CVE-2025-27363

An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 May 2025, 16:00

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2025/03/13/8 - () http://www.openwall.com/lists/oss-security/2025/03/13/8 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/12 - () http://www.openwall.com/lists/oss-security/2025/03/13/12 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/2 - () http://www.openwall.com/lists/oss-security/2025/03/13/2 - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/14/3 - () http://www.openwall.com/lists/oss-security/2025/03/14/3 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/1 - () http://www.openwall.com/lists/oss-security/2025/03/13/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/14/1 - () http://www.openwall.com/lists/oss-security/2025/03/14/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/3 - () http://www.openwall.com/lists/oss-security/2025/03/13/3 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/13/11 - () http://www.openwall.com/lists/oss-security/2025/03/13/11 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/03/14/4 - () http://www.openwall.com/lists/oss-security/2025/03/14/4 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/05/06/3 - () http://www.openwall.com/lists/oss-security/2025/05/06/3 - Mailing List
References () https://source.android.com/docs/security/bulletin/2025-05-01 - () https://source.android.com/docs/security/bulletin/2025-05-01 - Third Party Advisory
References () https://www.facebook.com/security/advisories/cve-2025-27363 - () https://www.facebook.com/security/advisories/cve-2025-27363 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2025/03/14/2 - () http://www.openwall.com/lists/oss-security/2025/03/14/2 - Mailing List
First Time Debian debian Linux
Freetype freetype
Debian
Freetype
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CPE cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

06 May 2025, 22:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/05/06/3 -

06 May 2025, 18:15

Type Values Removed Values Added
References
  • () https://source.android.com/docs/security/bulletin/2025-05-01 -

02 Apr 2025, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html -

14 Mar 2025, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/4 -

14 Mar 2025, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/3 -

14 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/2 -

14 Mar 2025, 05:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/14/1 -

14 Mar 2025, 01:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/12 -

13 Mar 2025, 23:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/11 -

13 Mar 2025, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/8 -

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary An out of bounds write exists in FreeType versions 2.13.0 and below when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild. An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

13 Mar 2025, 05:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/3 -

13 Mar 2025, 04:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/13/2 -
  • () http://www.openwall.com/lists/oss-security/2025/03/13/1 -

11 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 14:15

Updated : 2025-05-07 16:00


NVD link : CVE-2025-27363

Mitre link : CVE-2025-27363


JSON object : View

Products Affected

debian

  • debian_linux

freetype

  • freetype
CWE

No CWE.