Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4554 advisory.
- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4554-1 [email protected] https://www.debian.org/lts/security/ Abhijith PA April 29, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : calibre Version : 5.12.0+dfsg-1+deb11u4 CVE ID : CVE-2025-64486 CVE-2026-25635 CVE-2026-25636 CVE-2026-26064 CVE-2026-26065
Multiple vulnerabilities have been discovered in calibre, an e-book manager
CVE-2025-64486
calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution.
CVE-2026-25635
Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions.
CVE-2026-25636
a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process
CVE-2026-26064
a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions.
CVE-2026-26065
Path Traversal through PDB readers that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption.
For Debian 11 bullseye, these problems have been fixed in version 5.12.0+dfsg-1+deb11u4.
We recommend that you upgrade your calibre packages.
For the detailed security status of calibre please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/calibre
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the calibre packages.
Plugin Details
File Name: debian_DLA-4554.nasl
Agent: unix
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Vulnerability Information
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:calibre, p-cpe:/a:debian:debian_linux:calibre-bin
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: Exploits are available
Patch Publication Date: 4/29/2026
Vulnerability Publication Date: 11/7/2025