Updated calibre packages fix security vulnerabilities
Publication date: 12 Feb 2025Modification date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-46303 , CVE-2024-6781 , CVE-2024-6782 , CVE-2024-7008 , CVE-2024-7009
Description
link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root. (CVE-2023-46303) Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read. (CVE-2024-6781) Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. (CVE-2024-6782) Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting. (CVE-2024-7008) Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database. (CVE-2024-7009)
References
- https://bugs.mageia.org/show_bug.cgi?id=33535
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTG4W7NKCI3YSS24S3XTWQKFDUAR6BN3/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7009
SRPMS
9/core
- calibre-6.17.0-1.1.mga9