We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47868

Apache NuttX RTOS: tools/bdf-converter.: tools/bdf-converter: Fix loop termination condition.



Description

Out-of-bounds Write resulting in possible Heap-based Buffer Overflow vulnerability was discovered in tools/bdf-converter font conversion utility that is part of Apache NuttX RTOS repository. This standalone program is optional and neither part of NuttX RTOS nor Applications runtime, but active bdf-converter users may be affected when this tool is exposed to external provided user data data (i.e. publicly available automation). This issue affects Apache NuttX: from 6.9 before 12.9.0. Users are recommended to upgrade to version 12.9.0, which fixes the issue.

Reserved 2025-05-12 | Published 2025-06-16 | Updated 2025-06-16 | Assigner apache

Problem types

CWE-787 Out-of-bounds Write

CWE-122 Heap-based Buffer Overflow

Product status

Default status
unaffected

6.9 before 12.9.0
affected

Credits

Chánh Phạm <chanhphamviet@gmail.com> finder

Nathan Hartman <hartman.nathan@gmail.com> remediation developer

Tomek CEDRO <tomek@cedro.info> coordinator

Alan Carvalho de Assis <acassis@gmail.com> remediation reviewer

Alin Jerpelea <jerpelea@gmail.com> remediation reviewer

Lee, Lup Yuen <luppy@appkaki.com> remediation reviewer

Arnout Engelen <engelen@apache.org> coordinator

References

github.com/apache/nuttx/pull/16000 patch

lists.apache.org/thread/p4o2lcqgspx3ws1n2p4wmoqbqow1w1pw vendor-advisory

cve.org (CVE-2025-47868)

nvd.nist.gov (CVE-2025-47868)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47868

Support options

Helpdesk Chat, Email, Knowledgebase