Untriaged
Permalink
CVE-2025-6196
5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Libgepub: integer overflow in libgepub's epub archive handling
A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to incorrect memory allocations. This issue causes the application to crash. Known affected usage includes desktop services like Tumbler, which may process malicious files automatically when browsing directories. While no direct remote attack vectors are confirmed, any application using libgepub to parse user-supplied EPUB content could be vulnerable to a denial of service.
References
- https://access.redhat.com/security/cve/CVE-2025-6196 x_refsource_REDHAT vdb-entry
- RHBZ#2373117 issue-tracking x_refsource_REDHAT
- https://gitlab.gnome.org/GNOME/libgepub/-/issues/18
- https://gitlab.gnome.org/GNOME/libgepub/-/issues/18
- https://access.redhat.com/security/cve/CVE-2025-6196 x_refsource_REDHAT vdb-entry
- RHBZ#2373117 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-6196 x_refsource_REDHAT vdb-entry
- RHBZ#2373117 issue-tracking x_refsource_REDHAT
- https://gitlab.gnome.org/GNOME/libgepub/-/issues/18
- https://access.redhat.com/security/cve/CVE-2025-6196 x_refsource_REDHAT vdb-entry
- RHBZ#2373117 issue-tracking x_refsource_REDHAT
- https://gitlab.gnome.org/GNOME/libgepub/-/issues/18
Affected products
libgepub
- <0.7.2
Package maintainers
-
@hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
-
@jtojnar Jan Tojnar <jtojnar@gmail.com>
-
@dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>
-
@bobby285271 Bobby Rong <rjl931189261@126.com>