1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-28 01:06:17 +00:00
Commit Graph

14 Commits

Author SHA1 Message Date
Baptiste Daroussin
a285ade910 Add NO_STAGE all over the place in preparation for the staging support (cat: german) 2013-09-20 18:30:00 +00:00
Hiroki Sato
f79316b1da - Update to 9.4.7 (English version only)
- Add LICENSE.
- Add CUPS support.
- Add acroread(1) manual page.

Security:	APSA11-04
Security:	APSB11-24
Security:	CVE-2011-2462
Security:	CVE-2011-1353
Security:	CVE-2011-2431
Security:	CVE-2011-2432
Security:	CVE-2011-2433
Security:	CVE-2011-2434
Security:	CVE-2011-2435
Security:	CVE-2011-2436
Security:	CVE-2011-2437
Security:	CVE-2011-2438
Security:	CVE-2011-2439
Security:	CVE-2011-2440
Security:	CVE-2011-2441
Security:	CVE-2011-2442
2012-01-22 09:30:18 +00:00
Hiroki Sato
2e30d78299 Update to Adobe Reader 9.4.2 and add a hack to mitigate "RSException" crash
issue in GUI mode.  A linux_adobe.ko kernel module has to be loaded before
acroread is invoked.
2011-05-29 17:22:26 +00:00
Hiroki Sato
26e3b95561 Update to 9.4.1 and add a warning message which explains the GUI mode does
not work currently.

Security:	http://www.adobe.com/support/security/bulletins/apsb10-28.html
Security:	http://www.adobe.com/support/security/bulletins/apsb10-21.html
Security:	http://www.adobe.com/support/security/advisories/apsa10-02.html
2011-01-05 15:17:30 +00:00
Erwin Lansing
74cb9eff53 Deprecate md5 in favour of sha256 checksums. md5 checksums will no longer
be generated or checked, and will be silently ignored for now.  Also,
generalize the MD5_FILE macro to DISTINFO_FILO.

PR:		149657
Submitted by:	rene
Approved by:	portmgr
Tested on:	pointyhat i386 7-exp
2010-10-28 21:00:21 +00:00
Hiroki Sato
fcc7127fe3 Update to 9.3.4. 2010-08-29 15:10:11 +00:00
Hiroki Sato
1fbabdcea1 Update to 9.3.2.
Security:	http://www.adobe.com/support/security/bulletins/apsb10-09.html
PR:		ports/145686
2010-04-18 15:51:41 +00:00
Hiroki Sato
bf1c027dd8 Update to 9.3.1 and add a warning message that explains it does
not run on the current Linux emulation yet.

Feature safe:	yes
2010-03-02 05:34:55 +00:00
Hiroki Sato
b0cdef085a Update to 9.3. This release includes fixes for critical vulnerabilities which
have been identified in Adobe Reader 9.2.

Security:	http://www.adobe.com/support/security/bulletins/apsb10-02.html
Security:	APSB10-02
Security:	CVE-2009-3953
Security:	CVE-2009-3954
Security:	CVE-2009-3955
Security:	CVE-2009-3956
Security:	CVE-2009-3957
Security:	CVE-2009-3958
Security:	CVE-2009-3959
Security:	CVE-2009-4324
2010-01-19 20:34:56 +00:00
Hiroki Sato
df110eb103 Update to 9.2. Multiple vulnerabilities which could cause the
application to crash and could potentially allow an attacker to
take control of the affected system have been fixed.

Security:	CVE-2007-0048
Security:	CVE-2007-0045
Security:	CVE-2009-2564
Security:	CVE-2009-2979
Security:	CVE-2009-2980
Security:	CVE-2009-2981
Security:	CVE-2009-2982
Security:	CVE-2009-2983
Security:	CVE-2009-2985
Security:	CVE-2009-2986
Security:	CVE-2009-2987
Security:	CVE-2009-2988
Security:	CVE-2009-2989
Security:	CVE-2009-2990
Security:	CVE-2009-2991
Security:	CVE-2009-2992
Security:	CVE-2009-2993
Security:	CVE-2009-2994
Security:	CVE-2009-2996
Security:	CVE-2009-2997
Security:	CVE-2009-2998
Security:	CVE-2009-3431
Security:	CVE-2009-3458
Security:	CVE-2009-3459
Security:	CVE-2009-3461
Security:	CVE-2009-3462
Security:	APSB09-15
Security:	http://www.adobe.com/support/security/bulletins/apsb09-15.html
2009-10-14 16:25:28 +00:00
Hiroki Sato
4561d5b4d2 Update to 9.1.3.
Security:	CVE-2009-1862
Security:	APSB09-10
Security:	http://www.adobe.com/support/security/bulletins/apsb09-10.html
PR:		ports/137331
2009-10-10 01:36:57 +00:00
Hiroki Sato
4dc85c9955 Update to 8.1.6 and 9.1.2.
Critical vulnerabilities have been identified in Adobe Reader
9.1.1 and Acrobat 9.1.1 and earlier versions. These
vulnerabilities would cause the application to crash and could
potentially allow an attacker to take control of the affected
system.

Security:	http://www.adobe.com/support/security/bulletins/apsb09-07.html
Security:	CVE-2009-0198
Security:	CVE-2009-0509
Security:	CVE-2009-0510
Security:	CVE-2009-0511
Security:	CVE-2009-0512
Security:	CVE-2009-0888
Security:	CVE-2009-0889
Security:	CVE-2009-1855
Security:	CVE-2009-1856
Security:	CVE-2009-1857
Security:	CVE-2009-1858
Security:	CVE-2009-1859
Security:	CVE-2009-1861
2009-06-17 16:56:15 +00:00
Hiroki Sato
856c6f620d Update to 9.1.1. Two critical vulnerabilities have been fixed:
- CVE-2009-1492

 The getAnnots Doc method in the JavaScript API in Adobe Reader
 and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote
 attackers to cause a denial of service (memory corruption) or
 execute arbitrary code via a PDF file that contains an
 annotation, and has an OpenAction entry with JavaScript code
 that calls this method with crafted integer arguments.

- CVE-2009-1493

 The customDictionaryOpen spell method in the JavaScript API in
 Adobe Reader 8.1.4 and 9.1 on Linux allows remote attackers to
 cause a denial of service (memory corruption) or execute
 arbitrary code via a PDF file that triggers a call to this
 method with a long string in the second argument.

Security:	CVE-2009-1492
Security:	CVE-2009-1493
Security:	http://www.adobe.com/support/security/bulletins/apsb09-06.html
2009-05-13 08:51:44 +00:00
Hiroki Sato
d5d186f732 Add acroread9, Adobe Reader 9.1.0. For changes since Adobe Reader
8.x, see the following URL:

	http://blogs.adobe.com/acroread/2009/03/#entry-9871
2009-03-28 18:11:44 +00:00