FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. Multiple integer overflow flaws and an integer signedness flaw, leading to heap-based buffer overflows, were found in the way FreeType handled Mac fonts. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-9673, CVE-2014-9674) Multiple flaws were found in the way FreeType handled fonts in various formats. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, possibly, disclose a portion of the application memory. (CVE-2014-9657, CVE-2014-9658, CVE-2014-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664, CVE-2014-9667, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671, CVE-2014-9675) All freetype users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The X server must be restarted (log out, then log back in) for this update to take effect.
advisories.mageia.org/MGASA-2015-0083.html
code.google.com/p/google-security-research/issues/detail?id=166
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=677ddf4f1dc1b36cef7c7ddd59a14c508f4b1891
lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
rhn.redhat.com/errata/RHSA-2015-0696.html
www.debian.org/security/2015/dsa-3188
www.mandriva.com/security/advisories?name=MDVSA-2015:055
www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
www.securityfocus.com/bid/72986
www.ubuntu.com/usn/USN-2510-1
www.ubuntu.com/usn/USN-2739-1
access.redhat.com/security/updates/classification/#important
rhn.redhat.com/errata/RHSA-2015-0696.html
security.gentoo.org/glsa/201503-05