First published: Sat Feb 04 2023(Updated: )
A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el7_9 | 11-openjdk-1:11.0.20.0.8-1.el7_9 |
redhat/java | <17-openjdk-1:17.0.8.0.7-2.el8 | 17-openjdk-1:17.0.8.0.7-2.el8 |
redhat/java | <11-openjdk-1:11.0.20.0.8-2.el8 | 11-openjdk-1:11.0.20.0.8-2.el8 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_1 | 11-openjdk-1:11.0.20.0.8-1.el8_1 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_2 | 11-openjdk-1:11.0.20.0.8-1.el8_2 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_4 | 11-openjdk-1:11.0.20.0.8-1.el8_4 |
redhat/java | <17-openjdk-1:17.0.8.0.7-1.el8_4 | 17-openjdk-1:17.0.8.0.7-1.el8_4 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el8_6 | 11-openjdk-1:11.0.20.0.8-1.el8_6 |
redhat/java | <17-openjdk-1:17.0.8.0.7-1.el8_6 | 17-openjdk-1:17.0.8.0.7-1.el8_6 |
redhat/java | <11-openjdk-1:11.0.20.0.8-2.el9 | 11-openjdk-1:11.0.20.0.8-2.el9 |
redhat/java | <17-openjdk-1:17.0.8.0.7-2.el9 | 17-openjdk-1:17.0.8.0.7-2.el9 |
redhat/java | <11-openjdk-1:11.0.20.0.8-1.el9_0 | 11-openjdk-1:11.0.20.0.8-1.el9_0 |
redhat/java | <17-openjdk-1:17.0.8.0.7-1.el9_0 | 17-openjdk-1:17.0.8.0.7-1.el9_0 |
debian/harfbuzz | <=2.3.1-1<=2.7.4-1<=6.0.0+dfsg-3 | 8.3.0-2 |
ubuntu/openjdk-lts | <11.0.20+8-1ubuntu1~20.04 | 11.0.20+8-1ubuntu1~20.04 |
ubuntu/openjdk-lts | <11.0.20+8-1ubuntu1~22.04 | 11.0.20+8-1ubuntu1~22.04 |
ubuntu/openjdk-lts | <11.0.20+8-1ubuntu1~23.04 | 11.0.20+8-1ubuntu1~23.04 |
ubuntu/openjdk-lts | <11.0.20+8-1ubuntu1~18.04 | 11.0.20+8-1ubuntu1~18.04 |
ubuntu/openjdk-lts | <11.0.20+8-1ubuntu1 | 11.0.20+8-1ubuntu1 |
ubuntu/openjdk-17 | <17.0.8+7-1~20.04.2 | 17.0.8+7-1~20.04.2 |
ubuntu/openjdk-17 | <17.0.8+7-1~22.04 | 17.0.8+7-1~22.04 |
ubuntu/openjdk-17 | <17.0.8+7-1~23.04 | 17.0.8+7-1~23.04 |
ubuntu/openjdk-17 | <17.0.8+7-1~18.04 | 17.0.8+7-1~18.04 |
ubuntu/openjdk-20 | <20.0.2+9+ | 20.0.2+9+ |
ubuntu/openjdk-21 | <21.0.1+12-2~20.04 | 21.0.1+12-2~20.04 |
ubuntu/openjdk-21 | <21.0.1+12-2~23.04 | 21.0.1+12-2~23.04 |
ubuntu/openjdk-21 | <21- | 21- |
ubuntu/openjdk-21 | <21.0.1+12-2~22.04 | 21.0.1+12-2~22.04 |
ubuntu/harfbuzz | <7.0.0 | 7.0.0 |
redhat/harfbuzz | <7.0.0 | 7.0.0 |
HarfBuzz | <=6.0.0 | |
Fedoraproject Fedora | =36 |
https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2023-25193.
The severity of CVE-2023-25193 is high.
CVE-2023-25193 allows attackers to trigger O(n^2) growth in HarfBuzz through consecutive marks during the process of looking back for base glyphs when attaching marks.
The affected software versions include HarfBuzz 2.3.1-1 up to and inclusive of 6.0.0+dfsg-3.
Yes, there are remediation steps available. Please refer to the official references for more information.