Bug 2351357 (CVE-2025-27363)

Summary: CVE-2025-27363 freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: adudiak, ahughes, caswilli, cchiang, erack, gotiwari, jhorak, kaycoth, khosford, kshier, mbalaoal, mbalao, mvyas, neugens, omaciel, pjindal, sraghupu, stcannon, tpopela, vrajput, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-03-11 14:01:17 UTC
An out of bounds write exists in FreeType versions 2.13.0 and below when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

Comment 2 errata-xmlrpc 2025-03-31 01:41:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:3382 https://access.redhat.com/errata/RHSA-2025:3382

Comment 3 errata-xmlrpc 2025-03-31 01:42:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:3385 https://access.redhat.com/errata/RHSA-2025:3385

Comment 4 errata-xmlrpc 2025-03-31 01:45:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:3384 https://access.redhat.com/errata/RHSA-2025:3384

Comment 5 errata-xmlrpc 2025-03-31 01:47:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:3386 https://access.redhat.com/errata/RHSA-2025:3386

Comment 6 errata-xmlrpc 2025-03-31 01:48:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:3383 https://access.redhat.com/errata/RHSA-2025:3383

Comment 7 errata-xmlrpc 2025-03-31 02:01:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:3387 https://access.redhat.com/errata/RHSA-2025:3387

Comment 8 errata-xmlrpc 2025-03-31 02:02:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:3393 https://access.redhat.com/errata/RHSA-2025:3393

Comment 9 errata-xmlrpc 2025-03-31 03:03:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:3395 https://access.redhat.com/errata/RHSA-2025:3395

Comment 10 errata-xmlrpc 2025-03-31 14:19:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:3407 https://access.redhat.com/errata/RHSA-2025:3407

Comment 11 errata-xmlrpc 2025-03-31 17:52:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:3421 https://access.redhat.com/errata/RHSA-2025:3421

Comment 14 errata-xmlrpc 2025-05-08 19:54:53 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2025:4409 https://access.redhat.com/errata/RHSA-2025:4409

Comment 16 errata-xmlrpc 2025-05-27 09:29:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:8195 https://access.redhat.com/errata/RHSA-2025:8195

Comment 17 errata-xmlrpc 2025-05-27 15:12:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:8219 https://access.redhat.com/errata/RHSA-2025:8219

Comment 18 errata-xmlrpc 2025-05-28 08:01:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2025:8253 https://access.redhat.com/errata/RHSA-2025:8253

Comment 19 errata-xmlrpc 2025-05-29 06:38:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:8292 https://access.redhat.com/errata/RHSA-2025:8292