It was discovered that the subsetting module of fontTools was vulnerable to an XML External Entity (XEE) attack. An unauthenticated remote attacker could possibly use this issue to include arbitrary files from the file system or make web requests from the host system. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-45139)
It was discovered that fontTools was vulnerable to path traversal attacks. If a user or automated system were tricked into extracting a specially crafted .designspace file, an attacker could possibly use this issue to write arbitrary files outside the target directory, resulting in remote code execution. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.04 and Ubuntu 25.10. (CVE-2025-66034)
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "fonttools",
"binary_version": "4.29.1-2ubuntu0.1~esm1"
},
{
"binary_name": "python3-fonttools",
"binary_version": "4.29.1-2ubuntu0.1~esm1"
}
]
}
{
"ecosystem": "Ubuntu:Pro:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-45139"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "fonttools",
"binary_version": "4.46.0-1ubuntu0.1~esm1"
},
{
"binary_name": "python3-fonttools",
"binary_version": "4.46.0-1ubuntu0.1~esm1"
}
]
}
{
"ecosystem": "Ubuntu:Pro:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-66034"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "fonttools",
"binary_version": "4.55.3-2ubuntu0.25.10.1"
},
{
"binary_name": "python3-fonttools",
"binary_version": "4.55.3-2ubuntu0.25.10.1"
}
]
}
{
"ecosystem": "Ubuntu:25.10",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-66034"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "fonttools",
"binary_version": "4.55.3-2ubuntu0.25.04.1"
},
{
"binary_name": "python3-fonttools",
"binary_version": "4.55.3-2ubuntu0.25.04.1"
}
]
}
{
"ecosystem": "Ubuntu:25.04",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-66034"
}
]
}