Package "postgresql-14"
| Name: | postgresql-14 |
Description: |
This package is just an umbrella for a group of other packages,
it has no description.
|
| Latest version: | 14.23-0ubuntu0.22.04.1 |
| Release: | jammy (22.04) |
| Level: | security |
| Repository: | universe |
Links
Other versions of "postgresql-14" in Jammy
| Repository | Area | Version |
|---|---|---|
| base | universe | 14.2-1ubuntu1 |
| base | main | 14.2-1ubuntu1 |
| security | main | 14.23-0ubuntu0.22.04.1 |
| updates | main | 14.23-0ubuntu0.22.04.1 |
| updates | universe | 14.23-0ubuntu0.22.04.1 |
| PPA: Postgresql | 14.18-1.pgdg20.04+1 | |
| PPA: Postgresql | 14.8-1.pgdg18.04+1 | |
| PPA: Postgresql | 14.23-1.pgdg22.04+1 | |
Packages in group
Deleted packages are displayed in grey.
Changelog
| Version: 14.23-0ubuntu0.22.04.1 | 2026-05-21 22:07:36 UTC | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
postgresql-14 (14.23-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2152636). + A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.19, see
+ Prevent unbounded recursion while processing startup packets A malicious client could crash the connected backend by alternating
+ Fix assorted integer overflows in memory-allocation calculations Various places were incautious about the possibility of integer overflow
+ Reject over-length options in ts_headline() The StartSel, StopSel and FragmentDelimiter strings must not exceed 32Kb
+ Guard against malicious time zone names in timeofday() and pg_strftime() A crafted time zone setting could pass % sequences to snprintf(),
+ When creating a multirange type, ensure the user has CREATE privilege on
The multirange type can be put into a different schema than its parent
+ Use timing-safe string comparisons in authentication code Use timingsafe_bcmp() instead of memcpy() or strcmp() when checking
+ Mark PQfn() as unsafe, and avoid using it within libpq For a non-integral result type, PQfn() is not passed the size of the
+ Prevent path traversal in pg_basebackup and pg_rewind These applications failed to validate output file paths read from their
+ Guard against field overflow within contrib/intarray's query_int type
Parsing of these query structures did not check for overflow of 16-bit
+ Guard against overly long values of contrib/ltree's lquery type Values with more than 64K items caused internal overflows, potentially
+ Prevent SQL injection and buffer overruns in contrib/spi check_foreign_key() was insufficiently careful about quoting key values,
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: update NEWS file. -- Athos Ribeiro <email address hidden> Fri, 15 May 2026 09:22:59 -0300 |
|||||||||||||||||||
| Source diff to previous version | |||||||||||||||||||
|
|||||||||||||||||||
| Version: 14.22-0ubuntu0.22.04.1 | 2026-03-04 15:08:09 UTC | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
postgresql-14 (14.22-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2127668). + This release encompasses changes from upstream's 14.21 and 14.22
+ A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.19, see
+ Guard against unexpected dimensions of oidvector/int2vector (Tom Lane) These data types are expected to be 1-dimensional arrays containing no
+ Harden selectivity estimators against being attached to operators that
contrib/intarray contained a selectivity estimation function that could
+ Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
Decrypting a crafted message with an overlength session key caused a
+ Fix inadequate validation of multibyte character lengths (Thomas Munro,
Assorted bugs allowed an attacker able to issue crafted SQL to overrun
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:13:13 -0300 |
|||||||||||
| Source diff to previous version | |||||||||||
|
|||||||||||
| Version: 14.20-0ubuntu0.22.04.1 | 2025-12-03 21:14:21 UTC | ||||||
|---|---|---|---|---|---|---|---|
|
postgresql-14 (14.20-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2127667). + A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.19, see
+ Check for CREATE privileges on the schema in CREATE STATISTICS (Jelte
This omission allowed table owners to create statistics in any schema,
+ Avoid integer overflow in allocation-size calculations within libpq
Several places in libpq were not sufficiently careful about computing
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update NEWS file. -- Athos Ribeiro <email address hidden> Mon, 24 Nov 2025 10:34:10 -0300 |
|||||||
| Source diff to previous version | |||||||
|
|||||||
| Version: 14.19-0ubuntu0.22.04.1 | 2025-09-08 15:07:05 UTC | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
postgresql-14 (14.19-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2112531). + A dump/restore is not required for those running 14.X. + However, if you have any BRIN numeric_minmax_multi_ops indexes, it is
+ Also, if you are upgrading from a version earlier than 14.18, see those
+ Tighten security checks in planner estimation functions (Dean Rasheed) The fix for CVE-2017-7484, plus followup fixes, intended to prevent
The other gap applies to cases where the query accesses a table via a
+ Prevent pg_dump scripts from being used to attack the user running the
Since dump/restore operations typically involve running SQL commands as
To provide a positive guarantee that this can't happen, extend psql with
+ Convert newlines to spaces in names included in comments in pg_dump
Object names containing newlines offered the ability to inject arbitrary
+ Fix incorrect distance calculation in BRIN numeric_minmax_multi_ops
The results were sometimes wrong on 64-bit platforms, and wildly wrong
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Mon, 25 Aug 2025 22:04:43 -0300 |
|||||||||||||
| Source diff to previous version | |||||||||||||
|
|||||||||||||
| Version: 14.18-0ubuntu0.22.04.1 | 2025-05-20 23:07:07 UTC | ||||
|---|---|---|---|---|---|
|
postgresql-14 (14.18-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2110377). + A dump/restore is not required for those running 14.X. + However, if you have any self-referential foreign key constraints on
+ Also, if you have any BRIN bloom indexes, it may be advisable to reindex
+ Also, if you are upgrading from a version earlier than 14.14, see those
+ Avoid one-byte buffer overread when examining invalidly-encoded strings
While unlikely, a SIGSEGV crash could occur if an incomplete multibyte
+ Handle self-referential foreign keys on partitioned tables correctly
Creating or attaching partitions failed to make the required catalog
To fix this, you should drop and recreate any self-referential foreign
+ Avoid data loss when merging compressed BRIN summaries in
The code failed to account for decompression results not being identical
This mistake was present back to v14 where BRIN bloom indexes were
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Sun, 11 May 2025 06:15:54 -0300 |
|||||
|
|||||