It was reported  that Freetype suffers from an out-of-bounds stack-based read/write flaw in cf2_hintmap_build().
This new CFF handling code was introduced in Freetype 2.4.12 (new Type 2 interpreter and hinter); earlier versions are not affected. This is fixed in 2.5.3 .
Two CVEs were noted in the upstream bug , and according the oss-security post they correlate to commits as follows:
(there seems to be some possibility that CVE-2014-2241 was unncessarily filed, however)
Not vulnerable. This issue did not affect the versions of freetype as shipped with Red Hat Enterprise Linux 5, 6 and 7.
Created freetype tracking bugs for this issue:
Affects: fedora-20 [bug 1074647]
Created mingw-freetype tracking bugs for this issue:
Affects: fedora-20 [bug 1074648]
Affects: fedora-19 [bug 1074649]
This is currently fixed in:
And for anybody who might want to know, this is also fixed in:
in that well-known third-party repository.