On Monday Meta announced a flaw in FreeType versions 2.13.0 and below that can allow remote code execution.

From the announcement:

An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

Full details are available at https://almalinux.org/blog/2025-03-13-cve-2025-27363-patches/ which details the patched builds available for testing for AlmaLinux 8 and 9.  AlmaLinux Kitten 10 is not impacted.

We intend to release these patched builds to production repositories on Monday.

--
Jonathan Wright
AlmaLinux OS Foundation
Mattermost: chat