gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
{ "binaries": [ { "binary_version": "2.55.0+dfsg-1ubuntu0.2", "binary_name": "calibre" }, { "binary_version": "2.55.0+dfsg-1ubuntu0.2", "binary_name": "calibre-bin" } ] }