| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Add LICENSE.
- Add CUPS support.
- Add acroread(1) manual page.
Security: APSA11-04
Security: APSB11-24
Security: CVE-2011-2462
Security: CVE-2011-1353
Security: CVE-2011-2431
Security: CVE-2011-2432
Security: CVE-2011-2433
Security: CVE-2011-2434
Security: CVE-2011-2435
Security: CVE-2011-2436
Security: CVE-2011-2437
Security: CVE-2011-2438
Security: CVE-2011-2439
Security: CVE-2011-2440
Security: CVE-2011-2441
Security: CVE-2011-2442
Notes:
svn path=/head/; revision=289597
|
|
|
|
|
|
|
|
| |
issue in GUI mode. A linux_adobe.ko kernel module has to be loaded before
acroread is invoked.
Notes:
svn path=/head/; revision=274785
|
|
|
|
|
|
|
|
|
|
|
| |
not work currently.
Security: http://www.adobe.com/support/security/bulletins/apsb10-28.html
Security: http://www.adobe.com/support/security/bulletins/apsb10-21.html
Security: http://www.adobe.com/support/security/advisories/apsa10-02.html
Notes:
svn path=/head/; revision=267418
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
be generated or checked, and will be silently ignored for now. Also,
generalize the MD5_FILE macro to DISTINFO_FILO.
PR: 149657
Submitted by: rene
Approved by: portmgr
Tested on: pointyhat i386 7-exp
Notes:
svn path=/head/; revision=263705
|
|
|
|
| |
Notes:
svn path=/head/; revision=260159
|
|
|
|
|
|
|
|
| |
Security: http://www.adobe.com/support/security/bulletins/apsb10-09.html
PR: ports/145686
Notes:
svn path=/head/; revision=252869
|
|
|
|
|
|
|
|
|
| |
not run on the current Linux emulation yet.
Feature safe: yes
Notes:
svn path=/head/; revision=250489
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
have been identified in Adobe Reader 9.2.
Security: http://www.adobe.com/support/security/bulletins/apsb10-02.html
Security: APSB10-02
Security: CVE-2009-3953
Security: CVE-2009-3954
Security: CVE-2009-3955
Security: CVE-2009-3956
Security: CVE-2009-3957
Security: CVE-2009-3958
Security: CVE-2009-3959
Security: CVE-2009-4324
Notes:
svn path=/head/; revision=248167
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
application to crash and could potentially allow an attacker to
take control of the affected system have been fixed.
Security: CVE-2007-0048
Security: CVE-2007-0045
Security: CVE-2009-2564
Security: CVE-2009-2979
Security: CVE-2009-2980
Security: CVE-2009-2981
Security: CVE-2009-2982
Security: CVE-2009-2983
Security: CVE-2009-2985
Security: CVE-2009-2986
Security: CVE-2009-2987
Security: CVE-2009-2988
Security: CVE-2009-2989
Security: CVE-2009-2990
Security: CVE-2009-2991
Security: CVE-2009-2992
Security: CVE-2009-2993
Security: CVE-2009-2994
Security: CVE-2009-2996
Security: CVE-2009-2997
Security: CVE-2009-2998
Security: CVE-2009-3431
Security: CVE-2009-3458
Security: CVE-2009-3459
Security: CVE-2009-3461
Security: CVE-2009-3462
Security: APSB09-15
Security: http://www.adobe.com/support/security/bulletins/apsb09-15.html
Notes:
svn path=/head/; revision=242852
|
|
|
|
|
|
|
|
|
|
| |
Security: CVE-2009-1862
Security: APSB09-10
Security: http://www.adobe.com/support/security/bulletins/apsb09-10.html
PR: ports/137331
Notes:
svn path=/head/; revision=242609
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Critical vulnerabilities have been identified in Adobe Reader
9.1.1 and Acrobat 9.1.1 and earlier versions. These
vulnerabilities would cause the application to crash and could
potentially allow an attacker to take control of the affected
system.
Security: http://www.adobe.com/support/security/bulletins/apsb09-07.html
Security: CVE-2009-0198
Security: CVE-2009-0509
Security: CVE-2009-0510
Security: CVE-2009-0511
Security: CVE-2009-0512
Security: CVE-2009-0888
Security: CVE-2009-0889
Security: CVE-2009-1855
Security: CVE-2009-1856
Security: CVE-2009-1857
Security: CVE-2009-1858
Security: CVE-2009-1859
Security: CVE-2009-1861
Notes:
svn path=/head/; revision=236141
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- CVE-2009-1492
The getAnnots Doc method in the JavaScript API in Adobe Reader
and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote
attackers to cause a denial of service (memory corruption) or
execute arbitrary code via a PDF file that contains an
annotation, and has an OpenAction entry with JavaScript code
that calls this method with crafted integer arguments.
- CVE-2009-1493
The customDictionaryOpen spell method in the JavaScript API in
Adobe Reader 8.1.4 and 9.1 on Linux allows remote attackers to
cause a denial of service (memory corruption) or execute
arbitrary code via a PDF file that triggers a call to this
method with a long string in the second argument.
Security: CVE-2009-1492
Security: CVE-2009-1493
Security: http://www.adobe.com/support/security/bulletins/apsb09-06.html
Notes:
svn path=/head/; revision=233828
|
|
8.x, see the following URL:
http://blogs.adobe.com/acroread/2009/03/#entry-9871
Notes:
svn path=/head/; revision=231205
|