aboutsummaryrefslogtreecommitdiff
path: root/devel/rubygem-aws-sdk-ec2/distinfo
diff options
context:
space:
mode:
authorPalle Girgensohn <girgen@FreeBSD.org>2024-05-09 20:13:22 +0000
committerPalle Girgensohn <girgen@FreeBSD.org>2024-05-09 22:34:46 +0000
commitade1c57e3a72ec9c4a7c02ce28dbfbd5efcce373 (patch)
tree5a1be2c384a6472f3471f0e27acd58b1552f9465 /devel/rubygem-aws-sdk-ec2/distinfo
parentde67baaee9ffaf88fa80dcda1f89d83df424d0a4 (diff)
downloadports-main.tar.gz
ports-main.zip
databases/postgresql??-*: Update to latest versionsHEADmain
PostgreSQL 16.3, 15.7, 14.12, 13.15, and 12.19 Released! The PostgreSQL Global Development Group has released an update to all supported versions of PostgreSQL, including 16.3, 15.7, 14.12, 13.15, and 12.19. This release fixes one security vulnerability and over 55 bugs reported over the last several months. Please note that the fix in this release for CVE-2024-4317 only fixes fresh PostgreSQL installations, namely those that are created with the initdb utility after this fix is applied. If you have a current PostgreSQL installation and are concerned about this issue, please follow the additional updating instructions provided in the CVE-2024-4317 description or the release notes for the remediation. [1] The script is installed as /usr/local/share/postgresql/fix-CVE-2024-4317.sql PostgreSQL 12 will stop receiving fixes on November 14, 2024. If you are running PostgreSQL 12 in a production environment, we suggest that you make plans to upgrade to a newer, supported version of PostgreSQL. Please see our versioning policy for more information. [1]: https://www.postgresql.org/support/security/CVE-2024-4317/ Security: d53c30c1-0d7b-11ef-ba02-6cc21735f730 PR: 277428 (remove unneded patch) PR: 260494 (remove deprecated INTDATE option) PR: 265860 (correct path for contrib README file in pkg-message)
Diffstat (limited to 'devel/rubygem-aws-sdk-ec2/distinfo')
0 files changed, 0 insertions, 0 deletions