gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
{ "binaries": [ { "binary_version": "2.55.0+dfsg-1ubuntu0.2", "binary_name": "calibre" }, { "binary_version": "2.55.0+dfsg-1ubuntu0.2", "binary_name": "calibre-bin" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-7889.json"
{ "binaries": [ { "binary_version": "9.2.1+ds+~0.10.5-2build1", "binary_name": "calibre" }, { "binary_version": "9.2.1+ds+~0.10.5-2build1", "binary_name": "calibre-bin" } ] }