Bug#1120419: trixie-pu: package calibre/8.5.0+ds-1+deb13u1
Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: calibre@packages.debian.org, yokota.hgml@gmail.com
Control: affects -1 + src:calibre
User: release.debian.org@packages.debian.org
Usertags: pu
[ Reason ]
Fix CVE-2025-64486
[ Impact ]
This bug can be leveraged to achieve arbitrary code execution.
[ Tests ]
Build time test was successful.
[ Risks ]
Fix is trivial.
[ Checklist ]
[x] *all* changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in (old)stable
[x] the issue is verified as fixed in unstable
[ Changes ]
Apply upstream fix:
https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5
You can examine changes from online:
https://github.com/debian-
calibre/calibre/compare/debian/8.5.0+ds-1...debian/trixie
[ Other info ]
Report of this issue by upstream:
https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
diff -Nru calibre-8.5.0+ds/debian/changelog calibre-8.5.0+ds/debian/changelog
--- calibre-8.5.0+ds/debian/changelog 2025-06-20 20:06:53.000000000 +0900
+++ calibre-8.5.0+ds/debian/changelog 2025-11-09 16:06:24.000000000 +0900
@@ -1,3 +1,9 @@
+calibre (8.5.0+ds-1+deb13u1) trixie; urgency=medium
+
+ * Fix CVE-2025-64486
+
+ -- YOKOTA Hiroshi <yokota.hgml@gmail.com> Sun, 09 Nov 2025 16:06:24 +0900
+
calibre (8.5.0+ds-1) unstable; urgency=medium
* New upstream version 8.5.0+ds
diff -Nru calibre-8.5.0+ds/debian/patches/series calibre-8.5.0+ds/debian/patches/series
--- calibre-8.5.0+ds/debian/patches/series 2025-06-20 20:02:05.000000000 +0900
+++ calibre-8.5.0+ds/debian/patches/series 2025-11-09 15:50:44.000000000 +0900
@@ -79,3 +79,4 @@
pykakasi/0079-Revert-More-work-on-de-vendoring-pykakasi.patch
pykakasi/0080-Revert-Fix-a-regression-that-caused-incorrect-Englis.patch
0081-Revert-Update-7zip-wrapper-code-for-removal-of-read-.patch
+upstream/0082-Fix-CVE-2025-64486.patch
diff -Nru calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch
--- calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch 1970-01-01 09:00:00.000000000 +0900
+++ calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch 2025-11-09 15:50:44.000000000 +0900
@@ -0,0 +1,23 @@
+From: Kovid Goyal <kovid@kovidgoyal.net>
+Date: Thu, 6 Nov 2025 09:36:53 +0530
+Subject: Fix CVE-2025-64486
+
+Bug: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
+Origin: https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5
+---
+ src/calibre/ebooks/conversion/plugins/fb2_input.py | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/calibre/ebooks/conversion/plugins/fb2_input.py b/src/calibre/ebooks/conversion/plugins/fb2_input.py
+index aeb6a39..e649bb0 100644
+--- a/src/calibre/ebooks/conversion/plugins/fb2_input.py
++++ b/src/calibre/ebooks/conversion/plugins/fb2_input.py
+@@ -169,7 +169,7 @@ class FB2Input(InputFormatPlugin):
+ from calibre.ebooks.fb2 import base64_decode
+ self.binary_map = {}
+ for elem in doc.xpath('./*'):
+- if elem.text and 'binary' in elem.tag and 'id' in elem.attrib:
++ if elem.text and 'binary' in elem.tag and elem.get('id', ''):
+ ct = elem.get('content-type', '')
+ fname = elem.attrib['id']
+ ext = ct.rpartition('/')[-1].lower()
Reply to: