Описание
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| calibre | fixed | 3.19.0+dfsg-1 | package | |
| calibre | no-dsa | stretch | package | |
| calibre | no-dsa | jessie | package | |
| calibre | no-dsa | wheezy | package |
Примечания
https://bugs.launchpad.net/calibre/+bug/1753870
deserialization fix https://github.com/kovidgoyal/calibre/commit/aeb5b036a0bf657951756688b3c72bd68b6e4a7d
insufficient as import also loads configuration files, which are python executables,
see https://lists.debian.org/87muy0usv1.fsf@curie.anarc.at
The CVE assignment is specific to the issue fixed by upstream commit
aeb5b036a0bf657951756688b3c72bd68b6e4a7d.
Связанные уязвимости
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.