A stack-based buffer overflow vulnerability was discovered in FreeType's CFF rasterizer during fuzz testing. The vulnerability occurs when building the hintmap data structure in the cf2_hintmap_build function. By analyzing the source code, it appears the vulnerability is caused by insufficient bounds checking when accessing the hint mask array via the maskPtr pointer, allowing writes beyond the end of the allocated buffer. This highlights the ongoing need to fuzz test font parsing libraries given the complexity of font formats and opportunity for security issues.