Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Freetype OpenType Font Parsing Integer Overflow
OESA-2026-1576
Summary
Freetype library versions 2.13.2 and 2.13.3 have a security issue where a specific type of font file can cause the program to access memory outside its intended range. This could potentially allow an attacker to access sensitive information. Update to version 2.14.2 to fix the issue.
What to do
- Update freetype to version 2.13.2-5.oe2403sp2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | freetype | <= 2.13.2-5.oe2403sp2 | 2.13.2-5.oe2403sp2 |
Original title
freetype security update
Original description
FreeType is written in C, designed to be small,efficient, highly customizable, and portable while capable of producing high-quality output (glyph images) of most vector and bitmap font formats
Security Fix(es):
An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.(CVE-2026-23865)
Security Fix(es):
An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.(CVE-2026-23865)
- https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA... Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23865 Vendor Advisory
Published: 15 Mar 2026 · Updated: 15 Mar 2026 · First seen: 15 Mar 2026