CVE-2024-25081
NixOS vulnerability analysis and mitigation

Overview

CVE-2024-25081 affects Splinefont in FontForge through version 20230101, allowing command injection attacks via crafted filenames. The vulnerability was discovered and disclosed in February 2024, impacting FontForge installations across multiple operating systems and distributions (NVD, Debian).

Technical details

The vulnerability is classified as a command injection vulnerability (CWE-77) with a CVSS v3.1 base score of 4.2 (Medium). The issue stems from FontForge's use of the system() function to execute commands for unpacking fonts from archives, where both the archive name and font file specified inside the archive are passed as command line arguments without proper sanitization (OSS Security).

Impact

When exploited, this vulnerability could allow attackers to execute arbitrary commands on the target system through specially crafted filenames. The impact is somewhat limited by the local access requirement and high attack complexity, but could potentially lead to unauthorized access, data manipulation, or system compromise (NVD).

Mitigation and workarounds

A patch has been developed and merged upstream that switches from using system() to glib's g_spawn_sync() function, which provides safer command execution without shell interpretation. The fix was merged on February 6, 2024, through pull request #5367. Various distributions have released security updates incorporating this fix, including Debian, Ubuntu, and Fedora (GitHub PR, Debian LTS).

Community reactions

The vulnerability was documented in detail in a blog post titled 'Fonts are still a helvetica of a problem' on Canva's engineering blog, which discussed this vulnerability along with other font-handling security issues. The security community has responded by quickly implementing fixes across various distributions (OSS Security).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management