Package "libpq-dev"
Name: | libpq-dev |
Description: |
header files for libpq5 (PostgreSQL library) |
Latest version: | 16.6-0ubuntu0.24.04.1 |
Release: | noble (24.04) |
Level: | updates |
Repository: | main |
Head package: | postgresql-16 |
Homepage: | http://www.postgresql.org/ |
Links
Download "libpq-dev"
Other versions of "libpq-dev" in Noble
Repository | Area | Version |
---|---|---|
base | main | 16.2-1ubuntu4 |
security | main | 16.6-0ubuntu0.24.04.1 |
PPA: Postgresql | 17.2-1.pgdg22.04+1 | |
PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
PPA: Postgresql | 17.2-1.pgdg20.04+1 |
Changelog
Version: 16.6-0ubuntu0.24.04.1 | 2024-12-02 16:06:58 UTC | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
postgresql-16 (16.6-0ubuntu0.24.04.1) noble-security; urgency=medium * New upstream version (LP: #2085196). + This release encompasses changes from upstream's 16.5 and 16.6
+ A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 16.3, see
+ Ensure cached plans are marked as dependent on the calling role when
If a CTE, subquery, sublink, security invoker view, or coercion
The PostgreSQL Project thanks Wolfgang Walther for reporting this
+ Make libpq discard error messages
An error message received before encryption negotiation is completed
The PostgreSQL Project thanks Jacob Champion for reporting this
+ Fix unintended interactions between SET SESSION AUTHORIZATION
The SQL standard mandates that SET SESSION AUTHORIZATION have a
The PostgreSQL Project thanks Tom Lane for reporting this problem.
+ Prevent trusted PL/Perl code from changing environment variables
The ability to manipulate process environment variables such as PATH
The PostgreSQL Project thanks Coby Abrams for reporting this problem.
+ Restore functionality of ALTER {ROLE|DATABASE} SET
The fix for CVE-2024-10978 accidentally caused settings for role to
+ Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Mon, 25 Nov 2024 16:05:41 -0500 |
|||||||||||
Source diff to previous version | |||||||||||
|
Version: 16.4-0ubuntu0.24.04.2 | 2024-08-26 17:07:16 UTC |
---|---|
postgresql-16 (16.4-0ubuntu0.24.04.2) noble-proposed; urgency=medium * SRU: LP: #2076340: No-change rebuild to pick up changed build flags
-- Matthias Klose <email address hidden> Tue, 20 Aug 2024 12:27:30 +0200 |
|
Source diff to previous version |
Version: 16.4-0ubuntu0.24.04.1 | 2024-08-19 18:07:24 UTC | ||||
---|---|---|---|---|---|
postgresql-16 (16.4-0ubuntu0.24.04.1) noble-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 16.3, see
+ Prevent unauthorized code execution during pg_dump (Masahiko Sawada) An attacker able to create and drop non-temporary objects could inject
The PostgreSQL Project thanks Noah Misch for reporting this problem.
+ Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:13:57 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 16.3-0ubuntu0.24.04.1 | 2024-05-30 15:07:02 UTC | ||||
---|---|---|---|---|---|
postgresql-16 (16.3-0ubuntu0.24.04.1) noble-security; urgency=medium * New upstream version (LP: #2067388). + A dump/restore is not required for those running 16.X. + However, a security vulnerability was found in the system views
+ Also, if you are upgrading from a version earlier than 16.2, see
+ Restrict visibility of pg_stats_ext and pg_stats_ext_exprs entries
These views failed to hide statistics for expressions that involve
The PostgreSQL Project thanks Lukas Fittl for reporting this
By itself, this fix will only fix the behavior in newly initdb'd
- In each database of the cluster, run the
\i /usr/share/postgresql/16/fix-CVE-2024-4317.sql It will not hurt to run the script more than once. - Do not forget to include the template0 and template1 databases,
ALTER DATABASE template0 WITH ALLOW_CONNECTIONS true; and then after fixing template0, undo it with: ALTER DATABASE template0 WITH ALLOW_CONNECTIONS false; (CVE-2024-4317) + Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Wed, 29 May 2024 13:16:10 -0400 |
|||||
|