aboutsummaryrefslogtreecommitdiff
path: root/french/acroread9
Commit message (Collapse)AuthorAgeFilesLines
* - Update to 9.4.7 (English version only)Hiroki Sato2012-01-221-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | - Add LICENSE. - Add CUPS support. - Add acroread(1) manual page. Security: APSA11-04 Security: APSB11-24 Security: CVE-2011-2462 Security: CVE-2011-1353 Security: CVE-2011-2431 Security: CVE-2011-2432 Security: CVE-2011-2433 Security: CVE-2011-2434 Security: CVE-2011-2435 Security: CVE-2011-2436 Security: CVE-2011-2437 Security: CVE-2011-2438 Security: CVE-2011-2439 Security: CVE-2011-2440 Security: CVE-2011-2441 Security: CVE-2011-2442 Notes: svn path=/head/; revision=289597
* Update to Adobe Reader 9.4.2 and add a hack to mitigate "RSException" crashHiroki Sato2011-05-291-2/+2
| | | | | | | | issue in GUI mode. A linux_adobe.ko kernel module has to be loaded before acroread is invoked. Notes: svn path=/head/; revision=274785
* Update to 9.4.1 and add a warning message which explains the GUI mode doesHiroki Sato2011-01-051-3/+2
| | | | | | | | | | | not work currently. Security: http://www.adobe.com/support/security/bulletins/apsb10-28.html Security: http://www.adobe.com/support/security/bulletins/apsb10-21.html Security: http://www.adobe.com/support/security/advisories/apsa10-02.html Notes: svn path=/head/; revision=267418
* Deprecate md5 in favour of sha256 checksums. md5 checksums will no longerErwin Lansing2010-10-281-1/+1
| | | | | | | | | | | | | be generated or checked, and will be silently ignored for now. Also, generalize the MD5_FILE macro to DISTINFO_FILO. PR: 149657 Submitted by: rene Approved by: portmgr Tested on: pointyhat i386 7-exp Notes: svn path=/head/; revision=263705
* Update to 9.3.4.Hiroki Sato2010-08-291-3/+3
| | | | Notes: svn path=/head/; revision=260159
* Update to 9.3.2.Hiroki Sato2010-04-181-3/+3
| | | | | | | | Security: http://www.adobe.com/support/security/bulletins/apsb10-09.html PR: ports/145686 Notes: svn path=/head/; revision=252869
* Update to 9.3.1 and add a warning message that explains it doesHiroki Sato2010-03-021-3/+3
| | | | | | | | | not run on the current Linux emulation yet. Feature safe: yes Notes: svn path=/head/; revision=250489
* Update to 9.3. This release includes fixes for critical vulnerabilities whichHiroki Sato2010-01-191-3/+3
| | | | | | | | | | | | | | | | | | have been identified in Adobe Reader 9.2. Security: http://www.adobe.com/support/security/bulletins/apsb10-02.html Security: APSB10-02 Security: CVE-2009-3953 Security: CVE-2009-3954 Security: CVE-2009-3955 Security: CVE-2009-3956 Security: CVE-2009-3957 Security: CVE-2009-3958 Security: CVE-2009-3959 Security: CVE-2009-4324 Notes: svn path=/head/; revision=248167
* Update to 9.2. Multiple vulnerabilities which could cause theHiroki Sato2009-10-141-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | application to crash and could potentially allow an attacker to take control of the affected system have been fixed. Security: CVE-2007-0048 Security: CVE-2007-0045 Security: CVE-2009-2564 Security: CVE-2009-2979 Security: CVE-2009-2980 Security: CVE-2009-2981 Security: CVE-2009-2982 Security: CVE-2009-2983 Security: CVE-2009-2985 Security: CVE-2009-2986 Security: CVE-2009-2987 Security: CVE-2009-2988 Security: CVE-2009-2989 Security: CVE-2009-2990 Security: CVE-2009-2991 Security: CVE-2009-2992 Security: CVE-2009-2993 Security: CVE-2009-2994 Security: CVE-2009-2996 Security: CVE-2009-2997 Security: CVE-2009-2998 Security: CVE-2009-3431 Security: CVE-2009-3458 Security: CVE-2009-3459 Security: CVE-2009-3461 Security: CVE-2009-3462 Security: APSB09-15 Security: http://www.adobe.com/support/security/bulletins/apsb09-15.html Notes: svn path=/head/; revision=242852
* Update to 9.1.3.Hiroki Sato2009-10-101-3/+3
| | | | | | | | | | Security: CVE-2009-1862 Security: APSB09-10 Security: http://www.adobe.com/support/security/bulletins/apsb09-10.html PR: ports/137331 Notes: svn path=/head/; revision=242609
* Update to 8.1.6 and 9.1.2.Hiroki Sato2009-06-171-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | Critical vulnerabilities have been identified in Adobe Reader 9.1.1 and Acrobat 9.1.1 and earlier versions. These vulnerabilities would cause the application to crash and could potentially allow an attacker to take control of the affected system. Security: http://www.adobe.com/support/security/bulletins/apsb09-07.html Security: CVE-2009-0198 Security: CVE-2009-0509 Security: CVE-2009-0510 Security: CVE-2009-0511 Security: CVE-2009-0512 Security: CVE-2009-0888 Security: CVE-2009-0889 Security: CVE-2009-1855 Security: CVE-2009-1856 Security: CVE-2009-1857 Security: CVE-2009-1858 Security: CVE-2009-1859 Security: CVE-2009-1861 Notes: svn path=/head/; revision=236141
* Update to 9.1.1. Two critical vulnerabilities have been fixed:Hiroki Sato2009-05-131-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | - CVE-2009-1492 The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments. - CVE-2009-1493 The customDictionaryOpen spell method in the JavaScript API in Adobe Reader 8.1.4 and 9.1 on Linux allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that triggers a call to this method with a long string in the second argument. Security: CVE-2009-1492 Security: CVE-2009-1493 Security: http://www.adobe.com/support/security/bulletins/apsb09-06.html Notes: svn path=/head/; revision=233828
* Add acroread9, Adobe Reader 9.1.0. For changes since Adobe ReaderHiroki Sato2009-03-282-0/+18
8.x, see the following URL: http://blogs.adobe.com/acroread/2009/03/#entry-9871 Notes: svn path=/head/; revision=231205