From $URL: Calibre can access the local files using javascript in epub file. Code snippet: > <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.1.0/jquery.min.js"></script> > <script> > $.getScript( "../../../../../../../../etc/passwd", function( data, textStatus, jqxhr ) { > document.write('<h1>Your data</h1><pre>' + data + '</pre>'); > }); > </script> Attacker can steal any victim file and send to server.
Upstream patch: https://github.com/kovidgoyal/calibre/commit/3a89718664cb8cce0449d1758eee585ed0d0433c @ Maintainer(s): Please bump to >=app-text/calibre-2.75.0.
Version bumped to 2.78.0: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f6ec1239d27b0f7610e4f258ae699a61323b9464
@ Maintainer(s): Can we already start stabilizing of =app-text/calibre-2.78.0?
Yes, please stabilize it.
@ Arches, please test and mark stable: =app-text/calibre-2.78.0
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please vote.
Removed all older versions: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=eec6496565ecc351a686da8eacdfc04400baa98a
GLSA Vote: No Repository is clean, all done!