CVE-2025-27363

An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 May 2025, 16:00

Type Values Removed Values Added
References () https://www.facebook.com/security/advisories/cve-2025-27363 - () https://www.facebook.com/security/advisories/cve-2025-27363 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2025/03/13/1 - () http://www.openwall.com/lists/oss-security/2025/03/13/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/11 - () http://www.openwall.com/lists/oss-security/2025/03/13/11 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/12 - () http://www.openwall.com/lists/oss-security/2025/03/13/12 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/2 - () http://www.openwall.com/lists/oss-security/2025/03/13/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/3 - () http://www.openwall.com/lists/oss-security/2025/03/13/3 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/8 - () http://www.openwall.com/lists/oss-security/2025/03/13/8 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/14/1 - () http://www.openwall.com/lists/oss-security/2025/03/14/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/14/2 - () http://www.openwall.com/lists/oss-security/2025/03/14/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/14/3 - () http://www.openwall.com/lists/oss-security/2025/03/14/3 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/14/4 - () http://www.openwall.com/lists/oss-security/2025/03/14/4 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/05/06/3 - () http://www.openwall.com/lists/oss-security/2025/05/06/3 - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html - Mailing List
References () https://source.android.com/docs/security/bulletin/2025-05-01 - () https://source.android.com/docs/security/bulletin/2025-05-01 - Third Party Advisory
First Time Freetype
Debian
Debian debian Linux
Freetype freetype
CPE cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

06 May 2025, 22:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/05/06/3 -

06 May 2025, 18:15

Type Values Removed Values Added
References
  • () https://source.android.com/docs/security/bulletin/2025-05-01 -

02 Apr 2025, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html -

14 Mar 2025, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/4 -

14 Mar 2025, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/3 -

14 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/2 -

14 Mar 2025, 05:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/1 -

14 Mar 2025, 01:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/12 -

13 Mar 2025, 23:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/11 -

13 Mar 2025, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/8 -

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary (en) An out of bounds write exists in FreeType versions 2.13.0 and below when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild. (en) An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

13 Mar 2025, 05:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/3 -

13 Mar 2025, 04:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/1 -
  • () http://www.openwall.com/lists/oss-security/2025/03/13/2 -
Summary
  • (es) Existe una escritura fuera de los límites en las versiones 2.13.0 y anteriores de FreeType al intentar analizar estructuras de subglifos de fuentes relacionadas con archivos de fuentes TrueType GX y variables. El código vulnerable asigna un valor short con signo a un long sin signo y luego añade un valor estático, lo que provoca un bucle y asigna un búfer de montón demasiado pequeño. El código escribe entonces hasta 6 enteros long con signo fuera de los límites en relación con este búfer. Esto puede provocar la ejecución de código arbitrario. Esta vulnerabilidad podría haber sido explotada in situ.

11 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 14:15

Updated : 2025-05-07 16:00


NVD link : CVE-2025-27363

Mitre link : CVE-2025-27363

CVE.ORG link : CVE-2025-27363


JSON object : View

Products Affected

debian

  • debian_linux

freetype

  • freetype
CWE
CWE-787

Out-of-bounds Write