[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1120419: trixie-pu: package calibre/8.5.0+ds-1+deb13u1



Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: calibre@packages.debian.org, yokota.hgml@gmail.com
Control: affects -1 + src:calibre
User: release.debian.org@packages.debian.org
Usertags: pu

[ Reason ]
Fix CVE-2025-64486

[ Impact ]
This bug can be leveraged to achieve arbitrary code execution.

[ Tests ]
Build time test was successful.

[ Risks ]
Fix is trivial.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
Apply upstream fix:
https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5

You can examine changes from online:
https://github.com/debian-
calibre/calibre/compare/debian/8.5.0+ds-1...debian/trixie

[ Other info ]
Report of this issue by upstream:
https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
diff -Nru calibre-8.5.0+ds/debian/changelog calibre-8.5.0+ds/debian/changelog
--- calibre-8.5.0+ds/debian/changelog	2025-06-20 20:06:53.000000000 +0900
+++ calibre-8.5.0+ds/debian/changelog	2025-11-09 16:06:24.000000000 +0900
@@ -1,3 +1,9 @@
+calibre (8.5.0+ds-1+deb13u1) trixie; urgency=medium
+
+  * Fix CVE-2025-64486
+
+ -- YOKOTA Hiroshi <yokota.hgml@gmail.com>  Sun, 09 Nov 2025 16:06:24 +0900
+
 calibre (8.5.0+ds-1) unstable; urgency=medium
 
   * New upstream version 8.5.0+ds
diff -Nru calibre-8.5.0+ds/debian/patches/series calibre-8.5.0+ds/debian/patches/series
--- calibre-8.5.0+ds/debian/patches/series	2025-06-20 20:02:05.000000000 +0900
+++ calibre-8.5.0+ds/debian/patches/series	2025-11-09 15:50:44.000000000 +0900
@@ -79,3 +79,4 @@
 pykakasi/0079-Revert-More-work-on-de-vendoring-pykakasi.patch
 pykakasi/0080-Revert-Fix-a-regression-that-caused-incorrect-Englis.patch
 0081-Revert-Update-7zip-wrapper-code-for-removal-of-read-.patch
+upstream/0082-Fix-CVE-2025-64486.patch
diff -Nru calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch
--- calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch	1970-01-01 09:00:00.000000000 +0900
+++ calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch	2025-11-09 15:50:44.000000000 +0900
@@ -0,0 +1,23 @@
+From: Kovid Goyal <kovid@kovidgoyal.net>
+Date: Thu, 6 Nov 2025 09:36:53 +0530
+Subject: Fix CVE-2025-64486
+
+Bug: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
+Origin: https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5
+---
+ src/calibre/ebooks/conversion/plugins/fb2_input.py | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/calibre/ebooks/conversion/plugins/fb2_input.py b/src/calibre/ebooks/conversion/plugins/fb2_input.py
+index aeb6a39..e649bb0 100644
+--- a/src/calibre/ebooks/conversion/plugins/fb2_input.py
++++ b/src/calibre/ebooks/conversion/plugins/fb2_input.py
+@@ -169,7 +169,7 @@ class FB2Input(InputFormatPlugin):
+         from calibre.ebooks.fb2 import base64_decode
+         self.binary_map = {}
+         for elem in doc.xpath('./*'):
+-            if elem.text and 'binary' in elem.tag and 'id' in elem.attrib:
++            if elem.text and 'binary' in elem.tag and elem.get('id', ''):
+                 ct = elem.get('content-type', '')
+                 fname = elem.attrib['id']
+                 ext = ct.rpartition('/')[-1].lower()

Reply to: