Package: release.debian.org Severity: normal Tags: trixie X-Debbugs-Cc: [email protected], [email protected] Control: affects -1 + src:calibre User: [email protected] Usertags: pu
[ Reason ] Fix CVE-2025-64486 [ Impact ] This bug can be leveraged to achieve arbitrary code execution. [ Tests ] Build time test was successful. [ Risks ] Fix is trivial. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable [ Changes ] Apply upstream fix: https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5 You can examine changes from online: https://github.com/debian- calibre/calibre/compare/debian/8.5.0+ds-1...debian/trixie [ Other info ] Report of this issue by upstream: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
diff -Nru calibre-8.5.0+ds/debian/changelog calibre-8.5.0+ds/debian/changelog --- calibre-8.5.0+ds/debian/changelog 2025-06-20 20:06:53.000000000 +0900 +++ calibre-8.5.0+ds/debian/changelog 2025-11-09 16:06:24.000000000 +0900 @@ -1,3 +1,9 @@ +calibre (8.5.0+ds-1+deb13u1) trixie; urgency=medium + + * Fix CVE-2025-64486 + + -- YOKOTA Hiroshi <[email protected]> Sun, 09 Nov 2025 16:06:24 +0900 + calibre (8.5.0+ds-1) unstable; urgency=medium * New upstream version 8.5.0+ds diff -Nru calibre-8.5.0+ds/debian/patches/series calibre-8.5.0+ds/debian/patches/series --- calibre-8.5.0+ds/debian/patches/series 2025-06-20 20:02:05.000000000 +0900 +++ calibre-8.5.0+ds/debian/patches/series 2025-11-09 15:50:44.000000000 +0900 @@ -79,3 +79,4 @@ pykakasi/0079-Revert-More-work-on-de-vendoring-pykakasi.patch pykakasi/0080-Revert-Fix-a-regression-that-caused-incorrect-Englis.patch 0081-Revert-Update-7zip-wrapper-code-for-removal-of-read-.patch +upstream/0082-Fix-CVE-2025-64486.patch diff -Nru calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch --- calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch 1970-01-01 09:00:00.000000000 +0900 +++ calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch 2025-11-09 15:50:44.000000000 +0900 @@ -0,0 +1,23 @@ +From: Kovid Goyal <[email protected]> +Date: Thu, 6 Nov 2025 09:36:53 +0530 +Subject: Fix CVE-2025-64486 + +Bug: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g +Origin: https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5 +--- + src/calibre/ebooks/conversion/plugins/fb2_input.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/calibre/ebooks/conversion/plugins/fb2_input.py b/src/calibre/ebooks/conversion/plugins/fb2_input.py +index aeb6a39..e649bb0 100644 +--- a/src/calibre/ebooks/conversion/plugins/fb2_input.py ++++ b/src/calibre/ebooks/conversion/plugins/fb2_input.py +@@ -169,7 +169,7 @@ class FB2Input(InputFormatPlugin): + from calibre.ebooks.fb2 import base64_decode + self.binary_map = {} + for elem in doc.xpath('./*'): +- if elem.text and 'binary' in elem.tag and 'id' in elem.attrib: ++ if elem.text and 'binary' in elem.tag and elem.get('id', ''): + ct = elem.get('content-type', '') + fname = elem.attrib['id'] + ext = ct.rpartition('/')[-1].lower()

