freetype-2.9.1-9.el8.ML.1
エラータID: AXSA:2025-9777:02
The FreeType engine is a free and portable font rendering
engine, developed to provide advanced font support for a variety of
platforms and environments. FreeType is a library which can open and
manages font files as well as efficiently load, hint and render
individual glyphs. FreeType is not a font server or a complete
text-rendering library.
Security Fix(es):
An out of bounds write exists in FreeType versions 2.13.0 and below (newer
versions of FreeType are not vulnerable) when attempting to parse font subglyph
structures related to TrueType GX and variable font files. The vulnerable code
assigns a signed short value to an unsigned long and then adds a static value
causing it to wrap around and allocate too small of a heap buffer. The code then
writes up to 6 signed long integers out of bounds relative to this buffer. This
may result in arbitrary code execution. This vulnerability may have been
exploited in the wild. (CVE-2025-27363)
CVE(s):
CVE-2025-27363
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
Update packages.
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
N/A
SRPMS
- freetype-2.9.1-9.el8.ML.1.src.rpm
MD5: 3f15ca280f90214729c096edd5c1cca6
SHA-256: b64068fa8a66a52c894e06e6a00ea7c6be72321f02d8cee49efb95a88d3d92d9
Size: 4.14 MB
Asianux Server 8 for x86_64
- freetype-2.9.1-9.el8.ML.1.i686.rpm
MD5: 0f1ea9334b167b5965e77c4144fcda39
SHA-256: 47500da0c6716d757003f3f5f7c1ce39daa83bc6931b53513a322e47c78cbbd6
Size: 410.53 kB - freetype-2.9.1-9.el8.ML.1.x86_64.rpm
MD5: 2dd8ca934eff7f476c160747995a88b5
SHA-256: 51cc824f0135611e1fb7f765171dc3295e4fe8ea125d7e7e631299c3330e9646
Size: 392.84 kB - freetype-devel-2.9.1-9.el8.ML.1.i686.rpm
MD5: 6e50ab27d9a68e07a19756c505b595b9
SHA-256: e98991c65201f8f9108348bb7979576c644352387efb35e41b1d07dada992bdd
Size: 463.71 kB - freetype-devel-2.9.1-9.el8.ML.1.x86_64.rpm
MD5: b6013c0d0e56584849679aad09c0f980
SHA-256: b635f829f4ae88bf3c89def716b0a54af74da3309e68df988fe257031ae620b9
Size: 463.70 kB