Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: calibre

Found 3 matching suggestions

Published
updated 4 days, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • calibre-web
    • pkgsRocm.calibre
    • calibre-no-speech
    • pkgsRocm.calibre-no-speech
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
calibre has a Path Traversal Leading to Arbitrary File Corruption and Code Execution

calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.

Affected products

calibre
  • ==< 9.2.0

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Upstream advisory: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-8r26-m7j5-hm29
Upstream patch: https://github.com/kovidgoyal/calibre/commit/9484ea82c6ab226c18e6ca5aa000fa16de598726
Published
updated 4 days, 13 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • calibre-web
    • pkgsRocm.calibre
    • calibre-no-speech
    • pkgsRocm.calibre-no-speech
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
calibre has a Path Traversal Leading to Arbitrary File Write and Potential Code Execution

calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.

Affected products

calibre
  • ==< 9.2.0

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Upstream advisory: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-32vh-whvh-9fxr
Upstream patch: https://github.com/kovidgoyal/calibre/commit/9739232fcb029ac15dfe52ccd4fdb4a07ebb6ce9
Published
updated 4 days, 13 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • calibre-web
    • pkgsRocm.calibre
    • calibre-no-speech
    • pkgsRocm.calibre-no-speech
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Calibre Affected by Arbitrary Code Execution via Server-Side Template Injection in Calibre HTML Export

calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via the --template-html or --template-html-index command-line options. This vulnerability is fixed in 9.2.0.

Affected products

calibre
  • ==< 9.2.0

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Upstream advisory: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-xrh9-w7qx-3gcc
Upstream patch: https://github.com/kovidgoyal/calibre/commit/f0649b27512e987b95fcab2e1e0a3bcdafc23379