Package "postgresql-16"
Name: | postgresql-16 |
Description: |
The World's Most Advanced Open Source Relational Database |
Latest version: | 16.8-0ubuntu0.24.10.1 |
Release: | oracular (24.10) |
Level: | security |
Repository: | main |
Homepage: | http://www.postgresql.org/ |
Links
Download "postgresql-16"
Other versions of "postgresql-16" in Oracular
Repository | Area | Version |
---|---|---|
base | universe | 16.4-1build1 |
base | main | 16.4-1build1 |
security | universe | 16.8-0ubuntu0.24.10.1 |
updates | main | 16.8-0ubuntu0.24.10.1 |
updates | universe | 16.8-0ubuntu0.24.10.1 |
PPA: Postgresql | 16.8-1.pgdg22.04+1 | |
PPA: Postgresql | 16.8-1.pgdg20.04+1 |
Packages in group
Deleted packages are displayed in grey.
- libecpg-compat3
- libecpg-dev
- libecpg6
- libpgtypes3
- libpq-dev
- libpq5
- postgresql-client-16
- postgresql-doc-16
- postgresql-plperl-16
- postgresql-plpython3-16
- postgresql-pltcl-16
Changelog
Version: 16.8-0ubuntu0.24.10.1 | 2025-03-03 17:07:05 UTC | ||||
---|---|---|---|---|---|
postgresql-16 (16.8-0ubuntu0.24.10.1) oracular-security; urgency=medium * New upstream version (LP: #2099900). + This release encompasses changes from upstream's 16.7 and 16.8
+ A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 16.5, see
+ Harden PQescapeString and allied functions against invalidly-encoded
Data-quoting functions supplied by libpq now fully check the encoding
The purpose of this change is to guard against SQL-injection attacks
This fix is effective only if the data-quoting function, the server, and
Applications and drivers that quote untrusted input without using these
The PostgreSQL Project thanks Stephen Fewer for reporting this problem.
+ Improve behavior of libpq's quoting functions (Andres Freund, Tom Lane) The changes made for CVE-2025-1094 had one serious oversight:
In addition, modify all these quoting functions so that when invalid
+ Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Athos Ribeiro <email address hidden> Mon, 24 Feb 2025 12:03:16 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 16.6-0ubuntu0.24.10.1 | 2024-12-02 15:07:10 UTC | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
postgresql-16 (16.6-0ubuntu0.24.10.1) oracular-security; urgency=medium * New upstream version (LP: #2085196). + This release encompasses changes from upstream's 16.5 and 16.6
+ A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 16.3, see
+ Ensure cached plans are marked as dependent on the calling role when
If a CTE, subquery, sublink, security invoker view, or coercion
The PostgreSQL Project thanks Wolfgang Walther for reporting this
+ Make libpq discard error messages
An error message received before encryption negotiation is completed
The PostgreSQL Project thanks Jacob Champion for reporting this
+ Fix unintended interactions between SET SESSION AUTHORIZATION
The SQL standard mandates that SET SESSION AUTHORIZATION have a
The PostgreSQL Project thanks Tom Lane for reporting this problem.
+ Prevent trusted PL/Perl code from changing environment variables
The ability to manipulate process environment variables such as PATH
The PostgreSQL Project thanks Coby Abrams for reporting this problem.
+ Restore functionality of ALTER {ROLE|DATABASE} SET
The fix for CVE-2024-10978 accidentally caused settings for role to
+ Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Create. -- Sergio Durigan Junior <email address hidden> Mon, 25 Nov 2024 16:05:41 -0500 |
|||||||||||
|