Package "libecpg-dev"
Name: | libecpg-dev |
Description: |
development files for ECPG (Embedded PostgreSQL for C) |
Latest version: | 12.20-0ubuntu0.20.04.1 |
Release: | focal (20.04) |
Level: | security |
Repository: | main |
Head package: | postgresql-12 |
Homepage: | http://www.postgresql.org/ |
Links
Download "libecpg-dev"
Other versions of "libecpg-dev" in Focal
Repository | Area | Version |
---|---|---|
base | main | 12.2-4 |
updates | main | 12.20-0ubuntu0.20.04.1 |
PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
PPA: Postgresql | 17.0-1.pgdg22.04+1 | |
PPA: Postgresql | 17.0-1.pgdg20.04+1 |
Changelog
Version: 12.20-0ubuntu0.20.04.1 | 2024-08-19 17:07:07 UTC | ||||
---|---|---|---|---|---|
postgresql-12 (12.20-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 12.X. + However, if you are upgrading from a version earlier than 12.18, see
+ Prevent unauthorized code execution during pg_dump (Masahiko Sawada) An attacker able to create and drop non-temporary objects could inject
The PostgreSQL Project thanks Noah Misch for reporting this problem.
+ Details about these and many further changes can be found at:
* d/postgresql-12.NEWS: Update. -- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:15:12 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 12.18-0ubuntu0.20.04.1 | 2024-02-26 14:06:58 UTC | ||||
---|---|---|---|---|---|
postgresql-12 (12.18-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2052850). + A dump/restore is not required for those running 12.X. + However, one bug was fixed that could have resulted in corruption of
+ Also, if you are upgrading from a version earlier than 12.17, see
+ Tighten security restrictions within REFRESH MATERIALIZED
One step of a concurrent refresh command was run under weak security
The only known exploit for this error does not work in PostgreSQL
The PostgreSQL Project thanks Pedro Gallegos for reporting this
+ Details about these and many further changes can be found at:
* d/postgresql-12.NEWS: Update. -- Athos Ribeiro <email address hidden> Thu, 15 Feb 2024 15:19:37 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 12.17-0ubuntu0.20.04.1 | 2023-12-06 17:06:54 UTC | ||
---|---|---|---|
postgresql-12 (12.17-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2040469). + A dump/restore is not required for those running 12.X. + However, if you use GiST indexes, it may be advisable to reindex them. + Also, if you are upgrading from a version earlier than 12.16, see
+ Fix handling of unknown-type arguments in DISTINCT "any" aggregate
This error led to a text-type value being interpreted as an unknown-type
+ Detect integer overflow while computing new array dimensions
When assigning new elements to array subscripts that are outside the
+ Prevent the <literal>pg_signal_backend</literal> role from
The documentation says that pg_signal_backend cannot issue signals to
Also ensure that the is_superuser parameter is set correctly in such
+ Fix misbehavior during recursive page split in GiST index build
Fix a case where the location of a page downlink was incorrectly
+ Details about these and many further changes can be found at:
* d/p/libpgport-pkglibdir: Adjust patch to reflect upstream changes. * d/p/50-per-version-dirs.patch: Adjust TestLib.pm's
-- Sergio Durigan Junior <email address hidden> Wed, 22 Nov 2023 21:50:50 -0500 |
|||
Source diff to previous version | |||
|
Version: 12.16-0ubuntu0.20.04.1 | 2023-08-17 14:06:57 UTC | ||||
---|---|---|---|---|---|
postgresql-12 (12.16-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2028426). + A dump/restore is not required for those running 12.X. + However, if you use BRIN indexes, it may be advisable to reindex them. + Also, if you are upgrading from a version earlier than 12.10, see
+ Disallow substituting a schema or owner name into an extension script
This restriction guards against SQL-injection hazards for trusted
+ Fix confusion between empty (no rows) ranges and all-NULL ranges in
Each of these oversights could result in forgetting that a BRIN
This fix will not in itself correct faulty BRIN entries.
+ Details about these and many further changes can be found at:
-- Sergio Durigan Junior <email address hidden> Thu, 11 May 2023 15:58:10 -0400 |
|||||
Source diff to previous version | |||||
|
Version: 12.15-0ubuntu0.20.04.1 | 2023-05-25 04:07:00 UTC | ||||||
---|---|---|---|---|---|---|---|
postgresql-12 (12.15-0ubuntu0.20.04.1) focal-security; urgency=medium * New upstream version (LP: #2019214). + A dump/restore is not required for those running 12.X. + Also, if you are upgrading from a version earlier than 12.10, see
+ Prevent CREATE SCHEMA from defeating changes in search_path
Within a CREATE SCHEMA command, objects in the prevailing
+ Enforce row-level security policies correctly after inlining a
If a set-returning SQL-language function refers to a table having
+ Details about these and many further changes can be found at:
-- Sergio Durigan Junior <email address hidden> Thu, 11 May 2023 15:58:10 -0400 |
|||||||
|