See https://bugs.launchpad.net/calibre/+bug/1951979: "calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py."
Please stable when ready, thanks!
calibre-5.43.0 is stable now.
Thanks! Please cleanup
The last ebuild that was from < 5.32 was dropped in February via https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2a5e53723dc747c2175b5649431a357cf1d80574 This can be closed now.
(In reply to Eli Schwartz from comment #4) > The last ebuild that was from < 5.32 was dropped in February via > https://gitweb.gentoo.org/repo/gentoo.git/commit/ > ?id=2a5e53723dc747c2175b5649431a357cf1d80574 > > This can be closed now. Yes - although we still need to decide if it merits a GLSA (we're rather behind and catching up atm).
Most ReDoS isn't GLSA worthy. All done.