Advisories ยป MGASA-2025-0049

Updated calibre packages fix security vulnerabilities

Publication date: 12 Feb 2025
Modification date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-46303 , CVE-2024-6781 , CVE-2024-6782 , CVE-2024-7008 , CVE-2024-7009

Description

link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre
before 6.19.0 can, by default, add resources outside of the document
root. (CVE-2023-46303)
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to
achieve arbitrary file read. (CVE-2024-6781)
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated
attackers to achieve remote code execution. (CVE-2024-6782)
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform
reflected cross-site scripting. (CVE-2024-7008)
Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions
to perform full-text searches to achieve SQL injection on the SQLite
database. (CVE-2024-7009)
                

References

SRPMS

9/core