Package "libecpg6"
Name: | libecpg6 |
Description: |
run-time library for ECPG programs |
Latest version: | 14.15-0ubuntu0.22.04.1 |
Release: | jammy (22.04) |
Level: | updates |
Repository: | main |
Head package: | postgresql-14 |
Homepage: | http://www.postgresql.org/ |
Links
Download "libecpg6"
Other versions of "libecpg6" in Jammy
Repository | Area | Version |
---|---|---|
base | main | 14.2-1ubuntu1 |
security | main | 14.15-0ubuntu0.22.04.1 |
PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
PPA: Postgresql | 17.2-1.pgdg22.04+1 | |
PPA: Postgresql | 17.2-1.pgdg20.04+1 |
Changelog
Version: 14.15-0ubuntu0.22.04.1 | 2024-12-02 16:06:56 UTC | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
postgresql-14 (14.15-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2085196). + This release encompasses changes from upstream's 14.14 and 14.15
+ A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.12, see
+ Ensure cached plans are marked as dependent on the calling role when
If a CTE, subquery, sublink, security invoker view, or coercion
The PostgreSQL Project thanks Wolfgang Walther for reporting this
+ Make libpq discard error messages
An error message received before encryption negotiation is completed
The PostgreSQL Project thanks Jacob Champion for reporting this
+ Fix unintended interactions between SET SESSION AUTHORIZATION
The SQL standard mandates that SET SESSION AUTHORIZATION have a
The PostgreSQL Project thanks Tom Lane for reporting this problem.
+ Prevent trusted PL/Perl code from changing environment variables
The ability to manipulate process environment variables such as PATH
The PostgreSQL Project thanks Coby Abrams for reporting this problem.
+ Restore functionality of ALTER {ROLE|DATABASE} SET
The fix for CVE-2024-10978 accidentally caused settings for role to
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Mon, 25 Nov 2024 16:05:41 -0500 |
|||||||||||
Source diff to previous version | |||||||||||
|
Version: 14.13-0ubuntu0.22.04.1 | 2024-08-19 18:07:16 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.13-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.12, see
+ Prevent unauthorized code execution during pg_dump (Masahiko Sawada) An attacker able to create and drop non-temporary objects could inject
The PostgreSQL Project thanks Noah Misch for reporting this problem.
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update.
-- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:14:44 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 14.12-0ubuntu0.22.04.1 | 2024-05-30 15:06:58 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.12-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2067388). + A dump/restore is not required for those running 14.X. + However, a security vulnerability was found in the system views
+ Also, if you are upgrading from a version earlier than 14.11, see
+ Restrict visibility of pg_stats_ext and pg_stats_ext_exprs entries
These views failed to hide statistics for expressions that involve
The PostgreSQL Project thanks Lukas Fittl for reporting this
By itself, this fix will only fix the behavior in newly initdb'd
- In each database of the cluster, run the
\i /usr/share/postgresql/14/fix-CVE-2024-4317.sql It will not hurt to run the script more than once. - Do not forget to include the template0 and template1 databases,
ALTER DATABASE template0 WITH ALLOW_CONNECTIONS true; and then after fixing template0, undo it with: ALTER DATABASE template0 WITH ALLOW_CONNECTIONS false; (CVE-2024-4317) + Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Tue, 28 May 2024 09:51:10 -0400 |
|||||
Source diff to previous version | |||||
|
Version: 14.11-0ubuntu0.22.04.1 | 2024-02-26 16:06:59 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.11-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2052850). + A dump/restore is not required for those running 14.X. + However, one bug was fixed that could have resulted in corruption of
+ Also, if you are upgrading from a version earlier than 14.10, see
+ Tighten security restrictions within REFRESH MATERIALIZED
One step of a concurrent refresh command was run under weak security
The only known exploit for this error does not work in PostgreSQL
The PostgreSQL Project thanks Pedro Gallegos for reporting this
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Fri, 09 Feb 2024 19:49:08 -0500 |
|||||
Source diff to previous version | |||||
|
Version: 14.10-0ubuntu0.22.04.1 | 2023-12-06 18:06:54 UTC | ||
---|---|---|---|
postgresql-14 (14.10-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2040469). + A dump/restore is not required for those running 14.X. + However, several mistakes have been discovered that could lead to
+ Also, if you are upgrading from a version earlier than 14.9, see
+ Fix handling of unknown-type arguments in DISTINCT "any" aggregate
This error led to a text-type value being interpreted as an unknown-type
+ Detect integer overflow while computing new array dimensions
When assigning new elements to array subscripts that are outside the
+ Prevent the <literal>pg_signal_backend</literal> role from
The documentation says that pg_signal_backend cannot issue signals to
Also ensure that the is_superuser parameter is set correctly in such
+ Fix misbehavior during recursive page split in GiST index build
Fix a case where the location of a page downlink was incorrectly
+ Prevent de-duplication of btree index entries for interval columns
There are interval values that are distinguishable but compare
+ Process date values more sanely in BRIN datetime_minmax_multi_ops
The distance calculation for dates was backward, causing poor
+ Process large timestamp and timestamptz values more sanely in BRIN
Infinities were mistakenly treated as having distance zero rather
+ Details about these and many further changes can be found at:
* d/p/libpgport-pkglibdir: Adjust patch to reflect upstream changes. * d/p/50-per-version-dirs.patch: Adjust TestLib.pm's
-- Sergio Durigan Junior <email address hidden> Wed, 22 Nov 2023 22:07:12 -0500 |
|||
|