calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/calibre/+bug/1951979 | Exploit Issue Tracking Vendor Advisory |
https://github.com/dwisiswant0/advisory/issues/18 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/ | |
https://bugs.launchpad.net/calibre/+bug/1951979 | Exploit Issue Tracking Vendor Advisory |
https://github.com/dwisiswant0/advisory/issues/18 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/ |
Configurations
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.launchpad.net/calibre/+bug/1951979 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/dwisiswant0/advisory/issues/18 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0 - Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/ - |
03 May 2022, 16:04
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-400 |
04 Jan 2022, 16:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/dwisiswant0/advisory/issues/18 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | (MISC) https://bugs.launchpad.net/calibre/+bug/1951979 - Exploit, Issue Tracking, Vendor Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/ - Mailing List, Third Party Advisory |
22 Dec 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Dec 2021, 13:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CWE | CWE-770 | |
CPE | cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/dwisiswant0/advisory/issues/18 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0 - Patch, Third Party Advisory | |
References | (MISC) https://bugs.launchpad.net/calibre/+bug/1951979 - Exploit, Vendor Advisory |
07 Dec 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-07 00:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44686
Mitre link : CVE-2021-44686
CVE.ORG link : CVE-2021-44686
JSON object : View
Products Affected
calibre-ebook
- calibre
fedoraproject
- fedora
CWE
CWE-400
Uncontrolled Resource Consumption