SUSE-SU-2026:20762-1

Vulnerability from csaf_suse - Published: 2026-03-20 15:24 - Updated: 2026-03-20 15:24
Summary
Security update for harfbuzz
Severity
Moderate
Notes
Title of the patch: Security update for harfbuzz
Description of the patch: This update for harfbuzz fixes the following issues: Update to version 11.4.5: Security fixes: - CVE-2026-22693: Fixed a NULL pointer dereference in SubtableUnicodesCache::create (bsc#1256459). Other fixes: - Bug fixes for “AAT” shaping, and other shaping micro optimizations. - Fix a shaping regression affecting mark glyphs in certain fonts. - Fix pruning of mark filtering sets when subsetting fonts, which caused changes in shaping behaviour. - Make shaping fail much faster for certain malformed fonts (e.g., those that trigger infinite recursion). - Fix undefined behaviour introduced in 11.4.2. - Fix detection of the “Cambria Math” font when fonts are scaled, so the workaround for the bad MATH table constant is applied. - Various performance and memory usage improvements. - The hb-shape command line tool can now be built with the amalgamated harfbuzz.cc source. - Fix regression in handling version 2 of avar table. - Increase various buffer length limits for better handling of fonts that generate huge number of glyphs per codepoint (e.g. Noto Sans Duployan). - Improvements to the harfrust shaper for more accurate testing. - Fix clang compiler warnings. - General shaping and subsetting speedups. - Fix in Graphite shaping backend when glyph advances became negative. - Subsetting improvements, pruning empty mark-attachment lookups. - Don't use the macro name _S, which is reserved by system liberaries. - Build fixes and speedup. - Add a kbts shaping backend that calls into the kb_text_shape single-header shaping library. This is purely for testing and performance evaluation and we do NOT recommend using it for any other purposes. - Fix bug in vertical shaping of fonts without the vmtx table. - Fix build with non-compliant C++11 compilers that don't recognize the "and" keyword. - Fix crasher in the glyph_v_origin function introduced in 11.3.0. - Speed up handling fonts with very large number of variations. - Speed up getting horizontal and vertical glyph advances by up to 24%. - Significantly speed up vertical text shaping. - Various documentation improvements. - Various build improvements. - Various subsetting improvements. - Various improvements to Rust font functions (fontations integration) and shaper (HarfRust integration). - Rename harfruzz option and shaper to harfrust following upstream rename. - Implement hb_face_reference_blob() for DirectWrite font functions. - Various build improvements. - Fix build with HB_NO_DRAW and HB_NO_PAINT. - Add an optional harfruzz shaper that uses HarfRuzz; an ongoing Rust port of HarfBuzz shaping. This shaper is mainly used for testing the output of the Rust implementation. - Fix regression that caused applying unsafe_to_break() to the whole buffer to be ignored. - Update USE data files. - Fix getting advances of out-of-rage glyph indices in DirectWrite font functions. - Painting of COLRv1 fonts without clip boxes is now about 10 times faster. - Synthetic bold/slant of a sub font is now respected, instead of using the parent’s. - Glyph extents for fonts synthetic bold/slant are now accurately calculated. - Various build fixes. - Include bidi mirroring variants of the requested codepoints when subsetting. The new HB_SUBSET_FLAGS_NO_BIDI_CLOSURE can be used to disable this behaviour. - Various bug fixes. - Various build fixes and improvements. - Various test suite improvements. - The change in version 10.3.0 to apply “trak” table tracking values to glyph advances directly has been reverted as it required every font functions implementation to handle it, which breaks existing custom font functions. Tracking is instead back to being applied during shaping. - When directwrite integration is enabled, we now link to dwrite.dll instead of dynamically loading it. - A new experimental APIs for getting raw “CFF” and “CFF2” CharStrings. - We now provide manpages for the various command line utilities. Building manpages requires “help2man” and will be skipped if it is not present. - The command line utilities now set different return value for different kinds of failures. Details are provided in the manpages. - Various fixes and improvements to fontations font functions. - All shaping operations using the ot shaper have become memory allocation-free. - Glyph extents returned by hb-ot and hb-ft font functions are now rounded in stead of flooring/ceiling them, which also matches what other font libraries do. - Fix “AAT” deleted glyph marks interfering with fallback mark positioning. - Glyph outlines emboldening have been moved out of hb-ot and hb-ft font functions to the HarfBuzz font layer, so that it works with any font functions implementation. - Fix our fallback C++11 atomics integration, which seems to not be widely used. - Various testing fixes and improvements. - Various subsetting fixes and improvements. - Various other fixes and improvements.
Patchnames: SUSE-SL-Micro-6.2-423
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for harfbuzz",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for harfbuzz fixes the following issues:\n\nUpdate to version 11.4.5:\n\nSecurity fixes:\n\n  - CVE-2026-22693: Fixed a NULL pointer dereference in SubtableUnicodesCache::create (bsc#1256459).\n\nOther fixes:\n\n  - Bug fixes for \u201cAAT\u201d shaping, and other shaping micro\n    optimizations.\n  - Fix a shaping regression affecting mark glyphs in certain\n    fonts.\n  - Fix pruning of mark filtering sets when subsetting fonts, which\n    caused changes in shaping behaviour.\n  - Make shaping fail much faster for certain malformed fonts\n    (e.g., those that trigger infinite recursion).\n  - Fix undefined behaviour introduced in 11.4.2.\n  - Fix detection of the \u201cCambria Math\u201d font when fonts are scaled,\n    so the workaround for the bad MATH table constant is applied.\n  - Various performance and memory usage improvements.\n  - The hb-shape command line tool can now be built with the\n    amalgamated harfbuzz.cc source.\n  - Fix regression in handling version 2 of avar table.\n  - Increase various buffer length limits for better handling of\n    fonts that generate huge number of glyphs per codepoint (e.g.\n    Noto Sans Duployan).\n  - Improvements to the harfrust shaper for more accurate testing.\n  - Fix clang compiler warnings.\n  - General shaping and subsetting speedups.\n  - Fix in Graphite shaping backend when glyph advances became\n    negative.\n  - Subsetting improvements, pruning empty mark-attachment lookups.\n  - Don\u0027t use the macro name _S, which is reserved by system\n    liberaries.\n  - Build fixes and speedup.\n  - Add a kbts shaping backend that calls into the kb_text_shape\n    single-header shaping library. This is purely for testing and\n    performance evaluation and we do NOT recommend using it for any\n    other purposes.\n  - Fix bug in vertical shaping of fonts without the vmtx table.\n  - Fix build with non-compliant C++11 compilers that don\u0027t\n    recognize the \"and\" keyword.\n  - Fix crasher in the glyph_v_origin function introduced in\n    11.3.0.\n  - Speed up handling fonts with very large number of variations.\n  - Speed up getting horizontal and vertical glyph advances by up\n    to 24%.\n  - Significantly speed up vertical text shaping.\n  - Various documentation improvements.\n  - Various build improvements.\n  - Various subsetting improvements.\n  - Various improvements to Rust font functions (fontations\n    integration) and shaper (HarfRust integration).\n  - Rename harfruzz option and shaper to harfrust following\n    upstream rename.\n  - Implement hb_face_reference_blob() for DirectWrite font\n    functions.\n  - Various build improvements.\n  - Fix build with HB_NO_DRAW and HB_NO_PAINT.\n  - Add an optional harfruzz shaper that uses HarfRuzz; an ongoing\n    Rust port of HarfBuzz shaping. This shaper is mainly used for\n    testing the output of the Rust implementation.\n  - Fix regression that caused applying unsafe_to_break() to the\n    whole buffer to be ignored.\n  - Update USE data files.\n  - Fix getting advances of out-of-rage glyph indices in\n    DirectWrite font functions.\n  - Painting of COLRv1 fonts without clip boxes is now about 10\n    times faster.\n  - Synthetic bold/slant of a sub font is now respected, instead of\n    using the parent\u2019s.\n  - Glyph extents for fonts synthetic bold/slant are now accurately\n    calculated.\n  - Various build fixes.\n  - Include bidi mirroring variants of the requested codepoints\n    when subsetting. The new HB_SUBSET_FLAGS_NO_BIDI_CLOSURE can be\n    used to disable this behaviour.\n  - Various bug fixes.\n  - Various build fixes and improvements.\n  - Various test suite improvements.\n  - The change in version 10.3.0 to apply \u201ctrak\u201d table tracking\n    values to glyph advances directly has been reverted as it\n    required every font functions implementation to handle it,\n    which breaks existing custom font functions. Tracking is\n    instead back to being applied during shaping.\n  - When directwrite integration is enabled, we now link to\n    dwrite.dll instead of dynamically loading it.\n  - A new experimental APIs for getting raw \u201cCFF\u201d and \u201cCFF2\u201d\n    CharStrings.\n  - We now provide manpages for the various command line utilities.\n    Building manpages requires \u201chelp2man\u201d and will be skipped if it\n    is not present.\n  - The command line utilities now set different return value for\n    different kinds of failures. Details are provided in the\n    manpages.\n  - Various fixes and improvements to fontations font functions.\n  - All shaping operations using the ot shaper have become memory\n    allocation-free.\n  - Glyph extents returned by hb-ot and hb-ft font functions are\n    now rounded in stead of flooring/ceiling them, which also\n    matches what other font libraries do.\n  - Fix \u201cAAT\u201d deleted glyph marks interfering with fallback mark\n    positioning.\n  - Glyph outlines emboldening have been moved out of hb-ot and\n    hb-ft font functions to the HarfBuzz font layer, so that it\n    works with any font functions implementation.\n  - Fix our fallback C++11 atomics integration, which seems to not\n    be widely used.\n  - Various testing fixes and improvements.\n  - Various subsetting fixes and improvements.\n  - Various other fixes and improvements.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SL-Micro-6.2-423",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20762-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2026:20762-1",
        "url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620762-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2026:20762-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024824.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256459",
        "url": "https://bugzilla.suse.com/1256459"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-22693 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-22693/"
      }
    ],
    "title": "Security update for harfbuzz",
    "tracking": {
      "current_release_date": "2026-03-20T15:24:11Z",
      "generator": {
        "date": "2026-03-20T15:24:11Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2026:20762-1",
      "initial_release_date": "2026-03-20T15:24:11Z",
      "revision_history": [
        {
          "date": "2026-03-20T15:24:11Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64",
                "product": {
                  "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64",
                  "product_id": "libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libharfbuzz0-11.4.5-160000.1.1.aarch64",
                "product": {
                  "name": "libharfbuzz0-11.4.5-160000.1.1.aarch64",
                  "product_id": "libharfbuzz0-11.4.5-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64",
                "product": {
                  "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64",
                  "product_id": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le",
                "product": {
                  "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le",
                  "product_id": "libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libharfbuzz0-11.4.5-160000.1.1.ppc64le",
                "product": {
                  "name": "libharfbuzz0-11.4.5-160000.1.1.ppc64le",
                  "product_id": "libharfbuzz0-11.4.5-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le",
                "product": {
                  "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le",
                  "product_id": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.s390x",
                "product": {
                  "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.s390x",
                  "product_id": "libharfbuzz-gobject0-11.4.5-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libharfbuzz0-11.4.5-160000.1.1.s390x",
                "product": {
                  "name": "libharfbuzz0-11.4.5-160000.1.1.s390x",
                  "product_id": "libharfbuzz0-11.4.5-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x",
                "product": {
                  "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x",
                  "product_id": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64",
                "product": {
                  "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64",
                  "product_id": "libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libharfbuzz0-11.4.5-160000.1.1.x86_64",
                "product": {
                  "name": "libharfbuzz0-11.4.5-160000.1.1.x86_64",
                  "product_id": "libharfbuzz0-11.4.5-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64",
                "product": {
                  "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64",
                  "product_id": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Micro 6.2",
                "product": {
                  "name": "SUSE Linux Micro 6.2",
                  "product_id": "SUSE Linux Micro 6.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:16:16.0:transactional"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64"
        },
        "product_reference": "libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le"
        },
        "product_reference": "libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.s390x"
        },
        "product_reference": "libharfbuzz-gobject0-11.4.5-160000.1.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64"
        },
        "product_reference": "libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz0-11.4.5-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.aarch64"
        },
        "product_reference": "libharfbuzz0-11.4.5-160000.1.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz0-11.4.5-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.ppc64le"
        },
        "product_reference": "libharfbuzz0-11.4.5-160000.1.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz0-11.4.5-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.s390x"
        },
        "product_reference": "libharfbuzz0-11.4.5-160000.1.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libharfbuzz0-11.4.5-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.x86_64"
        },
        "product_reference": "libharfbuzz0-11.4.5-160000.1.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64"
        },
        "product_reference": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le"
        },
        "product_reference": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x"
        },
        "product_reference": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
          "product_id": "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64"
        },
        "product_reference": "typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-22693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-22693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault. This issue has been patched in version 12.3.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64",
          "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le",
          "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.s390x",
          "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64",
          "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.aarch64",
          "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.ppc64le",
          "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.s390x",
          "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.x86_64",
          "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64",
          "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le",
          "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x",
          "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-22693",
          "url": "https://www.suse.com/security/cve/CVE-2026-22693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256459 for CVE-2026-22693",
          "url": "https://bugzilla.suse.com/1256459"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64",
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le",
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.s390x",
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.aarch64",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.ppc64le",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.s390x",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.x86_64",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.aarch64",
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.ppc64le",
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.s390x",
            "SUSE Linux Micro 6.2:libharfbuzz-gobject0-11.4.5-160000.1.1.x86_64",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.aarch64",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.ppc64le",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.s390x",
            "SUSE Linux Micro 6.2:libharfbuzz0-11.4.5-160000.1.1.x86_64",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.aarch64",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.ppc64le",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.s390x",
            "SUSE Linux Micro 6.2:typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-20T15:24:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-22693"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…