OpenBSD ports changes summary for 2016-02-16
============================================

databases/postgresql                    net/prosody
www/squid                               

== databases ========================================================= 01/03 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/databases

postgresql

  ~ Makefile                              ~ distinfo
  ~ patches/patch-src_backend_libpq_ip_c
  ~ patches/patch-src_include_storage_s_lock_h
  ~ patches/patch-src_interfaces_ecpg_compatlib_Makefile
  ~ patches/patch-src_interfaces_ecpg_pgtypeslib_Makefile
  ~ pkg/PLIST-docs                        ~ pkg/PLIST-main

  TAGGED OPENBSD_5_8
  > SECURITY update to PostgreSQL 9.4.6: various fixes including one for
  > CVE-2016-0773, an issue with regular expression parsing. Various other
  > fixes.
  > Note: ..."if you are upgrading an installation that contains any GIN
  > indexes that use the (non-default) jsonb_path_ops operator class, see
  > the first changelog entry"...
  > http://www.postgresql.org/docs/current/static/release-9-4-6.html (jasper@)

== net =============================================================== 02/03 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/net

prosody

  ~ Makefile                              ~ pkg/README

  > add MySQL notes to README (it needs LD_PRELOAD libpthread).
  > ok Henrik Friedrichsen (maintainer), giovanni@ (sthen@)

== www =============================================================== 03/03 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/www

squid

  ~ Makefile                              ~ distinfo
  ~ patches/patch-bootstrap_sh            

  > Security update to squid-3.5.14, ok jasper@ rpointel@
  > http://www.squid-cache.org/Advisories/SQUID-2016_1.txt
  > "Due to incorrectly handling server errors Squid is vulnerable to a
  > denial of service attack when connecting to TLS or SSL servers." (sthen@)

===============================================================================
_______________________________________________
odc mailing list
[email protected]
http://www.squish.net/mailman/listinfo/odc

Reply via email to