Package "postgresql-doc-12"
Name: | postgresql-doc-12 |
Description: |
documentation for the PostgreSQL database management system |
Latest version: | 12.22-0ubuntu0.20.04.1 |
Release: | focal (20.04) |
Level: | updates |
Repository: | main |
Head package: | postgresql-12 |
Homepage: | http://www.postgresql.org/ |
Links
Download "postgresql-doc-12"
Other versions of "postgresql-doc-12" in Focal
Repository | Area | Version |
---|---|---|
base | main | 12.2-4 |
security | main | 12.22-0ubuntu0.20.04.1 |
PPA: Postgresql | 12.7-1.pgdg16.04+1 | |
PPA: Postgresql | 12.15-1.pgdg18.04+1 | |
PPA: Postgresql | 12.22-1.pgdg20.04+1 | |
PPA: Postgresql | 12.22-1.pgdg22.04+1 |
Changelog
Version: 12.22-0ubuntu0.20.04.1 | 2024-12-02 16:06:53 UTC | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
postgresql-12 (12.22-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2085196). + This release encompasses changes from upstream's 12.21 and 12.22
+ A dump/restore is not required for those running 12.X. + However, if you are upgrading from a version earlier than 12.18, see
+ Ensure cached plans are marked as dependent on the calling role when
If a CTE, subquery, sublink, security invoker view, or coercion
The PostgreSQL Project thanks Wolfgang Walther for reporting this
+ Make libpq discard error messages
An error message received before encryption negotiation is completed
The PostgreSQL Project thanks Jacob Champion for reporting this
+ Fix unintended interactions between SET SESSION AUTHORIZATION
The SQL standard mandates that SET SESSION AUTHORIZATION have a
The PostgreSQL Project thanks Tom Lane for reporting this problem.
+ Prevent trusted PL/Perl code from changing environment variables
The ability to manipulate process environment variables such as PATH
The PostgreSQL Project thanks Coby Abrams for reporting this problem.
+ Restore functionality of ALTER {ROLE|DATABASE} SET
The fix for CVE-2024-10978 accidentally caused settings for role to
+ Details about these and many further changes can be found at:
* d/postgresql-12.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Mon, 25 Nov 2024 15:41:36 -0500 |
|||||||||||
Source diff to previous version | |||||||||||
|
Version: 12.20-0ubuntu0.20.04.1 | 2024-08-19 18:07:11 UTC | ||||
---|---|---|---|---|---|
postgresql-12 (12.20-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 12.X. + However, if you are upgrading from a version earlier than 12.18, see
+ Prevent unauthorized code execution during pg_dump (Masahiko Sawada) An attacker able to create and drop non-temporary objects could inject
The PostgreSQL Project thanks Noah Misch for reporting this problem.
+ Details about these and many further changes can be found at:
* d/postgresql-12.NEWS: Update. -- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:15:12 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 12.19-0ubuntu0.20.04.1 | 2024-07-01 12:07:07 UTC | ||
---|---|---|---|
postgresql-12 (12.19-0ubuntu0.20.04.1) focal; urgency=medium * New upstream version (LP: #2067388). + A dump/restore is not required for those running 12.X. + Also, if you are upgrading from a version earlier than 12.18, see
+ Fix INSERT from multiple VALUES rows into a target column that is a
Such cases would either fail with surprising complaints about
+ Fix incorrect pruning of NULL partition when a table is partitioned
A NULL value satisfies a clause such as boolcol IS NOT FALSE, so
+ Details about these and many further changes can be found at:
* d/postgresql-12.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Tue, 28 May 2024 09:30:50 -0400 |
|||
Source diff to previous version | |||
|
Version: 12.18-0ubuntu0.20.04.1 | 2024-02-26 16:06:55 UTC | ||||
---|---|---|---|---|---|
postgresql-12 (12.18-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2052850). + A dump/restore is not required for those running 12.X. + However, one bug was fixed that could have resulted in corruption of
+ Also, if you are upgrading from a version earlier than 12.17, see
+ Tighten security restrictions within REFRESH MATERIALIZED
One step of a concurrent refresh command was run under weak security
The only known exploit for this error does not work in PostgreSQL
The PostgreSQL Project thanks Pedro Gallegos for reporting this
+ Details about these and many further changes can be found at:
* d/postgresql-12.NEWS: Update. -- Athos Ribeiro <email address hidden> Thu, 15 Feb 2024 15:19:37 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 12.17-0ubuntu0.20.04.1 | 2023-12-06 18:06:52 UTC | ||
---|---|---|---|
postgresql-12 (12.17-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2040469). + A dump/restore is not required for those running 12.X. + However, if you use GiST indexes, it may be advisable to reindex them. + Also, if you are upgrading from a version earlier than 12.16, see
+ Fix handling of unknown-type arguments in DISTINCT "any" aggregate
This error led to a text-type value being interpreted as an unknown-type
+ Detect integer overflow while computing new array dimensions
When assigning new elements to array subscripts that are outside the
+ Prevent the <literal>pg_signal_backend</literal> role from
The documentation says that pg_signal_backend cannot issue signals to
Also ensure that the is_superuser parameter is set correctly in such
+ Fix misbehavior during recursive page split in GiST index build
Fix a case where the location of a page downlink was incorrectly
+ Details about these and many further changes can be found at:
* d/p/libpgport-pkglibdir: Adjust patch to reflect upstream changes. * d/p/50-per-version-dirs.patch: Adjust TestLib.pm's
-- Sergio Durigan Junior <email address hidden> Wed, 22 Nov 2023 21:50:50 -0500 |
|||
|