Package "postgresql-14"
| Name: | postgresql-14 | 
| Description: | This package is just an umbrella for a group of other packages,
            it has no description. 
 | 
| Latest version: | 14.19-0ubuntu0.22.04.1 | 
| Release: | jammy (22.04) | 
| Level: | updates | 
| Repository: | universe | 
Links
Other versions of "postgresql-14" in Jammy
| Repository | Area | Version | 
|---|---|---|
| base | universe | 14.2-1ubuntu1 | 
| base | main | 14.2-1ubuntu1 | 
| security | main | 14.19-0ubuntu0.22.04.1 | 
| security | universe | 14.19-0ubuntu0.22.04.1 | 
| updates | main | 14.19-0ubuntu0.22.04.1 | 
| PPA: Postgresql | 14.18-1.pgdg20.04+1 | |
| PPA: Postgresql | 14.8-1.pgdg18.04+1 | |
| PPA: Postgresql | 14.19-1.pgdg22.04+1 | |
Packages in group
Deleted packages are displayed in grey.
Changelog
| Version: 14.19-0ubuntu0.22.04.1 | 2025-09-08 20:07:08 UTC | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| postgresql-14 (14.19-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2112531). + A dump/restore is not required for those running 14.X.     + However, if you have any BRIN numeric_minmax_multi_ops indexes, it is
     + Also, if you are upgrading from a version earlier than 14.18, see those
 + Tighten security checks in planner estimation functions (Dean Rasheed)       The fix for CVE-2017-7484, plus followup fixes, intended to prevent
       The other gap applies to cases where the query accesses a table via a
     + Prevent pg_dump scripts from being used to attack the user running the
       Since dump/restore operations typically involve running SQL commands as
       To provide a positive guarantee that this can't happen, extend psql with
     + Convert newlines to spaces in names included in comments in pg_dump
       Object names containing newlines offered the ability to inject arbitrary
     + Fix incorrect distance calculation in BRIN numeric_minmax_multi_ops
       The results were sometimes wrong on 64-bit platforms, and wildly wrong
     + Details about these and many further changes can be found at:
 * d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Mon, 25 Aug 2025 22:04:43 -0300 | |||||||||||||
| Source diff to previous version | |||||||||||||
| 
 | |||||||||||||
| Version: 14.18-0ubuntu0.22.04.1 | 2025-05-21 00:07:13 UTC | ||||
|---|---|---|---|---|---|
| postgresql-14 (14.18-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2110377). + A dump/restore is not required for those running 14.X.     + However, if you have any self-referential foreign key constraints on
     + Also, if you have any BRIN bloom indexes, it may be advisable to reindex
     + Also, if you are upgrading from a version earlier than 14.14, see those
     + Avoid one-byte buffer overread when examining invalidly-encoded strings
       While unlikely, a SIGSEGV crash could occur if an incomplete multibyte
     + Handle self-referential foreign keys on partitioned tables correctly
       Creating or attaching partitions failed to make the required catalog
       To fix this, you should drop and recreate any self-referential foreign
     + Avoid data loss when merging compressed BRIN summaries in
       The code failed to account for decompression results not being identical
       This mistake was present back to v14 where BRIN bloom indexes were
     + Details about these and many further changes can be found at:
 * d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Sun, 11 May 2025 06:15:54 -0300 | |||||
| Source diff to previous version | |||||
| 
 | |||||
| Version: 14.17-0ubuntu0.22.04.1 | 2025-03-03 21:07:01 UTC | ||||
|---|---|---|---|---|---|
| postgresql-14 (14.17-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2099900).     + This release encompasses changes from upstream's 14.16 and 14.17
 + A dump/restore is not required for those running 14.X.     + However, if you are upgrading from a version earlier than 14.14, see
     + Harden PQescapeString and allied functions against invalidly-encoded
       Data-quoting functions supplied by libpq now fully check the encoding
       The purpose of this change is to guard against SQL-injection attacks
       This fix is effective only if the data-quoting function, the server, and
       Applications and drivers that quote untrusted input without using these
       The PostgreSQL Project thanks Stephen Fewer for reporting this problem.
 + Improve behavior of libpq's quoting functions (Andres Freund, Tom Lane)       The changes made for CVE-2025-1094 had one serious oversight:
       In addition, modify all these quoting functions so that when invalid
     + Details about these and many further changes can be found at:
 * d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Mon, 24 Feb 2025 13:09:01 -0300 | |||||
| Source diff to previous version | |||||
| 
 | |||||
| Version: 14.15-0ubuntu0.22.04.1 | 2024-12-02 16:06:57 UTC | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| postgresql-14 (14.15-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2085196).     + This release encompasses changes from upstream's 14.14 and 14.15
 + A dump/restore is not required for those running 14.X.     + However, if you are upgrading from a version earlier than 14.12, see
     + Ensure cached plans are marked as dependent on the calling role when
       If a CTE, subquery, sublink, security invoker view, or coercion
       The PostgreSQL Project thanks Wolfgang Walther for reporting this
     + Make libpq discard error messages
       An error message received before encryption negotiation is completed
       The PostgreSQL Project thanks Jacob Champion for reporting this
     + Fix unintended interactions between SET SESSION AUTHORIZATION
       The SQL standard mandates that SET SESSION AUTHORIZATION have a
       The PostgreSQL Project thanks Tom Lane for reporting this problem.
     + Prevent trusted PL/Perl code from changing environment variables
       The ability to manipulate process environment variables such as PATH
       The PostgreSQL Project thanks Coby Abrams for reporting this problem.
     + Restore functionality of ALTER {ROLE|DATABASE} SET
       The fix for CVE-2024-10978 accidentally caused settings for role to
     + Details about these and many further changes can be found at:
 * d/postgresql-14.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Mon, 25 Nov 2024 16:05:41 -0500 | |||||||||||
| Source diff to previous version | |||||||||||
| 
 | |||||||||||
| Version: 14.13-0ubuntu0.22.04.1 | 2024-08-19 18:07:22 UTC | ||||
|---|---|---|---|---|---|
| postgresql-14 (14.13-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 14.X.     + However, if you are upgrading from a version earlier than 14.12, see
 + Prevent unauthorized code execution during pg_dump (Masahiko Sawada)       An attacker able to create and drop non-temporary objects could inject
       The PostgreSQL Project thanks Noah Misch for reporting this problem.
     + Details about these and many further changes can be found at:
   * d/postgresql-14.NEWS: Update.
 -- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:14:44 -0300 | |||||
| 
 | |||||
