UBUNTU-CVE-2026-22693

Source
https://ubuntu.com/security/CVE-2026-22693
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22693.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-22693
Upstream
Published
2026-01-10T06:15:00Z
Modified
2026-01-20T19:40:38.309263Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function fails to check if hbmalloc returns NULL before using placement new to construct an object at the returned pointer address. When hbmalloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault. This issue has been patched in version 12.3.0.

References

Affected packages

Ubuntu:24.04:LTS / harfbuzz

Package

Name
harfbuzz
Purl
pkg:deb/ubuntu/harfbuzz@8.3.0-2build2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.0.1-1
8.0.1-1build1
8.3.0-2
8.3.0-2build1
8.3.0-2build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "gir1.2-harfbuzz-0.0"
        },
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "libharfbuzz-bin"
        },
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "libharfbuzz-cairo0"
        },
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "libharfbuzz-dev"
        },
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "libharfbuzz-gobject0"
        },
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "libharfbuzz-icu0"
        },
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "libharfbuzz-subset0"
        },
        {
            "binary_version": "8.3.0-2build2",
            "binary_name": "libharfbuzz0b"
        }
    ],
    "priority_reason": "This is a DoS that isn't attacker-controlled"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22693.json"

Ubuntu:25.10 / harfbuzz

Package

Name
harfbuzz
Purl
pkg:deb/ubuntu/harfbuzz@10.2.0-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*
10.2.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "10.2.0-1",
            "binary_name": "gir1.2-harfbuzz-0.0"
        },
        {
            "binary_version": "10.2.0-1",
            "binary_name": "libharfbuzz-bin"
        },
        {
            "binary_version": "10.2.0-1",
            "binary_name": "libharfbuzz-cairo0"
        },
        {
            "binary_version": "10.2.0-1",
            "binary_name": "libharfbuzz-dev"
        },
        {
            "binary_version": "10.2.0-1",
            "binary_name": "libharfbuzz-gobject0"
        },
        {
            "binary_version": "10.2.0-1",
            "binary_name": "libharfbuzz-icu0"
        },
        {
            "binary_version": "10.2.0-1",
            "binary_name": "libharfbuzz-subset0"
        },
        {
            "binary_version": "10.2.0-1",
            "binary_name": "libharfbuzz0b"
        }
    ],
    "priority_reason": "This is a DoS that isn't attacker-controlled"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22693.json"