First published: Sat Feb 04 2023(Updated: )
A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el7_9 | 11-openjdk-1:11.0.20.0.8-1.el7_9 |
redhat/java | <17-openjdk-1:17.0.8.0.7-2.el8 | 17-openjdk-1:17.0.8.0.7-2.el8 |
redhat/java | <11-openjdk-1:11.0.20.0.8-2.el8 | 11-openjdk-1:11.0.20.0.8-2.el8 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_1 | 11-openjdk-1:11.0.20.0.8-1.el8_1 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_2 | 11-openjdk-1:11.0.20.0.8-1.el8_2 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_4 | 11-openjdk-1:11.0.20.0.8-1.el8_4 |
redhat/java | <17-openjdk-1:17.0.8.0.7-1.el8_4 | 17-openjdk-1:17.0.8.0.7-1.el8_4 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_6 | 11-openjdk-1:11.0.20.0.8-1.el8_6 |
redhat/java | <17-openjdk-1:17.0.8.0.7-1.el8_6 | 17-openjdk-1:17.0.8.0.7-1.el8_6 |
redhat/java | <11-openjdk-1:11.0.20.0.8-2.el9 | 11-openjdk-1:11.0.20.0.8-2.el9 |
redhat/java | <17-openjdk-1:17.0.8.0.7-2.el9 | 17-openjdk-1:17.0.8.0.7-2.el9 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el9_0 | 11-openjdk-1:11.0.20.0.8-1.el9_0 |
redhat/java | <17-openjdk-1:17.0.8.0.7-1.el9_0 | 17-openjdk-1:17.0.8.0.7-1.el9_0 |
redhat/harfbuzz | <7.0.0 | 7.0.0 |
debian/harfbuzz | <=2.7.4-1<=6.0.0+dfsg-3 | 10.2.0-1 |
HarfBuzz | <=6.0.0 | |
Fedora | =36 |
https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2023-25193.
The severity of CVE-2023-25193 is high.
CVE-2023-25193 allows attackers to trigger O(n^2) growth in HarfBuzz through consecutive marks during the process of looking back for base glyphs when attaching marks.
The affected software versions include HarfBuzz 2.3.1-1 up to and inclusive of 6.0.0+dfsg-3.
Yes, there are remediation steps available. Please refer to the official references for more information.