Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.
https://bugzilla.redhat.com/show_bug.cgi?id=613194
http://www.ubuntu.com/usn/USN-963-1
http://www.redhat.com/support/errata/RHSA-2010-0578.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
http://www.debian.org/security/2010/dsa-2070
http://securitytracker.com/id?1024266
http://secunia.com/advisories/48951
http://marc.info/?l=oss-security&m=127909326909362&w=2
http://marc.info/?l=oss-security&m=127905701201340&w=2
http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html