~linuxmint-daily-build-team/linuxmint/+git/xreader:master

Last commit made on 2024-01-31
Get this branch:
git clone -b master https://git.launchpad.net/~linuxmint-daily-build-team/linuxmint/+git/xreader

Branch merges

Branch information

Recent commits

1cde192... by correctmost <email address hidden>

epub: Fix an incorrect sizeof call detected by AddressSanitizer (#635)

This commit also fixes a build directory typo in INSTALL.md.

e57d9e8... by Clement Lefebvre <email address hidden>

4.0.2

b309a92... by Clement Lefebvre <email address hidden>

l10n: Update translations

6778018... by Clement Lefebvre <email address hidden>

4.0.1

495835e... by Stefan Schramm

Fix list of supported mime types (#631)

43c73b6... by Clement Lefebvre <email address hidden>

4.0.0

d31bcd0... by Clement Lefebvre <email address hidden>

dependency: Drop compatibility with libwebkit2gtk-4.0

Many other projects use soup3 already, including nemo-preview which
needs to build against libxreaderview.

6e44a88... by Clement Lefebvre <email address hidden>

3.8.5

da4a228... by Clement Lefebvre <email address hidden>

Revert "ev-window.c: Don't create the epub webview until the doc type"

This reverts commit be4400f97ae3364c5e910609ea7706db3f54eeac.

cd67888... by Michael Webster

comics: Use libarchive to unpack documents [CVE-2023-44452].

This commit eliminates the use of external commands for opening
comic documents, and uses libarchive instead.

Fixes:
CVE-2023-44452 - Linux Mint Xreader CBT File Parsing Argument
                 Injection Remote Code Execution Vulnerability.

Based on:
https://gitlab.gnome.org/GNOME/evince/-/commit/7b5ad18399b04cbfce02730d28baf30e9fc35b58

This vulnerability was discovered by:
Febin Mon Saji working with Trend Micro Zero Day Initiative