Package "libpq-dev"
Name: | libpq-dev |
Description: |
header files for libpq5 (PostgreSQL library) |
Latest version: | 14.13-0ubuntu0.22.04.1 |
Release: | jammy (22.04) |
Level: | security |
Repository: | main |
Head package: | postgresql-14 |
Homepage: | http://www.postgresql.org/ |
Links
Download "libpq-dev"
Other versions of "libpq-dev" in Jammy
Repository | Area | Version |
---|---|---|
base | main | 14.2-1ubuntu1 |
updates | main | 14.13-0ubuntu0.22.04.1 |
PPA: Postgresql | 17.1-1.pgdg22.04+1 | |
PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
PPA: Postgresql | 17.1-1.pgdg20.04+1 |
Changelog
Version: 14.13-0ubuntu0.22.04.1 | 2024-08-19 17:07:09 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.13-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.12, see
+ Prevent unauthorized code execution during pg_dump (Masahiko Sawada) An attacker able to create and drop non-temporary objects could inject
The PostgreSQL Project thanks Noah Misch for reporting this problem.
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update.
-- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:14:44 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 14.12-0ubuntu0.22.04.1 | 2024-05-30 14:07:09 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.12-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2067388). + A dump/restore is not required for those running 14.X. + However, a security vulnerability was found in the system views
+ Also, if you are upgrading from a version earlier than 14.11, see
+ Restrict visibility of pg_stats_ext and pg_stats_ext_exprs entries
These views failed to hide statistics for expressions that involve
The PostgreSQL Project thanks Lukas Fittl for reporting this
By itself, this fix will only fix the behavior in newly initdb'd
- In each database of the cluster, run the
\i /usr/share/postgresql/14/fix-CVE-2024-4317.sql It will not hurt to run the script more than once. - Do not forget to include the template0 and template1 databases,
ALTER DATABASE template0 WITH ALLOW_CONNECTIONS true; and then after fixing template0, undo it with: ALTER DATABASE template0 WITH ALLOW_CONNECTIONS false; (CVE-2024-4317) + Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Tue, 28 May 2024 09:51:10 -0400 |
|||||
Source diff to previous version | |||||
|
Version: 14.11-0ubuntu0.22.04.1 | 2024-02-26 14:07:00 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.11-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2052850). + A dump/restore is not required for those running 14.X. + However, one bug was fixed that could have resulted in corruption of
+ Also, if you are upgrading from a version earlier than 14.10, see
+ Tighten security restrictions within REFRESH MATERIALIZED
One step of a concurrent refresh command was run under weak security
The only known exploit for this error does not work in PostgreSQL
The PostgreSQL Project thanks Pedro Gallegos for reporting this
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Fri, 09 Feb 2024 19:49:08 -0500 |
|||||
Source diff to previous version | |||||
|
Version: 14.10-0ubuntu0.22.04.1 | 2023-12-06 17:06:57 UTC | ||
---|---|---|---|
postgresql-14 (14.10-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2040469). + A dump/restore is not required for those running 14.X. + However, several mistakes have been discovered that could lead to
+ Also, if you are upgrading from a version earlier than 14.9, see
+ Fix handling of unknown-type arguments in DISTINCT "any" aggregate
This error led to a text-type value being interpreted as an unknown-type
+ Detect integer overflow while computing new array dimensions
When assigning new elements to array subscripts that are outside the
+ Prevent the <literal>pg_signal_backend</literal> role from
The documentation says that pg_signal_backend cannot issue signals to
Also ensure that the is_superuser parameter is set correctly in such
+ Fix misbehavior during recursive page split in GiST index build
Fix a case where the location of a page downlink was incorrectly
+ Prevent de-duplication of btree index entries for interval columns
There are interval values that are distinguishable but compare
+ Process date values more sanely in BRIN datetime_minmax_multi_ops
The distance calculation for dates was backward, causing poor
+ Process large timestamp and timestamptz values more sanely in BRIN
Infinities were mistakenly treated as having distance zero rather
+ Details about these and many further changes can be found at:
* d/p/libpgport-pkglibdir: Adjust patch to reflect upstream changes. * d/p/50-per-version-dirs.patch: Adjust TestLib.pm's
-- Sergio Durigan Junior <email address hidden> Wed, 22 Nov 2023 22:07:12 -0500 |
|||
Source diff to previous version | |||
|
Version: 14.9-0ubuntu0.22.04.1 | 2023-08-17 14:07:04 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.9-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2028426). + A dump/restore is not required for those running 14.X. + However, if you use BRIN indexes, it may be advisable to reindex them. + Also, if you are upgrading from a version earlier than 14.4, see
+ Disallow substituting a schema or owner name into an extension script
This restriction guards against SQL-injection hazards for trusted
+ Fix confusion between empty (no rows) ranges and all-NULL ranges in
Each of these oversights could result in forgetting that a BRIN
This fix will not in itself correct faulty BRIN entries.
+ Details about these and many further changes can be found at:
-- Athos Ribeiro <email address hidden> Wed, 09 Aug 2023 09:01:25 -0300 |
|||||
|