An out-of heap-based buffer read flaw was found in the way Type1 font loader of FreeType font rendering engine performed parsing of certain Type1 font dictionary entries. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash.
Upstream bug report:
[1] https://savannah.nongnu.org/bugs/?35606
Upstream patch:
[2] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=58cbc465d2ccd904dee755cff791fbb3a866646d
Acknowledgements:
Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
This issue affects the versions of the freetype package, as shipped with Red Hat Enterprise Linux 5 and 6.
--
This issue affects the versions of the freetype package, as shipped with Fedora release of 15 and 16.