- es-acroread8 Adobe Reader for view, print, and search PDF documents (ESP)
- 8.1.7_5 print
=0 8.1.7_5Version of this port present on the latest quarterly branch. NOTE: Slave port - quarterly revision is most likely wrong.
- FORBIDDEN: No longer maintained upstream since 2011-11-03
DEPRECATED: No longer maintained upstream since 2011-11-03
This port expired on: 2014-08-31
IGNORE: is forbidden: No longer maintained upstream since 2011-11-03
RESTRICTED: Must fill out redistribution form at http://www.adobe.com/products/acrobat/distribute.html
- Maintainer: hrs@FreeBSD.org
- Port Added: 2008-01-04 20:23:28
- Last Update: 2014-08-30 14:25:49
- SVN Revision: 366621
- Also Listed In: linux
- License: Adobe_WWEULA_20080204_1313
- Adobe Reader is free software that allows everyone from business
professionals to home users to easily and reliably view, print,
and search PDF files using a variety of platforms and devices.
- SVNWeb :
git : Homepage
- pkg-plist: as obtained via:
- There is no configure plist information for this port.
- Dependency lines:
- No installation instructions:
- This port has been deleted.
- PKGNAME: es-acroread8
- Flavors: there is no flavor information for this port.
- ONLY_FOR_ARCHS: amd64 i386
- There is no distinfo for this port.
- No package information for this port in our database
- Sometimes this happens. Not all ports have packages.
- Master port: print/acroread8
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Runtime dependencies:
- acroreadwrapper>=0.0.20100806 : print/acroreadwrapper
- fedora-release : emulators/linux_base-f10
- libatk-1.0.so.0.2409.1 : accessibility/linux-f10-atk
- libcairo.so.2.10800.0 : graphics/linux-f10-cairo
- libcups.so.2 : print/linux-f10-cups-libs
- libexpat.so.1 : textproc/linux-f10-expat
- libfontconfig.so.1.3.0 : x11-fonts/linux-f10-fontconfig
- libgnutls.so.26.4.6 : security/linux-f10-gnutls
- libgtk-x11-2.0.so.0.1400.7 : x11-toolkits/linux-f10-gtk2
- libjpeg.so.62.0.0 : graphics/linux-f10-jpeg
- libgcrypt.so.11.5.2 : security/linux-f10-libgcrypt
- libgpg-error.so.0.4.0 : security/linux-f10-libgpg-error
- libtasn1.so.3.0.16 : security/linux-f10-libtasn1
- libpango-1.0.so.0.2800.3 : x11-toolkits/linux-f10-pango
- libpng.so.3.37.0 : graphics/linux-f10-png
- libtiff.so.3.8.2 : graphics/linux-f10-tiff
- libXrandr.so.2.1.0 : x11/linux-f10-xorg-libs
- There are no ports dependent upon this port
- Configuration Options:
- No options to configure
- Options name:
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|Commit History - (may be incomplete: see SVNWeb link above for full details)
|This is a slave port. You may also want to view the commits to the master port: print/acroread8|
|30 Aug 2014 14:25:49
Remove ports related to Adobe Reader.
|08 May 2014 23:41:22
|20 Sep 2013 22:44:00
Add NO_STAGE all over the place in preparation for the staging support (cat:
|03 Jul 2011 06:14:57
- Kick MD5 Support
|28 Oct 2010 21:00:21
Deprecate md5 in favour of sha256 checksums. md5 checksums will no longer
be generated or checked, and will be silently ignored for now. Also,
generalize the MD5_FILE macro to DISTINFO_FILO.
Submitted by: rene
Approved by: portmgr
Tested on: pointyhat i386 7-exp
|16 Aug 2010 02:42:56
Update distinfo. The distfiles have been re-rolled for some reason.
Reported by: pav
|14 Oct 2009 16:23:58
Update to 8.1.7. Multiple vulnerabilities which could cause the
application to crash and could potentially allow an attacker to
take control of the affected system have been fixed.
Security: CVE-2009-2987(Only the first 15 lines of the commit message are shown above )
|17 Jun 2009 16:56:15
Update to 8.1.6 and 9.1.2.
Critical vulnerabilities have been identified in Adobe Reader
9.1.1 and Acrobat 9.1.1 and earlier versions. These
vulnerabilities would cause the application to crash and could
potentially allow an attacker to take control of the affected
|13 May 2009 08:19:25
Update to 8.1.5. Two critical vulnerabilities have been fixed:
and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote
attackers to cause a denial of service (memory corruption) or
execute arbitrary code via a PDF file that contains an
that calls this method with crafted integer arguments.
Adobe Reader 8.1.4 and 9.1 on Linux allows remote attackers to
cause a denial of service (memory corruption) or execute
arbitrary code via a PDF file that triggers a call to this
method with a long string in the second argument.
|28 Mar 2009 16:01:34
Update to 8.1.4. This version includes serious security fixes.
|07 Nov 2008 18:00:32
Update to Adobe Reader 8.1.3.
Security vulnerabilities report:
|20 Jul 2008 17:17:07
Update to 8.1.2 Security Update 1. Quoted from the advisory:
| A critical vulnerability has been identified in Adobe Reader and
| Acrobat 8.1.2. This vulnerability would cause the application to
| crash and could potentially allow an attacker to take control of
| the affected system.
|13 Apr 2008 18:36:29
Update to 8.1.2. Bug fixes and enhancements can be found at
* Font caching Issues: Various font caching issues are fixed in Reader
8.1.2, including the issue of fonts that were configured using
fontconfig not being picked up by the Reader to render documents
(reported by Novell).
* Problem with Dual-screen setup (Xinerama mode).: Issue number 4
listed on the Known Issues page for Reader 8.1.1.
* Document ordering and fullscreen mode: Issue has been fixed in
Reader 8.1.2.(Only the first 15 lines of the commit message are shown above )
|04 Jan 2008 20:22:56
Add Adobe Reader 8.1.1 and localized versions (total 15
languages). Changes from 7.x include:
* New improved UI with more real-estate in terms of page view
space. Only the most commonly used tools are present in the
toolbar by default (and the toolbar can be customized by the
user according to his/her own preference.)
* Sleek design and new stylish user interface
elements (including toolbars, navigation tabs, panes, etc.)
for a more rich user experience.
* Improved launch time and overall performance. Less waiting,(Only the first 15 lines of the commit message are shown above )