FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
found something from the cache
non port: head/print/acroread9/distinfo
SVNWeb

Number of commits found: 17

Tue, 14 May 2013
[ 16:43 hrs ] Original commit 
318177 print/acroread9/Makefile
318177 print/acroread9/distinfo
Update to 9.5.5.

Security:	APSB13-15
Security:	http://www.adobe.com/support/security/bulletins/apsb13-15.html
Fri, 22 Feb 2013
[ 14:58 hrs ] Original commit 
312769 print/acroread9/Makefile
312769 print/acroread9/distinfo
Update to 9.5.4.  This includes security fix for arbitrary code execution
vulnerabilities.

Security:	APSB13-07
Security:	APSA13-02
Security:	CVE-2013-0640
Security:	CVE-2013-0641
Wed, 9 Jan 2013
[ 17:26 hrs ] Original commit 
310160 print/acroread9/Makefile
310160 print/acroread9/distinfo
Update to 9.5.3.

Submitted by:	Tsurutani Naoki
PR:		ports/175158
Security:	APSB13-02
Security:	http://www.adobe.com/support/security/bulletins/apsb13-02.html
Wed, 13 Jun 2012
[ 03:21 hrs ] Original commit 
1.21 print/acroread9/Makefile
1.14 print/acroread9/distinfo
Update to 9.5.1.

Security:       CVE-2012-0774
Security:       CVE-2012-0775
Security:       CVE-2012-0776
Security:       CVE-2012-0777
Security:       APSB12-08
Security:       http://www.adobe.com/support/security/bulletins/apsb12-08.html
Sun, 22 Jan 2012
[ 09:30 hrs ] Original commit 
1.3 french/acroread9/Makefile
1.3 german/acroread9/Makefile
1.3 japanese/acroread9/Makefile
1.19 print/acroread9/Makefile
1.13 print/acroread9/distinfo
1.3 print/acroread9/pkg-plist
- Update to 9.4.7 (English version only)
- Add LICENSE.
- Add CUPS support.
- Add acroread(1) manual page.

Security:       APSA11-04
Security:       APSB11-24
Security:       CVE-2011-2462
Security:       CVE-2011-1353
Security:       CVE-2011-2431
Security:       CVE-2011-2432
Security:       CVE-2011-2433
Security:       CVE-2011-2434
Security:       CVE-2011-2435
Security:       CVE-2011-2436
Security:       CVE-2011-2437
Security:       CVE-2011-2438
Security:       CVE-2011-2439
Security:       CVE-2011-2440
Security:       CVE-2011-2441
Security:       CVE-2011-2442
Sun, 29 May 2011
[ 17:22 hrs ] Original commit 
1.11 french/acroread9/distinfo
1.11 german/acroread9/distinfo
1.11 japanese/acroread9/distinfo
1.18 print/acroread9/Makefile
1.12 print/acroread9/distinfo
1.3 print/acroread9/files/pkg-message.in
1.15 print/acroreadwrapper/Makefile
1.1 print/acroreadwrapper/distinfo
1.10 print/acroreadwrapper/files/acroread.in
1.1 print/acroreadwrapper/files/linux_adobe.sh.in
Update to Adobe Reader 9.4.2 and add a hack to mitigate "RSException" crash
issue in GUI mode.  A linux_adobe.ko kernel module has to be loaded before
acroread is invoked.
Wed, 5 Jan 2011
[ 15:17 hrs ] Original commit 
1.10 french/acroread9/distinfo
1.10 german/acroread9/distinfo
1.10 japanese/acroread9/distinfo
1.16 print/acroread9/Makefile
1.11 print/acroread9/distinfo
Update to 9.4.1 and add a warning message which explains the GUI mode does
not work currently.

Security:       http://www.adobe.com/support/security/bulletins/apsb10-28.html
Security:       http://www.adobe.com/support/security/bulletins/apsb10-21.html
Security:       http://www.adobe.com/support/security/advisories/apsa10-02.html
Mon, 30 Aug 2010
[ 07:37 osa ] Original commit 
1.10 print/acroread9/distinfo
Fix wrong size introduced in previous commit.

Pointy hat to:  hrs
Sun, 29 Aug 2010
[ 15:10 hrs ] Original commit 
1.9 french/acroread9/distinfo
1.9 german/acroread9/distinfo
1.9 japanese/acroread9/distinfo
1.15 print/acroread9/Makefile
1.9 print/acroread9/distinfo
Update to 9.3.4.
Sun, 18 Apr 2010
[ 15:51 hrs ] Original commit 
1.8 french/acroread9/distinfo
1.8 german/acroread9/distinfo
1.8 japanese/acroread9/distinfo
1.11 print/acroread9/Makefile
1.8 print/acroread9/distinfo
Update to 9.3.2.

Security:       http://www.adobe.com/support/security/bulletins/apsb10-09.html
PR:             ports/145686
Tue, 2 Mar 2010
[ 05:34 hrs ] Original commit 
1.7 french/acroread9/distinfo
1.7 german/acroread9/distinfo
1.7 japanese/acroread9/distinfo
1.9 print/acroread9/Makefile
1.7 print/acroread9/distinfo
1.2 print/acroread9/files/pkg-message.in
Update to 9.3.1 and add a warning message that explains it does
not run on the current Linux emulation yet.

Feature safe:   yes
Tue, 19 Jan 2010
[ 20:34 hrs ] Original commit 
1.6 french/acroread9/distinfo
1.6 german/acroread9/distinfo
1.6 japanese/acroread9/distinfo
1.8 print/acroread9/Makefile
1.6 print/acroread9/distinfo
Update to 9.3.  This release includes fixes for critical vulnerabilities which
have been identified in Adobe Reader 9.2.

Security:       http://www.adobe.com/support/security/bulletins/apsb10-02.html
Security:       APSB10-02
Security:       CVE-2009-3953
Security:       CVE-2009-3954
Security:       CVE-2009-3955
Security:       CVE-2009-3956
Security:       CVE-2009-3957
Security:       CVE-2009-3958
Security:       CVE-2009-3959
Security:       CVE-2009-4324
Wed, 14 Oct 2009
[ 16:25 hrs ] Original commit 
1.5 french/acroread9/distinfo
1.5 german/acroread9/distinfo
1.5 japanese/acroread9/distinfo
1.7 print/acroread9/Makefile
1.5 print/acroread9/distinfo
Update to 9.2.  Multiple vulnerabilities which could cause the
application to crash and could potentially allow an attacker to
take control of the affected system have been fixed.

Security:       CVE-2007-0048
Security:       CVE-2007-0045
Security:       CVE-2009-2564
Security:       CVE-2009-2979
Security:       CVE-2009-2980
Security:       CVE-2009-2981
Security:       CVE-2009-2982
Security:       CVE-2009-2983
Security:       CVE-2009-2985
Security:       CVE-2009-2986
Security:       CVE-2009-2987
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 10 Oct 2009
[ 01:36 hrs ] Original commit 
1.4 french/acroread9/distinfo
1.4 german/acroread9/distinfo
1.4 japanese/acroread9/distinfo
1.6 print/acroread9/Makefile
1.4 print/acroread9/distinfo
Update to 9.1.3.

Security:       CVE-2009-1862
Security:       APSB09-10
Security:       http://www.adobe.com/support/security/bulletins/apsb09-10.html
PR:             ports/137331
Wed, 17 Jun 2009
[ 16:56 hrs ] Original commit 
1.7 chinese/acroread8-zh_CN/distinfo
1.7 chinese/acroread8-zh_TW/distinfo
1.7 french/acroread8/distinfo
1.3 french/acroread9/distinfo
1.7 german/acroread8/distinfo
1.3 german/acroread9/distinfo
1.7 japanese/acroread8/distinfo
1.3 japanese/acroread9/distinfo
1.7 korean/acroread8/distinfo
1.7 portuguese/acroread8/distinfo

(Only the first 10 of 21 ports in this commit are shown above. View all ports for this commit)
Update to 8.1.6 and 9.1.2.

Critical vulnerabilities have been identified in Adobe Reader
9.1.1 and Acrobat 9.1.1 and earlier versions. These
vulnerabilities would cause the application to crash and could
potentially allow an attacker to take control of the affected
system.

Security:       http://www.adobe.com/support/security/bulletins/apsb09-07.html
Security:       CVE-2009-0198
Security:       CVE-2009-0509
Security:       CVE-2009-0510
Security:       CVE-2009-0511
Security:       CVE-2009-0512
Security:       CVE-2009-0888
Security:       CVE-2009-0889
Security:       CVE-2009-1855
Security:       CVE-2009-1856
Security:       CVE-2009-1857
Security:       CVE-2009-1858
Security:       CVE-2009-1859
Security:       CVE-2009-1861
Wed, 13 May 2009
[ 08:51 hrs ] Original commit 
1.2 french/acroread9/distinfo
1.2 german/acroread9/distinfo
1.2 japanese/acroread9/distinfo
1.4 print/acroread9/Makefile
1.2 print/acroread9/distinfo
Update to 9.1.1.  Two critical vulnerabilities have been fixed:

- CVE-2009-1492

 The getAnnots Doc method in the JavaScript API in Adobe Reader
 and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote
 attackers to cause a denial of service (memory corruption) or
 execute arbitrary code via a PDF file that contains an
 annotation, and has an OpenAction entry with JavaScript code
 that calls this method with crafted integer arguments.

- CVE-2009-1493

 The customDictionaryOpen spell method in the JavaScript API in
 Adobe Reader 8.1.4 and 9.1 on Linux allows remote attackers to
 cause a denial of service (memory corruption) or execute
 arbitrary code via a PDF file that triggers a call to this
 method with a long string in the second argument.

Security:       CVE-2009-1492
Security:       CVE-2009-1493
Security:       http://www.adobe.com/support/security/bulletins/apsb09-06.html
Sat, 28 Mar 2009
[ 18:11 hrs ] Original commit 
1.62 french/Makefile
1.1 french/acroread9/Makefile
1.1 french/acroread9/distinfo
1.69 german/Makefile
1.1 german/acroread9/Makefile
1.1 german/acroread9/distinfo
1.709 japanese/Makefile
1.1 japanese/acroread9/Makefile
1.1 japanese/acroread9/distinfo
1.1 print/acroread9/Makefile

(Only the first 10 of 21 ports in this commit are shown above. View all ports for this commit)
Add acroread9, Adobe Reader 9.1.0.  For changes since Adobe Reader
8.x, see the following URL:

        http://blogs.adobe.com/acroread/2009/03/#entry-9871

Number of commits found: 17

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
libsshOct 29
libpurpleOct 24
pidginOct 24
phpmyadminOct 22
asterisk11Oct 21
libxml2Oct 18
drupal7Oct 16
firefox*Oct 16
firefox-esr*Oct 16
libxul*Oct 16
linux-firefox*Oct 16
linux-seamonkey*Oct 16
linux-thunderbird*Oct 16
seamonkey*Oct 16
thunderbird*Oct 16

8 vulnerabilities affecting 30 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24273
Broken 97
Deprecated 43
Ignore 355
Forbidden 2
Restricted 205
No CDROM 93
Vulnerable 18
Expired 0
Set to expire 39
Interactive 0
new 24 hours 0
new 48 hours3
new 7 days11
new fortnight37
new month133

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.