Description
Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.
References
https://seclists.org/fulldisclosure/2026/Jan/11
ExploitMailing ListThird Party Advisory
Product
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-07T21:16:03.390Z
5 days agoLast modified
2026-01-12T17:53:57.367Z
7 hours ago