https://bugzilla.redhat.com/show_bug.cgi?id=1822847
miky678 <mjhon9911(a)gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mjhon9911(a)gmail.com
--- Comment #21 from miky678 <mjhon9911(a)gmail.com> ---
I’ve been following this Bugzilla thread and it’s interesting how small
character or encoding issues can create unexpected behavior in systems. Unicode
handling is often overlooked until something breaks. For anyone testing display
consistency across platforms, especially with styled usernames or special
symbols, tools like https://thestylishname.com/ can actually help generate
different Unicode variations to reproduce rendering quirks. It’s a simple way
to see how various environments interpret decorative text.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1822847
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2440529
Bug ID: 2440529
Summary: Outdated freetype.spec
Product: Fedora
Version: rawhide
Hardware: All
URL: https://src.fedoraproject.org/rpms/freetype/blob/rawhi
de/f/freetype.spec#_114
OS: Linux
Status: NEW
Component: freetype
Severity: low
Assignee: mkasik(a)redhat.com
Reporter: apodtele(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: ajax(a)redhat.com, fonts-bugs(a)lists.fedoraproject.org,
mclasen(a)redhat.com, mkasik(a)redhat.com,
rstrode(a)redhat.com, suraj.ghimire7(a)gmail.com
Target Milestone: ---
Classification: Fedora
Some parts of freetype.spec are very outdated. For example,
1. # Convert FTL.txt and example3.cpp to UTF-8
This has been fixed many years ago.
2. Please add ttdebug and remove "additional" ftdemos.
The "additional" demos are not worth much, unmaintained, and outdated. It makes
sense to limit yourself to 12 programs with man pages.
I am attaching a patch which should help.
Reproducible: Always
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2440529
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2431892
Bug ID: 2431892
Summary: Provide a meta-package that prioritizes VFs
Product: Fedora
Version: 43
Hardware: x86_64
OS: Linux
Status: NEW
Component: google-noto-fonts
Severity: medium
Assignee: tagoh(a)redhat.com
Reporter: EpicTux123(a)proton.me
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org,
i18n-bugs(a)lists.fedoraproject.org,
petersen(a)redhat.com, pwu(a)redhat.com, tagoh(a)redhat.com
Target Milestone: ---
Classification: Fedora
Hi there.
Currently, the "google-noto-fonts-all" meta-package installs many font
duplicates. Fedora seems to prever VF variants (
https://fedoraproject.org/wiki/Changes/VariableNotoFonts ,
https://fedoraproject.org/wiki/Changes/Noto_CJK_Variable_Fonts ), but the
meta-package installs both Static and VF variants of the same fonts. Example
from command "dnf repoquery --requires google-noto-fonts-all":
------------------------------------------------------
google-noto-serif-hebrew-fonts = 20250901-1.fc43
google-noto-serif-hebrew-fonts = 20251101-2.fc43
google-noto-serif-hebrew-vf-fonts = 20250901-1.fc43
google-noto-serif-hebrew-vf-fonts = 20251101-2.fc43
------------------------------------------------------
I would like to request the creation of a meta-package that prioritizes VF
variants and don't install their equivalent duplicates in Static variant.
For example, the meta-package would install Hebrew VF fonts, but not Hebrew
Static fonts.
This eliminates the duplicates, while still keeping the Static fonts in a
meta-package for the fonts that don't have VF variants.
Additional note: the current "google-noto-fonts-all" should probably install
the other "-all" meta-packages as well, since it includes all of their deps as
well.
Thanks.
Reproducible: Always
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2431892
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2426593
Bug ID: 2426593
Summary: CVE-2025-15279 fontforge: FontForge GUtils BMP File
Parsing Heap-based Buffer Overflow Remote Code
Execution Vulnerability [fedora-42]
Product: Fedora
Version: 42
Status: NEW
Whiteboard: {"flaws": ["cab9b630-800b-43be-8e4e-d2a23173d42e"]}
Component: fontforge
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: pnemade(a)redhat.com
Reporter: saroy(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
pnemade(a)redhat.com
Blocks: 2426421
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2426593
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2426589
Bug ID: 2426589
Summary: CVE-2025-15275 fontforge: FontForge SFD File Parsing
Heap-based Buffer Overflow Remote Code Execution
Vulnerability [fedora-42]
Product: Fedora
Version: 42
Status: NEW
Whiteboard: {"flaws": ["5af30362-e9b2-494f-8f80-baaa55c5a07e"]}
Component: fontforge
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: pnemade(a)redhat.com
Reporter: saroy(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
pnemade(a)redhat.com
Blocks: 2426429
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2426589
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2426577
Bug ID: 2426577
Summary: CVE-2025-15269 fontforge: FontForge SFD File Parsing
Use-After-Free Remote Code Execution Vulnerability
[fedora-42]
Product: Fedora
Version: 42
Status: NEW
Whiteboard: {"flaws": ["0863e5e2-7597-4ea2-8788-270434bc8584"]}
Component: fontforge
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: pnemade(a)redhat.com
Reporter: saroy(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
pnemade(a)redhat.com
Blocks: 2426423
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2426577
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2426597
Bug ID: 2426597
Summary: CVE-2025-15279 fontforge: FontForge GUtils BMP File
Parsing Heap-based Buffer Overflow Remote Code
Execution Vulnerability [fedora-43]
Product: Fedora
Version: 43
Status: NEW
Whiteboard: {"flaws": ["cab9b630-800b-43be-8e4e-d2a23173d42e"]}
Component: fontforge
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: pnemade(a)redhat.com
Reporter: saroy(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
pnemade(a)redhat.com
Blocks: 2426421
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2426597
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2426591
Bug ID: 2426591
Summary: CVE-2025-15275 fontforge: FontForge SFD File Parsing
Heap-based Buffer Overflow Remote Code Execution
Vulnerability [fedora-43]
Product: Fedora
Version: 43
Status: NEW
Whiteboard: {"flaws": ["5af30362-e9b2-494f-8f80-baaa55c5a07e"]}
Component: fontforge
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: pnemade(a)redhat.com
Reporter: saroy(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
pnemade(a)redhat.com
Blocks: 2426429
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2426591
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…