Package "libecpg-compat3"
Name: | libecpg-compat3 |
Description: |
older version of run-time library for ECPG programs |
Latest version: | 10.23-0ubuntu0.18.04.2 |
Release: | bionic (18.04) |
Level: | security |
Repository: | main |
Head package: | postgresql-10 |
Homepage: | http://www.postgresql.org/ |
Links
Download "libecpg-compat3"
Other versions of "libecpg-compat3" in Bionic
Repository | Area | Version |
---|---|---|
base | main | 10.3-1 |
updates | main | 10.23-0ubuntu0.18.04.2 |
PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
PPA: Postgresql | 17.2-1.pgdg22.04+1 | |
PPA: Postgresql | 17.2-1.pgdg20.04+1 |
Changelog
Version: 10.17-0ubuntu0.18.04.1 | 2021-06-01 13:06:19 UTC | ||
---|---|---|---|
postgresql-10 (10.17-0ubuntu0.18.04.1) bionic-security; urgency=medium * New upstream version (LP: #1928773). + Prevent integer overflows in array subscripting calculations (Tom Lane) The array code previously did not complain about cases where an array's
+ Fix mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE
If the UPDATE list contains any multi-column sub-selects (which give
In addition, in versions supporting cross-partition updates, a
+ Details about these and many further changes can be found at:
-- Christian Ehrhardt <email address hidden> Tue, 18 May 2021 12:17:37 +0200 |
|||
Source diff to previous version | |||
|
Version: 10.15-0ubuntu0.18.04.1 | 2020-11-17 14:06:25 UTC | ||||||
---|---|---|---|---|---|---|---|
postgresql-10 (10.15-0ubuntu0.18.04.1) bionic-security; urgency=medium * New upstream version.
This is essentially a leak in the security restricted operation sandbox
The PostgreSQL Project thanks Etienne Stalmans for reporting this
+ Fix usage of complex connection-string parameters in pg_dump,
The -d parameter of pg_dump and pg_restore, or the --maintenance-db
+ When psql's \connect command re-uses connection parameters, ensure that
This avoids cases where reconnection might fail due to omission of
+ Prevent psql's \gset command from modifying specially-treated variables
\gset without a prefix would overwrite whatever variables the server
The PostgreSQL Project thanks Nick Cleaton for reporting this problem.
+ Details about these and many further changes can be found at:
-- Christian Ehrhardt <email address hidden> Thu, 12 Nov 2020 12:13:22 +0100 |
|||||||
Source diff to previous version | |||||||
|
Version: 10.14-0ubuntu0.18.04.1 | 2020-08-25 13:06:22 UTC | ||||||||
---|---|---|---|---|---|---|---|---|---|
postgresql-10 (10.14-0ubuntu0.18.04.1) bionic-security; urgency=medium * New upstream release (LP: #1892335).
A malicious user of either the publisher or subscriber database could
- Make contrib modules' installation scripts more secure (Tom Lane) Attacks similar to those described in CVE-2018-1058 could be carried out
- Details about these and many further changes can be found at:
-- Christian Ehrhardt <email address hidden> Thu, 20 Aug 2020 11:29:28 +0200 |
|||||||||
Source diff to previous version | |||||||||
|
Version: 10.12-0ubuntu0.18.04.1 | 2020-02-18 14:07:43 UTC | ||
---|---|---|---|
postgresql-10 (10.12-0ubuntu0.18.04.1) bionic-security; urgency=medium * New upstream release (LP: #1863108)
-- Christian Ehrhardt <email address hidden> Thu, 13 Feb 2020 15:18:22 +0100 |
|||
Source diff to previous version | |||
|
Version: 10.10-0ubuntu0.18.04.1 | 2019-08-09 00:07:06 UTC | ||||
---|---|---|---|---|---|
postgresql-10 (10.10-0ubuntu0.18.04.1) bionic-security; urgency=medium * SECURITY UPDATE: New upstream release (LP: #1839058)
-- Christian Ehrhardt <email address hidden> Tue, 06 Aug 2019 08:55:10 +0200 |
|||||
|