{"id":"BIT-java-min-2023-25193","details":"hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.","aliases":["BIT-java-2023-25193","BIT-jre-2023-25193","CVE-2023-25193"],"modified":"2026-05-08T07:56:19.509525545Z","published":"2026-05-06T14:44:02.939Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:bellsoft:libericajdk:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361"},{"type":"WEB","url":"https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh"},{"type":"WEB","url":"https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25193"},{"type":"WEB","url":"https://openjdk.org/groups/vulnerability/advisories/2023-07-18"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230725-0006/"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2023.html"}],"affected":[{"package":{"name":"java-min","ecosystem":"Bitnami","purl":"pkg:bitnami/java-min"},"ranges":[{"type":"SEMVER","events":[{"introduced":"9.0.0"},{"fixed":"11.0.20"},{"introduced":"12.0.0"},{"fixed":"17.0.8"},{"introduced":"18.0.0"},{"fixed":"20.0.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/java-min/BIT-java-min-2023-25193.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}],"schema_version":"1.7.5"}