409dfdb
fontforge-debugsource-20201107-6.el9_4.ppc64le.rpm SHA-256: 8ee1971ef78b8ca0ddd0488b41b75e37e39eccc1c3485b2964c785321d9f0d17

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4

SRPM
fontforge-20201107-6.el9_4.src.rpm SHA-256: b3fe1c59ed9aee27ccc8aa326aa3a9678c3ca0b7d48b19be9a6088953dc50684
s390x
fontforge-20201107-6.el9_4.s390x.rpm SHA-256: a010bdfde73cce57cc6315cac9f5ae767141e48f92854ccad3929a5c465f2fe8
fontforge-debuginfo-20201107-6.el9_4.s390x.rpm SHA-256: b5e16650103538c1efdc5ba36ca2829f14412efd6dd1c4cabb13514377139c24
fontforge-debugsource-20201107-6.el9_4.s390x.rpm SHA-256: 5f40fe853e1bd1a1dd9acbb17677cafe736083302c42f215ada0ac3117ae9251

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4

SRPM
fontforge-20201107-6.el9_4.src.rpm SHA-256: b3fe1c59ed9aee27ccc8aa326aa3a9678c3ca0b7d48b19be9a6088953dc50684
aarch64
fontforge-20201107-6.el9_4.aarch64.rpm SHA-256: acf89e63ff3f9cd577bb3b86fbfc4678bab6bbf05c0010905024f5d8a7023b85
fontforge-debuginfo-20201107-6.el9_4.aarch64.rpm SHA-256: 43df4106730bd74875ad313ec2a820775731eef3aa85d575fa39bf4f21d6c9a1
fontforge-debugsource-20201107-6.el9_4.aarch64.rpm SHA-256: 53674a51b35548da4427e4cd1595458d34ef1f4c46bf4bf7d53ce646608a134e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility