Páginas

sexta-feira, 4 de julho de 2025

Critical Security Update: libgepub Vulnerability Patched (CVE-2025-6196)

 

SUSe


SUSE releases a critical security update for libgepub (CVE-2025-6196) addressing an EPUB integer overflow flaw. Learn how to patch affected SUSE Linux Enterprise systems and mitigate risks. Rated moderate with CVSS scores up to 6.7.


Key Details of the libgepub Security Patch

A newly discovered vulnerability (CVE-2025-6196) in libgepub, a library for EPUB archive handling, has been patched by SUSE. This update prevents an integer overflow that could trigger excessive memory allocation, leading to application crashes.

Affected Systems:

  • SUSE Linux Enterprise Desktop 15 SP6/SP7

  • SUSE Linux Enterprise Server 15 SP6/SP7 (including SAP Applications)

  • SUSE Package Hub 15 SP6/SP7

Severity:

  •  CVSS:4.0: 6.7 (SUSE)

  • CVSS:3.1: 5.5 (SUSE/NVD)

  • Rating: Moderate


Why This Update Matters

EPUB files are widely used for digital publishing, making this vulnerability a potential vector for denial-of-service attacks. The flaw could be exploited by maliciously crafted EPUB files, disrupting applications relying on libgepub.

Patch Benefits:

  • Prevents memory exhaustion crashes.

  • Maintains system stability for enterprise environments.

  • Mitigates risks for SAP and real-time workloads.


How to Apply the Update

Recommended Methods:

  1. YaST Online Update: Automated patching for enterprise systems.

  2. Zypper Command: Manual installation via terminal:

    bash
    # For SUSE Package Hub 15 SP7:
    zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2213=1

Full Package List:

  • libgepub-0_6-0 (v0.6.0)

  • Debug symbols and typelibs for compatibility.


Technical Deep Dive: CVE-2025-6196

The vulnerability stems from improper bounds checking during EPUB parsing. Attackers could exploit this to trigger a 32-bit integer overflow, forcing the system to allocate unrealistic memory blocks (e.g., 4GB+ for a 1MB file).

Impact:

  • Local Attack Vector: Requires user interaction (opening a malicious EPUB).

  • No Data Compromise: Confidentiality/integrity remain intact.


FAQs

Q: Is this vulnerability actively exploited?

A: No known exploits in the wild, but patching is advised.

Q: Are non-SUSE systems affected?

A: Only if they use unpatched libgepub versions.

Q: How urgent is this update?

A: Moderate priority—patch during next maintenance window.


Nenhum comentário:

Postar um comentário