2009-07-07 audio/gai-visual-audio: abandoned project, does not build
2009-07-05 devel/linxt: Use devel/roboctl instead.
2007-08-22 german/citrix_ica: Use net/citrix_ica
2007-08-22 japanese/citrix_ica: Use net/citrix_ica
2009-06-30 mail/bogofilter-qdbm: Migrate to bogofilter-tc instead
2009-06-27 mail/xc-mail: depends on a port that expired in 2007
2009-07-01 www/trac-blog: Not supported anymore for trac > 0.10; use FullBlogPlugin instead
2009-07-01 www/trac-restrictedarea: Not supported anymore; functionality included in trac since 0.11
Critical vulnerabilities have been identified in Adobe Reader
9.1.1 and Acrobat 9.1.1 and earlier versions. These
vulnerabilities would cause the application to crash and could
potentially allow an attacker to take control of the affected
system.
Security: http://www.adobe.com/support/security/bulletins/apsb09-07.html
Security: CVE-2009-0198
Security: CVE-2009-0509
Security: CVE-2009-0510
Security: CVE-2009-0511
Security: CVE-2009-0512
Security: CVE-2009-0888
Security: CVE-2009-0889
Security: CVE-2009-1855
Security: CVE-2009-1856
Security: CVE-2009-1857
Security: CVE-2009-1858
Security: CVE-2009-1859
Security: CVE-2009-1861
modular xorg.
- supply corresponding USE_XORG for all imake-using ports that need it
- USE_IMAKE no longer implies USE_XLIB in absence of USE_XORG
- retire USE_X_PREFIX which is not really used anywhere after the
above change
- a few minor nits like whitespace and SF macro
Tested by: 2 tinderbox runs by pav
Approved by: portmgr (pav)
- Use ${PREFIX}/etc/vflib for the vfontcap file.
- Use ${DOCSDIR} for documents.
- Use ${DATADIR} for jTeX files.
- Style clean-ups and update old information.
- Fix typo in PKG{,DE}INSTALL line.
- Remove ^!! line from fonts.alias.
- Use POST-DEINSTALL instead of DEINSTALL because mkfontdir(1) is
used for generating fonts.dir.
to it have been added. These are to install standard fonts used in the
Ports Collection. Currently they contain:
std.ja_JP/Mincho
std.ja_JP/Gothic
std.ja_JP/Ryumin-Light
std.ja_JP/GothicBBB-Medium
std.zh_CN/STHeiti-Regular
std.zh_CN/STSong-Light
std.zh_CN/MSung-Light
std.zh_CN/MHei-Medium
under ${PREFIX}/share/fonts/. They are just symlinks to
corresponding font files. The symlink names are based on popular
PostScript font names.
Applications should refer the font files via XLFD or fontconfig
first. If they need a direct reference to the font file, please use
files in std.*/*. This is because direct reference to a specific
font name in an application configuration file makes the maintenance
difficult when the font file name is changed, for example.
japanese/ipa-ttfonts -> japanese/font-mplus-ipa
japanese/ipa-ttfonts -> japanese/font-ipa
japanese/kochi-ttfonts -> japanese/font-kochi
japanese/mplusfonts -> japanese/font-mplus
japanese/sazanami-ttf -> japanese/font-sazanami
japanese/shinonome -> japanese/font-shinonome
japanese/umefont -> japanese/font-ume
japanese/vlgothic -> japanese/font-vlgothic
While basically these are port name changes for consistency,
installation directories are also changed:
font files -> ${PREFIX}/share/${PORTNAME}/*
symlinks -> ${PREFIX}/share/fonts/{TTF,OTF,fontname,...}/*
symlinks -> ${PREFIX}/lib/X11/fonts/{TTF,OTF,misc,fontname,...}/*
A user-visible one is that the directory name "TrueType" is replaced
with "TTF".
- CVE-2009-1492
The getAnnots Doc method in the JavaScript API in Adobe Reader
and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote
attackers to cause a denial of service (memory corruption) or
execute arbitrary code via a PDF file that contains an
annotation, and has an OpenAction entry with JavaScript code
that calls this method with crafted integer arguments.
- CVE-2009-1493
The customDictionaryOpen spell method in the JavaScript API in
Adobe Reader 8.1.4 and 9.1 on Linux allows remote attackers to
cause a denial of service (memory corruption) or execute
arbitrary code via a PDF file that triggers a call to this
method with a long string in the second argument.
Security: CVE-2009-1492
Security: CVE-2009-1493
Security: http://www.adobe.com/support/security/bulletins/apsb09-06.html