Robert Swiecki reported a buffer overflow flaw in freetype with how it handles certain fonts. This could cause applications linked against freetype to crash or, possibly, lead to the execution of arbitrary code if an attacker were able to get a victim to load a malicious font file. The affected code is not present in Red Hat Enterprise Linux 3 (freetype 2.1.4). This issue does cause a crash on Red Hat Enterprise Linux 4 and 5. This issue has been given the name CVE-2010-2499. Upstream bug reports: http://savannah.nongnu.org/bugs/index.php?30248 http://savannah.nongnu.org/bugs/index.php?30249 Upstream commits that fix the issue: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8 Acknowledgements: Red Hat would like to thank Robert Święcki of the Google Security Team for the discovery of this issue.
Created freetype tracking bugs for this issue Affects: fedora-all [bug 613299]
Upstream has released 2.4.0 to correct this issue: http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2010:0578 https://rhn.redhat.com/errata/RHSA-2010-0578.html