Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <69e0cf03.a70a0220.a47bc.d193@mx.google.com>
Date: Thu, 16 Apr 2026 04:58:59 -0700 (PDT)
From: yangjincheng1998@...il.com
To: oss-security@...ts.openwall.com
Subject: CVE-2025-27363: FontForge affected by FreeType heap-buffer-overflow;
 upstream maintainer declines under Community-guidelines #D1

Hello oss-security,

This is an information-only post documenting a downstream impact and
maintainer response for an existing, already-public CVE.

== CVE ==
CVE-2025-27363 -- FreeType <= 2.13.2 heap-buffer-overflow in
load_truetype_glyph(), src/truetype/ttgload.c (~line 1929).
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-27363
Fix: FreeType 2.13.3, upstream commit a1e5a9df.

== Downstream impact: FontForge ==
FontForge (https://github.com/fontforge/fontforge) links FreeType to
parse and process font files. When built or run against FreeType
<= 2.13.2, FontForge inherits the heap-buffer-overflow when opening
a maliciously crafted TrueType font.

We confirmed the issue with AddressSanitizer against FreeType 2.13.0
(common in distributions that have not backported the fix):

  ==ERROR: AddressSanitizer: heap-buffer-overflow
   WRITE of size 16 at ttgload.c:1929 in load_truetype_glyph
   0 bytes to the right of 16-byte region allocated at ttgload.c:1909

Recommended action for distributors and packagers: ensure FontForge is
built/linked against FreeType >= 2.13.3, or apply the upstream fix
(commit a1e5a9df).

== Upstream maintainer response ==
We reported this downstream impact to FontForge upstream as
https://github.com/fontforge/fontforge/issues/5799 (2026-04-15).
The issue was closed within hours under "Community-guidelines #D1",
which states that the project does not accept security reports without
an accompanying fix PR.

Context: ZDI submitted 12 unrelated FontForge CVEs in 2025-12 and
received the same response
(https://github.com/fontforge/fontforge/issues/5706).

We post here so distributors and downstream packagers have a public,
independent record of the FontForge -> FreeType linkage status, and
can verify their own builds.

== Reproducer ==
Public PoC: https://github.com/francozappa/poc-CVE-2025-27363
Build/run FontForge against FreeType 2.13.0 or 2.13.2 with the PoC
TTF to reproduce.

Regards,
vulgraph
(Academic security research; PhD work on 1-day vulnerability
propagation across forks and downstream consumers.)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.