Your message dated Sat, 10 Jan 2026 11:52:34 +0000
with message-id <[email protected]>
and subject line Released with 13.3
has caused the Debian Bug report #1120419,
regarding trixie-pu: package calibre/8.5.0+ds-1+deb13u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1120419: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120419
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: [email protected], [email protected]
Control: affects -1 + src:calibre
User: [email protected]
Usertags: pu

[ Reason ]
Fix CVE-2025-64486

[ Impact ]
This bug can be leveraged to achieve arbitrary code execution.

[ Tests ]
Build time test was successful.

[ Risks ]
Fix is trivial.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
Apply upstream fix:
https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5

You can examine changes from online:
https://github.com/debian-
calibre/calibre/compare/debian/8.5.0+ds-1...debian/trixie

[ Other info ]
Report of this issue by upstream:
https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
diff -Nru calibre-8.5.0+ds/debian/changelog calibre-8.5.0+ds/debian/changelog
--- calibre-8.5.0+ds/debian/changelog   2025-06-20 20:06:53.000000000 +0900
+++ calibre-8.5.0+ds/debian/changelog   2025-11-09 16:06:24.000000000 +0900
@@ -1,3 +1,9 @@
+calibre (8.5.0+ds-1+deb13u1) trixie; urgency=medium
+
+  * Fix CVE-2025-64486
+
+ -- YOKOTA Hiroshi <[email protected]>  Sun, 09 Nov 2025 16:06:24 +0900
+
 calibre (8.5.0+ds-1) unstable; urgency=medium
 
   * New upstream version 8.5.0+ds
diff -Nru calibre-8.5.0+ds/debian/patches/series 
calibre-8.5.0+ds/debian/patches/series
--- calibre-8.5.0+ds/debian/patches/series      2025-06-20 20:02:05.000000000 
+0900
+++ calibre-8.5.0+ds/debian/patches/series      2025-11-09 15:50:44.000000000 
+0900
@@ -79,3 +79,4 @@
 pykakasi/0079-Revert-More-work-on-de-vendoring-pykakasi.patch
 pykakasi/0080-Revert-Fix-a-regression-that-caused-incorrect-Englis.patch
 0081-Revert-Update-7zip-wrapper-code-for-removal-of-read-.patch
+upstream/0082-Fix-CVE-2025-64486.patch
diff -Nru 
calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch 
calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch
--- calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch      
1970-01-01 09:00:00.000000000 +0900
+++ calibre-8.5.0+ds/debian/patches/upstream/0082-Fix-CVE-2025-64486.patch      
2025-11-09 15:50:44.000000000 +0900
@@ -0,0 +1,23 @@
+From: Kovid Goyal <[email protected]>
+Date: Thu, 6 Nov 2025 09:36:53 +0530
+Subject: Fix CVE-2025-64486
+
+Bug: 
https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
+Origin: 
https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5
+---
+ src/calibre/ebooks/conversion/plugins/fb2_input.py | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/calibre/ebooks/conversion/plugins/fb2_input.py 
b/src/calibre/ebooks/conversion/plugins/fb2_input.py
+index aeb6a39..e649bb0 100644
+--- a/src/calibre/ebooks/conversion/plugins/fb2_input.py
++++ b/src/calibre/ebooks/conversion/plugins/fb2_input.py
+@@ -169,7 +169,7 @@ class FB2Input(InputFormatPlugin):
+         from calibre.ebooks.fb2 import base64_decode
+         self.binary_map = {}
+         for elem in doc.xpath('./*'):
+-            if elem.text and 'binary' in elem.tag and 'id' in elem.attrib:
++            if elem.text and 'binary' in elem.tag and elem.get('id', ''):
+                 ct = elem.get('content-type', '')
+                 fname = elem.attrib['id']
+                 ext = ct.rpartition('/')[-1].lower()

--- End Message ---
--- Begin Message ---
Package: release.debian.org\nVersion: 13.3\n\nThis update has been released as 
part of Debian 13.3.

--- End Message ---

Reply via email to