- Description
- A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to incorrect memory allocations. This issue causes the application to crash. Known affected usage includes desktop services like Tumbler, which may process malicious files automatically when browsing directories. While no direct remote attack vectors are confirmed, any application using libgepub to parse user-supplied EPUB content could be vulnerable to a denial of service.
- Source
- secalert@redhat.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- secalert@redhat.com
- CWE-190
- Hype score
- Not currently trending
Critical update for #SUSE Linux: libgepub patch (CVE-2025-6196) stops EPUB integer overflow attacks. CVSS 6.7. Patch via YaST or: zypper in -t patch SUSE-...-2213=1 Read more: 👉 https://t.co/QiSruyxA12 #LinuxSecurity https://t.co/VucHJ1IKZB
@Cezar_H_Linux
4 Jul 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-6196 A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to in… https://t.co/osXCVKQDnF
@CVEnew
17 Jun 2025
308 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes