Package "libpq-dev"
Name: | libpq-dev |
Description: |
header files for libpq5 (PostgreSQL library) |
Latest version: | 16.4-0ubuntu0.24.04.1 |
Release: | noble (24.04) |
Level: | security |
Repository: | main |
Head package: | postgresql-16 |
Homepage: | http://www.postgresql.org/ |
Links
Download "libpq-dev"
Other versions of "libpq-dev" in Noble
Repository | Area | Version |
---|---|---|
base | main | 16.2-1ubuntu4 |
updates | main | 16.4-0ubuntu0.24.04.2 |
PPA: Postgresql | 17.1-1.pgdg22.04+1 | |
PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
PPA: Postgresql | 17.1-1.pgdg20.04+1 |
Changelog
Version: 16.4-0ubuntu0.24.04.1 | 2024-08-19 17:07:12 UTC | ||||
---|---|---|---|---|---|
postgresql-16 (16.4-0ubuntu0.24.04.1) noble-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 16.3, see
+ Prevent unauthorized code execution during pg_dump (Masahiko Sawada) An attacker able to create and drop non-temporary objects could inject
The PostgreSQL Project thanks Noah Misch for reporting this problem.
+ Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:13:57 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 16.3-0ubuntu0.24.04.1 | 2024-05-30 14:07:16 UTC | ||||
---|---|---|---|---|---|
postgresql-16 (16.3-0ubuntu0.24.04.1) noble-security; urgency=medium * New upstream version (LP: #2067388). + A dump/restore is not required for those running 16.X. + However, a security vulnerability was found in the system views
+ Also, if you are upgrading from a version earlier than 16.2, see
+ Restrict visibility of pg_stats_ext and pg_stats_ext_exprs entries
These views failed to hide statistics for expressions that involve
The PostgreSQL Project thanks Lukas Fittl for reporting this
By itself, this fix will only fix the behavior in newly initdb'd
- In each database of the cluster, run the
\i /usr/share/postgresql/16/fix-CVE-2024-4317.sql It will not hurt to run the script more than once. - Do not forget to include the template0 and template1 databases,
ALTER DATABASE template0 WITH ALLOW_CONNECTIONS true; and then after fixing template0, undo it with: ALTER DATABASE template0 WITH ALLOW_CONNECTIONS false; (CVE-2024-4317) + Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Wed, 29 May 2024 13:16:10 -0400 |
|||||
|