DEBIAN-CVE-2026-26065

Source
https://security-tracker.debian.org/tracker/CVE-2026-26065
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26065.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-26065
Upstream
Published
2026-02-20T02:16:53.730Z
Modified
2026-02-21T10:48:56.685545Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0.

References

Affected packages

Debian:11 / calibre

Package

Name
calibre
Purl
pkg:deb/debian/calibre?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.12.0+dfsg-1
5.12.0+dfsg-1+deb11u1
5.12.0+dfsg-1+deb11u2
5.12.0+dfsg-1+deb11u3
5.13.0+dfsg-1
5.14.0+dfsg-1
5.14.0+dfsg-2
5.14.0+dfsg-3
5.14.0+dfsg-4
5.14.0+dfsg-5
5.14.0+dfsg-6
5.14.0+dfsg-7
5.14.0+dfsg-8
5.15.0+dfsg-1
5.15.0+dfsg-2
5.16.1+dfsg-1
5.17.0+dfsg-1
5.17.0+dfsg-2
5.17.0+dfsg-3
5.17.0+dfsg-4
5.18.0+dfsg-1
5.19.0+dfsg-1
5.20.0+dfsg-1
5.20.0+dfsg-2
5.20.0+dfsg-3
5.21.0+dfsg-1
5.22.0+dfsg-1
5.22.0+dfsg-2
5.22.1+dfsg-1
5.23.0+dfsg-1
5.23.0+dfsg-2
5.24.0+dfsg-1
5.25.0+dfsg-1
5.25.0+dfsg-2
5.25.0+dfsg-3
5.26.0+dfsg-1
5.26.0+dfsg-2
5.26.0+dfsg-3
5.26.0+dfsg-4
5.27.0+dfsg-1
5.28.0+dfsg-1
5.29.0+dfsg-1
5.30.0+dfsg-1
5.31.1+dfsg-1
5.31.1+dfsg-2
5.31.1+dfsg-3
5.32.0+dfsg-1
5.32.0+dfsg-2
5.33.0+dfsg-1
5.33.2+dfsg-1
5.34.0+dfsg-1
5.35.0+dfsg-1
5.35.0+dfsg-2
5.35.0+dfsg-3
5.36.0+dfsg-1
5.37.0+dfsg-1
5.38.0+dfsg-1
5.39.0+dfsg-1
5.39.1+dfsg-1
5.39.1+dfsg-2
5.40.0+dfsg-1
5.40.0+dfsg-2
5.41.0+dfsg-1
5.41.0+dfsg-2~bpo11+1
5.41.0+dfsg-2~exp1
5.41.0+dfsg-2
5.42.0+dfsg-1~bpo11+1
5.42.0+dfsg-1
5.43.0+dfsg-1~bpo11+1
5.43.0+dfsg-1
5.44.0+dfsg-1~bpo11+1
5.44.0+dfsg-1~bpo11+2
5.44.0+dfsg-1
6.*
6.0.0+dfsg-1~exp1
6.0.0+dfsg-1~exp2
6.0.0+dfsg-1~exp3
6.0.0+dfsg-1~exp4
6.0.0+dfsg-1~exp5
6.0.0+dfsg-1~exp6
6.0.0+dfsg-1~exp7
6.0.0+dfsg-1~exp8
6.0.0+dfsg-1~exp9
6.0.0+dfsg-1
6.0.0+dfsg-2
6.1.0+dfsg-1
6.2.0+dfsg-1
6.2.1+dfsg-1
6.2.1+dfsg-2
6.2.1+dfsg-3
6.2.1+dfsg-4
6.2.1+dfsg-5
6.2.1+dfsg-6
6.2.1+dfsg-7
6.3.0+dfsg-1
6.3.0+dfsg-2
6.3.0+dfsg-3
6.4.0+dfsg-1
6.5.0+dfsg-1
6.5.0+dfsg-2
6.6.0+dfsg-1
6.6.1+dfsg-1
6.6.1+dfsg-2
6.7.0+dfsg-1
6.7.1+dfsg-1
6.7.1+dfsg-2
6.7.1+dfsg-3
6.7.1+dfsg-4
6.7.1+dfsg-5
6.7.1+dfsg-6
6.8.0+dfsg-1
6.9.0+dfsg-1
6.10.0+dfsg-1
6.10.0+dfsg-2
6.10.0+dfsg-3
6.10.0+dfsg-4
6.10.0+dfsg-5
6.11.0+dfsg-1~exp1
6.11.0+dfsg-1
6.11.0+dfsg-2
6.13.0-1~exp1
6.13.0-1~exp2
6.13.0-1~exp3
6.13.0+repack-1~exp1
6.13.0+repack-1~exp2
6.13.0+repack-1
6.13.0+repack-2
6.14.0-1
6.14.1-1
6.15.0-1
6.15.1-1
6.15.1-2
6.15.1-3
6.15.1-4
6.16.0-1
6.17.0-1
6.18.1-1
6.18.1-2
6.18.1-3
6.19.1-1
6.20.0-1
6.21.0-1
6.21.0-2
6.22.0-1
6.23.0-1
6.23.0-2
6.24.0-1
6.24.0-2
6.24.0+ds-1
6.25.0+ds-1
6.26.0+ds-1
6.27.0+ds-1
6.28.0+ds-1
6.28.1+ds-1
6.29.0+ds-1
7.*
7.0.0+ds-1
7.1.0+ds-1
7.1.0+ds-2
7.2.0+ds-1
7.3.0+ds-1
7.4.0+ds-1
7.5.1+ds-1
7.5.1+ds-2
7.5.1+ds-3
7.6.0+ds-1
7.7.0+ds-1
7.7.0+ds-2
7.8.0+ds1-1
7.8.0+ds1-2
7.8.0+ds2-1
7.9.0+ds-1
7.9.0+ds-2
7.10.0+ds-1
7.11.0+ds-1
7.12.0+ds-1
7.12.0+ds-2
7.12.0+ds-3
7.13.0+ds-1
7.13.0+ds-2
7.14.0+ds-1
7.15.0+ds-1
7.16.0+ds-1
7.16.0+ds-2
7.16.0+ds-3
7.17.0+ds-1
7.17.0+ds-2
7.17.0+ds-3
7.17.0+ds-4
7.18.0+ds-1
7.19.0+ds-1
7.19.0+ds-2
7.20.0+ds-1
7.21.0+ds-1
7.21.0+ds-2
7.22.0+ds-1
7.22.0+ds-2
7.23.0+ds-1
7.23.0+ds-2
7.24.0+ds-1
7.24.0+ds-2
7.25.0+ds-1
7.26.0+ds-1
7.26.0+ds-2
7.26.0+ds-3
7.26.0+ds-4
8.*
8.0.0+ds-1
8.0.1+ds-1
8.1.0+ds-1
8.1.1+ds-1
8.2.1+ds-1
8.2.100+ds-1
8.3.0+ds-1
8.4.0+ds-1
8.4.0+ds1-1~exp1
8.5.0+ds-1
8.6.0+ds-1
8.7.0+ds-1
8.8.0+ds-1
8.8.0+ds-2
8.8.0+ds-2+gcc15
8.8.0+ds-3
8.9.0+ds-1
8.9.0+ds-2
8.9.0+ds-3
8.9.0+ds-4
8.10.0+ds-1
8.10.0+ds-2
8.10.0+ds-3
8.11.0+ds+~0.10.5-1
8.11.1+ds+~0.10.5-1
8.11.1+ds+~0.10.5-2
8.11.1+ds+~0.10.5-3
8.12.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-2
8.13.0+ds+~0.10.5-3
8.14.0+ds+~0.10.5-1~bpo13+1
8.14.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-1~bpo13+1
8.15.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-2
8.16.0+ds+~0.10.5-1
8.16.0+ds+~0.10.5-2
8.16.1+ds+~0.10.5-1
8.16.2+ds+~0.10.5-1
8.16.2+ds+~0.10.5-2
8.16.2+ds+~0.10.5-3~bpo13+1
8.16.2+ds+~0.10.5-3
9.*
9.0.0+ds+~0.10.5-1
9.1.0+ds+~0.10.5-1
9.2.0+ds+~0.10.5-1
9.2.1+ds+~0.10.5-1
9.2.1+ds+~0.10.5-2
9.3.0+ds+~0.10.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26065.json"

Debian:12 / calibre

Package

Name
calibre
Purl
pkg:deb/debian/calibre?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.13.0+repack-2
6.13.0+repack-2+deb12u1
6.13.0+repack-2+deb12u2
6.13.0+repack-2+deb12u3
6.13.0+repack-2+deb12u4
6.13.0+repack-2+deb12u5
6.14.0-1
6.14.1-1
6.15.0-1
6.15.1-1
6.15.1-2
6.15.1-3
6.15.1-4
6.16.0-1
6.17.0-1
6.18.1-1
6.18.1-2
6.18.1-3
6.19.1-1
6.20.0-1
6.21.0-1
6.21.0-2
6.22.0-1
6.23.0-1
6.23.0-2
6.24.0-1
6.24.0-2
6.24.0+ds-1
6.25.0+ds-1
6.26.0+ds-1
6.27.0+ds-1
6.28.0+ds-1
6.28.1+ds-1
6.29.0+ds-1
7.*
7.0.0+ds-1
7.1.0+ds-1
7.1.0+ds-2
7.2.0+ds-1
7.3.0+ds-1
7.4.0+ds-1
7.5.1+ds-1
7.5.1+ds-2
7.5.1+ds-3
7.6.0+ds-1
7.7.0+ds-1
7.7.0+ds-2
7.8.0+ds1-1
7.8.0+ds1-2
7.8.0+ds2-1
7.9.0+ds-1
7.9.0+ds-2
7.10.0+ds-1
7.11.0+ds-1
7.12.0+ds-1
7.12.0+ds-2
7.12.0+ds-3
7.13.0+ds-1
7.13.0+ds-2
7.14.0+ds-1
7.15.0+ds-1
7.16.0+ds-1
7.16.0+ds-2
7.16.0+ds-3
7.17.0+ds-1
7.17.0+ds-2
7.17.0+ds-3
7.17.0+ds-4
7.18.0+ds-1
7.19.0+ds-1
7.19.0+ds-2
7.20.0+ds-1
7.21.0+ds-1
7.21.0+ds-2
7.22.0+ds-1
7.22.0+ds-2
7.23.0+ds-1
7.23.0+ds-2
7.24.0+ds-1
7.24.0+ds-2
7.25.0+ds-1
7.26.0+ds-1
7.26.0+ds-2
7.26.0+ds-3
7.26.0+ds-4
8.*
8.0.0+ds-1
8.0.1+ds-1
8.1.0+ds-1
8.1.1+ds-1
8.2.1+ds-1
8.2.100+ds-1
8.3.0+ds-1
8.4.0+ds-1
8.4.0+ds1-1~exp1
8.5.0+ds-1
8.6.0+ds-1
8.7.0+ds-1
8.8.0+ds-1
8.8.0+ds-2
8.8.0+ds-2+gcc15
8.8.0+ds-3
8.9.0+ds-1
8.9.0+ds-2
8.9.0+ds-3
8.9.0+ds-4
8.10.0+ds-1
8.10.0+ds-2
8.10.0+ds-3
8.11.0+ds+~0.10.5-1
8.11.1+ds+~0.10.5-1
8.11.1+ds+~0.10.5-2
8.11.1+ds+~0.10.5-3
8.12.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-2
8.13.0+ds+~0.10.5-3
8.14.0+ds+~0.10.5-1~bpo13+1
8.14.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-1~bpo13+1
8.15.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-2
8.16.0+ds+~0.10.5-1
8.16.0+ds+~0.10.5-2
8.16.1+ds+~0.10.5-1
8.16.2+ds+~0.10.5-1
8.16.2+ds+~0.10.5-2
8.16.2+ds+~0.10.5-3~bpo13+1
8.16.2+ds+~0.10.5-3
9.*
9.0.0+ds+~0.10.5-1
9.1.0+ds+~0.10.5-1
9.2.0+ds+~0.10.5-1
9.2.1+ds+~0.10.5-1
9.2.1+ds+~0.10.5-2
9.3.0+ds+~0.10.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26065.json"

Debian:13 / calibre

Package

Name
calibre
Purl
pkg:deb/debian/calibre?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.5.0+ds-1
8.5.0+ds-1+deb13u1
8.6.0+ds-1
8.7.0+ds-1
8.8.0+ds-1
8.8.0+ds-2
8.8.0+ds-2+gcc15
8.8.0+ds-3
8.9.0+ds-1
8.9.0+ds-2
8.9.0+ds-3
8.9.0+ds-4
8.10.0+ds-1
8.10.0+ds-2
8.10.0+ds-3
8.11.0+ds+~0.10.5-1
8.11.1+ds+~0.10.5-1
8.11.1+ds+~0.10.5-2
8.11.1+ds+~0.10.5-3
8.12.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-2
8.13.0+ds+~0.10.5-3
8.14.0+ds+~0.10.5-1~bpo13+1
8.14.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-1~bpo13+1
8.15.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-2
8.16.0+ds+~0.10.5-1
8.16.0+ds+~0.10.5-2
8.16.1+ds+~0.10.5-1
8.16.2+ds+~0.10.5-1
8.16.2+ds+~0.10.5-2
8.16.2+ds+~0.10.5-3~bpo13+1
8.16.2+ds+~0.10.5-3
9.*
9.0.0+ds+~0.10.5-1
9.1.0+ds+~0.10.5-1
9.2.0+ds+~0.10.5-1
9.2.1+ds+~0.10.5-1
9.2.1+ds+~0.10.5-2
9.3.0+ds+~0.10.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26065.json"

Debian:14 / calibre

Package

Name
calibre
Purl
pkg:deb/debian/calibre?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.5.0+ds-1
8.6.0+ds-1
8.7.0+ds-1
8.8.0+ds-1
8.8.0+ds-2
8.8.0+ds-2+gcc15
8.8.0+ds-3
8.9.0+ds-1
8.9.0+ds-2
8.9.0+ds-3
8.9.0+ds-4
8.10.0+ds-1
8.10.0+ds-2
8.10.0+ds-3
8.11.0+ds+~0.10.5-1
8.11.1+ds+~0.10.5-1
8.11.1+ds+~0.10.5-2
8.11.1+ds+~0.10.5-3
8.12.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-1
8.13.0+ds+~0.10.5-2
8.13.0+ds+~0.10.5-3
8.14.0+ds+~0.10.5-1~bpo13+1
8.14.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-1~bpo13+1
8.15.0+ds+~0.10.5-1
8.15.0+ds+~0.10.5-2
8.16.0+ds+~0.10.5-1
8.16.0+ds+~0.10.5-2
8.16.1+ds+~0.10.5-1
8.16.2+ds+~0.10.5-1
8.16.2+ds+~0.10.5-2
8.16.2+ds+~0.10.5-3~bpo13+1
8.16.2+ds+~0.10.5-3
9.*
9.0.0+ds+~0.10.5-1
9.1.0+ds+~0.10.5-1
9.2.0+ds+~0.10.5-1
9.2.1+ds+~0.10.5-1
9.2.1+ds+~0.10.5-2
9.3.0+ds+~0.10.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26065.json"