OPENSUSE-SU-2026:10587-1

Vulnerability from csaf_opensuse - Published: 2026-04-21 00:00 - Updated: 2026-04-21 00:00
Summary
calibre-9.7.0-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: calibre-9.7.0-1.1 on GA media
Description of the patch: These are all security issues fixed in the calibre-9.7.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2026-10587
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/o… self
https://www.suse.com/security/cve/CVE-2026-25635/ self
https://www.suse.com/security/cve/CVE-2026-25636/ self
https://www.suse.com/security/cve/CVE-2026-25731/ self
https://www.suse.com/security/cve/CVE-2026-26064/ self
https://www.suse.com/security/cve/CVE-2026-26065/ self
https://www.suse.com/security/cve/CVE-2026-27810/ self
https://www.suse.com/security/cve/CVE-2026-27824/ self
https://www.suse.com/security/cve/CVE-2026-30853/ self
https://www.suse.com/security/cve/CVE-2026-33205/ self
https://www.suse.com/security/cve/CVE-2026-33206/ self
https://www.suse.com/security/cve/CVE-2026-25635 external
https://bugzilla.suse.com/1257885 external
https://www.suse.com/security/cve/CVE-2026-25636 external
https://bugzilla.suse.com/1257886 external
https://www.suse.com/security/cve/CVE-2026-25731 external
https://bugzilla.suse.com/1257879 external
https://www.suse.com/security/cve/CVE-2026-26064 external
https://bugzilla.suse.com/1258529 external
https://www.suse.com/security/cve/CVE-2026-26065 external
https://bugzilla.suse.com/1258530 external
https://www.suse.com/security/cve/CVE-2026-27810 external
https://bugzilla.suse.com/1259042 external
https://www.suse.com/security/cve/CVE-2026-27824 external
https://bugzilla.suse.com/1259043 external
https://www.suse.com/security/cve/CVE-2026-30853 external
https://bugzilla.suse.com/1259688 external
https://www.suse.com/security/cve/CVE-2026-33205 external
https://bugzilla.suse.com/1260987 external
https://www.suse.com/security/cve/CVE-2026-33206 external
https://bugzilla.suse.com/1260986 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "calibre-9.7.0-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the calibre-9.7.0-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2026-10587",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10587-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-25635 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-25635/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-25636 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-25636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-25731 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-25731/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-26064 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-26064/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-26065 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-26065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-27810 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-27810/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-27824 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-27824/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-30853 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-30853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-33205 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-33205/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-33206 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-33206/"
      }
    ],
    "title": "calibre-9.7.0-1.1 on GA media",
    "tracking": {
      "current_release_date": "2026-04-21T00:00:00Z",
      "generator": {
        "date": "2026-04-21T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2026:10587-1",
      "initial_release_date": "2026-04-21T00:00:00Z",
      "revision_history": [
        {
          "date": "2026-04-21T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "calibre-9.7.0-1.1.aarch64",
                "product": {
                  "name": "calibre-9.7.0-1.1.aarch64",
                  "product_id": "calibre-9.7.0-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "calibre-9.7.0-1.1.ppc64le",
                "product": {
                  "name": "calibre-9.7.0-1.1.ppc64le",
                  "product_id": "calibre-9.7.0-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "calibre-9.7.0-1.1.s390x",
                "product": {
                  "name": "calibre-9.7.0-1.1.s390x",
                  "product_id": "calibre-9.7.0-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "calibre-9.7.0-1.1.x86_64",
                "product": {
                  "name": "calibre-9.7.0-1.1.x86_64",
                  "product_id": "calibre-9.7.0-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "calibre-9.7.0-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64"
        },
        "product_reference": "calibre-9.7.0-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "calibre-9.7.0-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le"
        },
        "product_reference": "calibre-9.7.0-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "calibre-9.7.0-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x"
        },
        "product_reference": "calibre-9.7.0-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "calibre-9.7.0-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        },
        "product_reference": "calibre-9.7.0-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-25635",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-25635"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is an e-book manager. Prior to 9.2.0, Calibre\u0027s CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven\u0027t tested on other OS\u0027s), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-25635",
          "url": "https://www.suse.com/security/cve/CVE-2026-25635"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257885 for CVE-2026-25635",
          "url": "https://bugzilla.suse.com/1257885"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-25635"
    },
    {
      "cve": "CVE-2026-25636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-25636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre\u0027s EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-25636",
          "url": "https://www.suse.com/security/cve/CVE-2026-25636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257886 for CVE-2026-25636",
          "url": "https://bugzilla.suse.com/1257886"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-25636"
    },
    {
      "cve": "CVE-2026-25731",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-25731"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre\u0027s Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via the --template-html or --template-html-index command-line options. This vulnerability is fixed in 9.2.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-25731",
          "url": "https://www.suse.com/security/cve/CVE-2026-25731"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257879 for CVE-2026-25731",
          "url": "https://bugzilla.suse.com/1257879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-25731"
    },
    {
      "cve": "CVE-2026-26064",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-26064"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith(\u0027Pictures\u0027), and does not sanitize \u0027..\u0027 sequences. calibre\u0027s own ZipFile.extractall() in utils/zipfile.py does sanitize \u0027..\u0027 via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-26064",
          "url": "https://www.suse.com/security/cve/CVE-2026-26064"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1258529 for CVE-2026-26064",
          "url": "https://bugzilla.suse.com/1258529"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-26064"
    },
    {
      "cve": "CVE-2026-26065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-26065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in \u0027wb\u0027 mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-26065",
          "url": "https://www.suse.com/security/cve/CVE-2026-26065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1258530 for CVE-2026-26065",
          "url": "https://bugzilla.suse.com/1258530"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-26065"
    },
    {
      "cve": "CVE-2026-27810",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-27810"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-27810",
          "url": "https://www.suse.com/security/cve/CVE-2026-27810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259042 for CVE-2026-27810",
          "url": "https://bugzilla.suse.com/1259042"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-27810"
    },
    {
      "cve": "CVE-2026-27824",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-27824"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server\u0027s brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-27824",
          "url": "https://www.suse.com/security/cve/CVE-2026-27824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259043 for CVE-2026-27824",
          "url": "https://bugzilla.suse.com/1259043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-27824"
    },
    {
      "cve": "CVE-2026-30853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-30853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to 9.5.0, a path traversal vulnerability in the RocketBook (.rb) input plugin (src/calibre/ebooks/rb/reader.py) allows an attacker to write arbitrary files to any path writable by the calibre process when a user opens or converts a crafted .rb file. This is the same bug class fixed in CVE-2026-26065 for the PDB readers, but the fix was never applied to the RB reader. This vulnerability is fixed in 9.5.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-30853",
          "url": "https://www.suse.com/security/cve/CVE-2026-30853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259688 for CVE-2026-30853",
          "url": "https://bugzilla.suse.com/1259688"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-30853"
    },
    {
      "cve": "CVE-2026-33205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-33205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a Server-Side Request Forgery vulnerability in the background-image endpoint of calibre e-book reader\u0027s web view allows an attacker to perform blind GET requests to arbitrary URLs and exfiltrate information out from the ebook sandbox. Version 9.6.0 patches the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-33205",
          "url": "https://www.suse.com/security/cve/CVE-2026-33205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260987 for CVE-2026-33205",
          "url": "https://bugzilla.suse.com/1260987"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-33205"
    },
    {
      "cve": "CVE-2026-33206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-33206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre\u0027 handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
          "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-33206",
          "url": "https://www.suse.com/security/cve/CVE-2026-33206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260986 for CVE-2026-33206",
          "url": "https://bugzilla.suse.com/1260986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.aarch64",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.ppc64le",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.s390x",
            "openSUSE Tumbleweed:calibre-9.7.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-21T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-33206"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…