https://bugzilla.redhat.com/show_bug.cgi?id=1450802
Bug ID: 1450802
Summary: @sinhala-suppport group: please change the default
font from LKLUG to Noto
Product: Fedora
Version: 25
Component: google-noto-fonts
Severity: low
Assignee: psatpute(a)redhat.com
Reporter: harshula(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org,
i18n-bugs(a)lists.fedoraproject.org,
psatpute(a)redhat.com, pwu(a)redhat.com
[This BZ should be filed against the @sinhala-support group.]
Description of problem:
Please change the default font from LKLUG to Noto for the Sinhala script.
The LKLUG font is viewed as deprecated and we've been trying to
encourage other fonts that can succeed as the default Sinhala font on
GNU/Linux.
At this stage the Noto Sinhala range, in fonts-noto-hinted, is a more
appropriate default font than LKLUG.
See the discussion here:
http://sourceforge.net/p/sinhala/mailman/message/34481529/
See Debian Bug:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837969
Thanks,
#
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1485789
Bug ID: 1485789
Summary: bogus permissions on /usr/share/doc/urw-fonts
Product: Fedora
Version: 26
Component: urw-fonts
Assignee: dkaspar(a)redhat.com
Reporter: rc040203(a)freenet.de
QA Contact: extras-qa(a)fedoraproject.org
CC: dkaspar(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, than(a)redhat.com
Description of problem:
The urw-fonts package's permission on /usr/share/doc/urw-fonts are set
read-only:
$ rpm -qlv urw-fonts | grep doc
drw-r--r-- 2 root root 0 Feb 12 2017
/usr/share/doc/urw-fonts
-rw-r--r-- 1 root root 17992 Apr 23 2001
/usr/share/doc/urw-fonts/COPYING
-rw-r--r-- 1 root root 2245 Jan 18 2002
/usr/share/doc/urw-fonts/README
-rw-r--r-- 1 root root 1317 Jul 12 2002
/usr/share/doc/urw-fonts/README.tweaks
Version-Release number of selected component (if applicable):
urw-fonts-2.4-23.fc26.noarch
--
You are receiving this mail because:
You are on the CC list for the bug.
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: [as_IN] [Codepoint- Additional Vowels] U+09E2 has error.
https://bugzilla.redhat.com/show_bug.cgi?id=499358
Summary: [as_IN] [Codepoint- Additional Vowels] U+09E2 has
error.
Product: Fedora
Version: 10
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: low
Component: pango
AssignedTo: besfahbo(a)redhat.com
ReportedBy: xinsun(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: besfahbo(a)redhat.com, fedora-fonts-bugs-list(a)redhat.com
Classification: Fedora
Target Release: ---
Description of problem:
Input "09E2" with "RAW CODE" in gedit, the word has error.
Version-Release number of selected component (if applicable):
pangomm-2.14.1-1.fc10.x86_64
pango-1.22.3-1.fc10.i386
pango-1.22.3-1.fc10.x86_64
pango-devel-1.22.3-1.fc10.x86_64
How reproducible:
Steps to Reproduce:
1.Select "RAW CODE" in scim-bridge.
2.Input "09E2" in gedit.
Actual results:
The result is ৢ and is different from the URL
http://batman.bne.redhat.com/~indic/IndicTC/lang/as_IN/font/image/09E2.jpg
Expected results:
The word is same with the URL
http://batman.bne.redhat.com/~indic/IndicTC/lang/as_IN/font/image/09E2.jpg
Additional info:
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1475398
Bug ID: 1475398
Summary: CVE-2017-11568 CVE-2017-11569 CVE-2017-11570
CVE-2017-11571 CVE-2017-11572 CVE-2017-11573
CVE-2017-11574 CVE-2017-11575 CVE-2017-11576
CVE-2017-11577 fontforge: various flaws [fedora-all]
Product: Fedora
Version: 26
Component: fontforge
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: kevin(a)scrye.com
Reporter: anemec(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1475397
Bug ID: 1475397
Summary: CVE-2017-11577 fontforge: Buffer over-read in getsid
function
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: eng-i18n-bugs(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
FontForge 20161012 is vulnerable to a buffer over-read in getsid (parsettf.c)
resulting in DoS or via a crafted otf file.
Upstream issue:
https://github.com/fontforge/fontforge/issues/3088
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1475396
Bug ID: 1475396
Summary: CVE-2017-11576 fontforge: Does not ensure a positive
size in a weight vector memcpy call in readcfftopdict
function
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: eng-i18n-bugs(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
FontForge 20161012 does not ensure a positive size in a weight vector memcpy
call in readcfftopdict (parsettf.c) resulting in DoS via a crafted otf file.
Upstream issue:
https://github.com/fontforge/fontforge/issues/3091
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1475393
Bug ID: 1475393
Summary: CVE-2017-11575 fontforge: Buffer over-read in
strnmatch function
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: eng-i18n-bugs(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
FontForge 20161012 is vulnerable to a buffer over-read in strnmatch (char.c)
resulting in DoS or via a crafted otf file, related to a call from the
readttfcopyrights function in parsettf.c.
Upstream issue:
https://github.com/fontforge/fontforge/issues/3096
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1475392
Bug ID: 1475392
Summary: CVE-2017-11574 fontforge: Heap-based buffer overflow
in readcffset function
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: eng-i18n-bugs(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
FontForge 20161012 is vulnerable to a heap-based buffer overflow in readcffset
(parsettf.c) resulting in DoS via a crafted otf file.
Upstream issue:
https://github.com/fontforge/fontforge/issues/3090
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1475391
Bug ID: 1475391
Summary: CVE-2017-11573 fontforge: Buffer over-read in
ValidatePostScriptFontName function
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: eng-i18n-bugs(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
FontForge 20161012 is vulnerable to a buffer over-read in
ValidatePostScriptFontName (parsettf.c) resulting in DoS via a crafted otf
file.
Upstream issue:
https://github.com/fontforge/fontforge/issues/3098
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1475390
Bug ID: 1475390
Summary: CVE-2017-11572 fontforge: Heap-based buffer over-read
in readcfftopidcts function
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: eng-i18n-bugs(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
FontForge 20161012 is vulnerable to a heap-based buffer over-read in
readcfftopdicts (parsettf.c) resulting in DoS via a crafted otf file.
Upstream issue:
https://github.com/fontforge/fontforge/issues/3092
--
You are receiving this mail because:
You are on the CC list for the bug.