Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/calibre@9.4.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.4.0%2Bds%2B~0.10.5-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-hgmk-8s7s-tfdb calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue. CVE-2026-27810
VCID-nj3z-4ya4-bqf7 calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue. CVE-2026-27824

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-28T12:59:31.994071+00:00 Debian Importer Fixing VCID-nj3z-4ya4-bqf7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-28T12:59:31.951731+00:00 Debian Importer Fixing VCID-hgmk-8s7s-tfdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T17:46:44.651847+00:00 Debian Importer Fixing VCID-nj3z-4ya4-bqf7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:44.586159+00:00 Debian Importer Fixing VCID-hgmk-8s7s-tfdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:20:11.413990+00:00 Debian Importer Fixing VCID-nj3z-4ya4-bqf7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:20:11.393826+00:00 Debian Importer Fixing VCID-hgmk-8s7s-tfdb https://security-tracker.debian.org/tracker/data/json 38.1.0