An out-of heap-based buffer read flaw was found in the way auxiliary PostScript driver of the FreeType font rendering engine performed conversion of certain PostScript font objects. A remote attacker could provide a specially-crafted PostScript font file, which once opened in an application linked against FreeType would lead to that application crash.
Upstream bug report:
[1] https://savannah.nongnu.org/bugs/?35657
Upstream patch:
[2] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=292144b44a15c1a72f2ef76475d65b7a3a3fba67
Acknowledgements:
Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
This issue affects the versions of the freetype package, as shipped with Red Hat Enterprise Linux 5 and 6.
--
This issue affects the versions of the freetype package, as shipped with Fedora release of 15 and 16.