non port: print/acroread9/Makefile |
Number of commits found: 30 |
Monday, 4 Aug 2014
|
15:10 mandree
Forbid installation of these discontinued products.
Since Adobe has issued multiple security advisories for newer versions of the
product, after support for the old version was discontinued, we must assume
that the old versions are also vulnerable. Hence forbid installation.
 |
Thursday, 8 May 2014
|
23:41 bapt
Support stage
 |
Monday, 5 May 2014
|
09:45 bapt
Convert all :U to :tu and :L to :tl
Since FreeBSD 8.4 and FreeBSD 9.1 make(1) do support :tu and :tl as a
replacement for :U and :L (which has been marked as deprecated)
bmake which is the default on FreeBSD 10+ only support by default
:tu/:tl a hack has been added at the time to support :U and :L to ease
migration. This hack is now not necessary anymore
Note that this makes the ports tree incompatible with make(1) from
FreeBSD 8.3 or earlier
With hat: portmgr
 |
Wednesday, 16 Apr 2014
|
18:28 zeising
The FreeBSD x11@ and graphics team proudly presents
a zeising, kwm production, with help from dumbbell, bdrewery:
NEW XORG ON FREEBSD 9-STABLE AND 10-STABLE
This update switches over to use the new xorg stack by default on FreeBSD 9
and 10 stable, on osversions where vt(9) is available.
It is still possible to use the old stack by specifying WITHOUT_NEW_XORG in
/etc/make.conf .
FreeBSD 8-STABLE and released versions of FreeBSD still use
the old version.
A package repository with binary packages for new xorg will
be available soon.
This patch also contains updates of libxcb and related ports, pixman, as well
as some drivers and utilities.
Bump portrevisions for xf86-* ports, as well as virtualbox-ose-additions due
to xserver version change.
Apart from these updates, the way shared libraries are handled has been
changed for all xorg ports, as well as libxml2 and freetype, which means
ltverhack is gone and as a consequence shared libraries have been bumped.
The plan is that this change will make library bumps less likely in the
future.
All affected ports have had their portrevisions bumped as a consequence of
this.
Fix some issues where WITH_NEW_XORG weren't detected properly on CURRENT.
Update instructions, hardware support, and more notes can be found on
https://wiki.freebsd.org/Graphics
Thanks to: all testers, bdrewery and the FreeBSD x11@ team
exp-run by: bdrewery [1]
PR: ports/187602 [1]
Approved by: portmgr (bdrewery), core (jhb)
 |
Friday, 20 Sep 2013
|
22:44 bapt
Add NO_STAGE all over the place in preparation for the staging support (cat:
print)
 |
Thursday, 13 Jun 2013
|
22:10 tijl
Fix package with bmake. The makefiles use :U and :L in .for loops.
Approved by: hrs (maintainer)
 |
Tuesday, 14 May 2013
|
16:43 hrs
Update to 9.5.5.
Security: APSB13-15
Security: http://www.adobe.com/support/security/bulletins/apsb13-15.html
 |
Friday, 22 Feb 2013
|
14:58 hrs
Update to 9.5.4. This includes security fix for arbitrary code execution
vulnerabilities.
Security: APSB13-07
Security: APSA13-02
Security: CVE-2013-0640
Security: CVE-2013-0641
 |
Wednesday, 9 Jan 2013
|
17:26 hrs
Update to 9.5.3.
Submitted by: Tsurutani Naoki
PR: ports/175158
Security: APSB13-02
Security: http://www.adobe.com/support/security/bulletins/apsb13-02.html
 |
Wednesday, 13 Jun 2012
|
03:21 hrs
Update to 9.5.1.
Security: CVE-2012-0774
Security: CVE-2012-0775
Security: CVE-2012-0776
Security: CVE-2012-0777
Security: APSB12-08
Security: http://www.adobe.com/support/security/bulletins/apsb12-08.html
 |
Tuesday, 24 Jan 2012
|
06:19 hrs
Create a missing directory for the manual page in the German and French version.
Spotted by: pav
 |
Sunday, 22 Jan 2012
|
09:30 hrs
- Update to 9.4.7 (English version only)
- Add LICENSE.
- Add CUPS support.
- Add acroread(1) manual page.
Security: APSA11-04
Security: APSB11-24
Security: CVE-2011-2462
Security: CVE-2011-1353
Security: CVE-2011-2431
Security: CVE-2011-2432
Security: CVE-2011-2433
Security: CVE-2011-2434
Security: CVE-2011-2435
Security: CVE-2011-2436
Security: CVE-2011-2437
Security: CVE-2011-2438
Security: CVE-2011-2439
Security: CVE-2011-2440
Security: CVE-2011-2441
Security: CVE-2011-2442
 |
Sunday, 29 May 2011
|
17:22 hrs
Update to Adobe Reader 9.4.2 and add a hack to mitigate "RSException" crash
issue in GUI mode. A linux_adobe.ko kernel module has to be loaded before
acroread is invoked.
 |
Friday, 25 Feb 2011
|
08:52 netchild
Update linux-f10-pango to 1.28.3 (+ bump portrevision of dependend ports).
This fixes a security warning from portaudit.
Security: CVE-2009-1194
VuXML: 4b172278-3f46-11de-becb-001cc0377035
Thanks to: Luchesar V. ILIEV <luchesar.iliev@gmail.com> (F10+rpmbuild info)
 |
Wednesday, 5 Jan 2011
|
15:17 hrs
Update to 9.4.1 and add a warning message which explains the GUI mode does
not work currently.
Security: http://www.adobe.com/support/security/bulletins/apsb10-28.html
Security: http://www.adobe.com/support/security/bulletins/apsb10-21.html
Security: http://www.adobe.com/support/security/advisories/apsa10-02.html
 |
Sunday, 29 Aug 2010
|
15:10 hrs
Update to 9.3.4.
 |
Sunday, 8 Aug 2010
|
04:23 hrs
Fix a typo.
Spotted by: dvl
 |
04:16 hrs
Use libgtkembedmoz from www/linux-libgtkembedmoz instead of www/linux-nvu.
 |
01:51 dougb
Remove the dependency on www/linux-nvu which has been deprecated for
over 1 month. Without this dependency the web page links from the Help
menu don't work, but everything else works fine.
Approved by: maintainer timeout
 |
Sunday, 18 Apr 2010
|
15:51 hrs
Update to 9.3.2.
Security: http://www.adobe.com/support/security/bulletins/apsb10-09.html
PR: ports/145686
 |
Sunday, 28 Mar 2010
|
06:47 dinoex
- update to 1.4.1
Reviewed by: exp8 run on pointyhat
Supported by: miwi
 |
Tuesday, 2 Mar 2010
|
05:34 hrs
Update to 9.3.1 and add a warning message that explains it does
not run on the current Linux emulation yet.
Feature safe: yes
 |
Tuesday, 19 Jan 2010
|
20:34 hrs
Update to 9.3. This release includes fixes for critical vulnerabilities which
have been identified in Adobe Reader 9.2.
Security: http://www.adobe.com/support/security/bulletins/apsb10-02.html
Security: APSB10-02
Security: CVE-2009-3953
Security: CVE-2009-3954
Security: CVE-2009-3955
Security: CVE-2009-3956
Security: CVE-2009-3957
Security: CVE-2009-3958
Security: CVE-2009-3959
Security: CVE-2009-4324
 |
Wednesday, 14 Oct 2009
|
16:25 hrs
Update to 9.2. Multiple vulnerabilities which could cause the
application to crash and could potentially allow an attacker to
take control of the affected system have been fixed.
Security: CVE-2007-0048
Security: CVE-2007-0045
Security: CVE-2009-2564
Security: CVE-2009-2979
Security: CVE-2009-2980
Security: CVE-2009-2981
Security: CVE-2009-2982
Security: CVE-2009-2983
Security: CVE-2009-2985
Security: CVE-2009-2986
Security: CVE-2009-2987
Security: CVE-2009-2988
Security: CVE-2009-2989
Security: CVE-2009-2990
Security: CVE-2009-2991
Security: CVE-2009-2992
Security: CVE-2009-2993
Security: CVE-2009-2994
Security: CVE-2009-2996
Security: CVE-2009-2997
Security: CVE-2009-2998
Security: CVE-2009-3431
Security: CVE-2009-3458
Security: CVE-2009-3459
Security: CVE-2009-3461
Security: CVE-2009-3462
Security: APSB09-15
Security: http://www.adobe.com/support/security/bulletins/apsb09-15.html
 |
Saturday, 10 Oct 2009
|
01:36 hrs
Update to 9.1.3.
Security: CVE-2009-1862
Security: APSB09-10
Security: http://www.adobe.com/support/security/bulletins/apsb09-10.html
PR: ports/137331
 |
Wednesday, 17 Jun 2009
|
16:56 hrs
Update to 8.1.6 and 9.1.2.
Critical vulnerabilities have been identified in Adobe Reader
9.1.1 and Acrobat 9.1.1 and earlier versions. These
vulnerabilities would cause the application to crash and could
potentially allow an attacker to take control of the affected
system.
Security: http://www.adobe.com/support/security/bulletins/apsb09-07.html
Security: CVE-2009-0198
Security: CVE-2009-0509
Security: CVE-2009-0510
Security: CVE-2009-0511
Security: CVE-2009-0512
Security: CVE-2009-0888
Security: CVE-2009-0889
Security: CVE-2009-1855
Security: CVE-2009-1856
Security: CVE-2009-1857
Security: CVE-2009-1858
Security: CVE-2009-1859
Security: CVE-2009-1861
 |
Wednesday, 13 May 2009
|
08:51 hrs
Update to 9.1.1. Two critical vulnerabilities have been fixed:
- CVE-2009-1492
The getAnnots Doc method in the JavaScript API in Adobe Reader
and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote
attackers to cause a denial of service (memory corruption) or
execute arbitrary code via a PDF file that contains an
annotation, and has an OpenAction entry with JavaScript code
that calls this method with crafted integer arguments.
- CVE-2009-1493
The customDictionaryOpen spell method in the JavaScript API in
Adobe Reader 8.1.4 and 9.1 on Linux allows remote attackers to
cause a denial of service (memory corruption) or execute
arbitrary code via a PDF file that triggers a call to this
method with a long string in the second argument.
Security: CVE-2009-1492
Security: CVE-2009-1493
Security: http://www.adobe.com/support/security/bulletins/apsb09-06.html
 |
Sunday, 5 Apr 2009
|
17:25 hrs
Add missing dependencies: gdkpixbuf and libxml2.
PR: ports/133194
 |
Sunday, 29 Mar 2009
|
08:51 hrs
Fix packing list.
 |
Saturday, 28 Mar 2009
|
18:11 hrs
Add acroread9, Adobe Reader 9.1.0. For changes since Adobe Reader
8.x, see the following URL:
http://blogs.adobe.com/acroread/2009/03/#entry-9871
 |
Number of commits found: 30 |