FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. Multiple integer overflow flaws and an integer signedness flaw, leading to heap-based buffer overflows, were found in the way FreeType handled Mac fonts. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-9673, CVE-2014-9674) Multiple flaws were found in the way FreeType handled fonts in various formats. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, possibly, disclose a portion of the application memory. (CVE-2014-9657, CVE-2014-9658, CVE-2014-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664, CVE-2014-9667, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671, CVE-2014-9675) All freetype users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The X server must be restarted (log out, then log back in) for this update to take effect.
advisories.mageia.org/MGASA-2015-0083.html
code.google.com/p/google-security-research/issues/detail?id=183
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=73be9f9ab67842cfbec36ee99e8d2301434c84ca
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=dd89710f0f643eb0f99a3830e0712d26c7642acd
lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
rhn.redhat.com/errata/RHSA-2015-0696.html
www.debian.org/security/2015/dsa-3188
www.mandriva.com/security/advisories?name=MDVSA-2015:055
www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
www.securityfocus.com/bid/72986
www.ubuntu.com/usn/USN-2510-1
www.ubuntu.com/usn/USN-2739-1
access.redhat.com/security/updates/classification/#important
rhn.redhat.com/errata/RHSA-2015-0696.html
security.gentoo.org/glsa/201503-05