Show plain JSON{"affected_release": [{"advisory": "RHSA-2023:4208", "cpe": "cpe:/a:redhat:openjdk:11", "package": "Linux", "product_name": "Red Hat Build of OpenJDK 11.0.20", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2023:4161", "cpe": "cpe:/a:redhat:openjdk:11::windows", "package": "Windows", "product_name": "Red Hat Build of OpenJDK 11.0.20", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2023:4210", "cpe": "cpe:/a:redhat:openjdk:17", "package": "Linux", "product_name": "Red Hat Build of OpenJDK 17.0.8", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2023:4211", "cpe": "cpe:/a:redhat:openjdk:17::windows", "package": "Windows", "product_name": "Red Hat Build of OpenJDK 17.0.8", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2023:4233", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "java-11-openjdk-1:11.0.20.0.8-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-07-21T00:00:00Z"}, {"advisory": "RHSA-2023:4159", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "java-17-openjdk-1:17.0.8.0.7-2.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2023:4175", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "java-11-openjdk-1:11.0.20.0.8-2.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2024:2980", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "harfbuzz-0:1.7.5-4.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-05-22T00:00:00Z"}, {"advisory": "RHSA-2023:4165", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4162", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4162", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4162", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4163", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4171", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "java-17-openjdk-1:17.0.8.0.7-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4163", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4171", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "java-17-openjdk-1:17.0.8.0.7-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4163", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4171", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "java-17-openjdk-1:17.0.8.0.7-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4164", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "java-11-openjdk-1:11.0.20.0.8-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4170", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "java-17-openjdk-1:17.0.8.0.7-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4158", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "java-11-openjdk-1:11.0.20.0.8-2.el9", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2023:4177", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "java-17-openjdk-1:17.0.8.0.7-2.el9", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-07-20T00:00:00Z"}, {"advisory": "RHSA-2024:2410", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "harfbuzz-0:2.7.4-10.el9", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-04-30T00:00:00Z"}, {"advisory": "RHSA-2024:2410", "cpe": "cpe:/o:redhat:enterprise_linux:9", "package": "harfbuzz-0:2.7.4-10.el9", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-04-30T00:00:00Z"}, {"advisory": "RHSA-2023:4157", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "java-11-openjdk-1:11.0.20.0.8-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-07-19T00:00:00Z"}, {"advisory": "RHSA-2023:4169", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "java-17-openjdk-1:17.0.8.0.7-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-07-19T00:00:00Z"}], "bugzilla": {"description": "harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks", "id": "2167254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167254"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "status": "verified"}, "cwe": "CWE-770", "details": ["hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.", "A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks."], "name": "CVE-2023-25193", "package_state": [{"cpe": "cpe:/a:redhat:openjdk:1.8", "fix_state": "Not affected", "package_name": "Linux", "product_name": "Red Hat build of OpenJDK 1.8"}, {"cpe": "cpe:/a:redhat:openjdk:1.8", "fix_state": "Not affected", "package_name": "Windows", "product_name": "Red Hat build of OpenJDK 1.8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "java-1.6.0-openjdk", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "java-1.7.0-openjdk", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "java-1.8.0-openjdk", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Out of support scope", "package_name": "harfbuzz", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "java-1.6.0-openjdk", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "java-1.7.0-openjdk", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "java-1.8.0-openjdk", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "firefox:flatpak/firefox", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "java-1.8.0-openjdk", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "thunderbird:flatpak/thunderbird", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "firefox:flatpak/firefox", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "java-1.8.0-openjdk", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "thunderbird:flatpak/thunderbird", "product_name": "Red Hat Enterprise Linux 9"}], "public_date": "2023-02-04T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-25193\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-25193"], "threat_severity": "Moderate"}