gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.19.0+dfsg-1", "binary_name": "calibre" }, { "binary_version": "3.19.0+dfsg-1", "binary_name": "calibre-bin" }, { "binary_version": "3.19.0+dfsg-1", "binary_name": "calibre-bin-dbgsym" } ] }