Package "libpq-dev"
Name: | libpq-dev |
Description: |
header files for libpq5 (PostgreSQL library) |
Latest version: | 14.19-0ubuntu0.22.04.1 |
Release: | jammy (22.04) |
Level: | security |
Repository: | main |
Head package: | postgresql-14 |
Homepage: | http://www.postgresql.org/ |
Links
Download "libpq-dev"
Other versions of "libpq-dev" in Jammy
Repository | Area | Version |
---|---|---|
base | main | 14.2-1ubuntu1 |
updates | main | 14.19-0ubuntu0.22.04.1 |
PPA: Postgresql | 17.6-1.pgdg22.04+1 | |
PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
PPA: Postgresql | 17.5-1.pgdg20.04+1 |
Changelog
Version: 14.19-0ubuntu0.22.04.1 | 2025-09-08 15:07:00 UTC | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
postgresql-14 (14.19-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2112531). + A dump/restore is not required for those running 14.X. + However, if you have any BRIN numeric_minmax_multi_ops indexes, it is
+ Also, if you are upgrading from a version earlier than 14.18, see those
+ Tighten security checks in planner estimation functions (Dean Rasheed) The fix for CVE-2017-7484, plus followup fixes, intended to prevent
The other gap applies to cases where the query accesses a table via a
+ Prevent pg_dump scripts from being used to attack the user running the
Since dump/restore operations typically involve running SQL commands as
To provide a positive guarantee that this can't happen, extend psql with
+ Convert newlines to spaces in names included in comments in pg_dump
Object names containing newlines offered the ability to inject arbitrary
+ Fix incorrect distance calculation in BRIN numeric_minmax_multi_ops
The results were sometimes wrong on 64-bit platforms, and wildly wrong
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Mon, 25 Aug 2025 22:04:43 -0300 |
|||||||||||||
Source diff to previous version | |||||||||||||
|
Version: 14.18-0ubuntu0.22.04.1 | 2025-05-20 23:07:06 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.18-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2110377). + A dump/restore is not required for those running 14.X. + However, if you have any self-referential foreign key constraints on
+ Also, if you have any BRIN bloom indexes, it may be advisable to reindex
+ Also, if you are upgrading from a version earlier than 14.14, see those
+ Avoid one-byte buffer overread when examining invalidly-encoded strings
While unlikely, a SIGSEGV crash could occur if an incomplete multibyte
+ Handle self-referential foreign keys on partitioned tables correctly
Creating or attaching partitions failed to make the required catalog
To fix this, you should drop and recreate any self-referential foreign
+ Avoid data loss when merging compressed BRIN summaries in
The code failed to account for decompression results not being identical
This mistake was present back to v14 where BRIN bloom indexes were
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Sun, 11 May 2025 06:15:54 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 14.17-0ubuntu0.22.04.1 | 2025-03-03 17:06:57 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.17-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2099900). + This release encompasses changes from upstream's 14.16 and 14.17
+ A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.14, see
+ Harden PQescapeString and allied functions against invalidly-encoded
Data-quoting functions supplied by libpq now fully check the encoding
The purpose of this change is to guard against SQL-injection attacks
This fix is effective only if the data-quoting function, the server, and
Applications and drivers that quote untrusted input without using these
The PostgreSQL Project thanks Stephen Fewer for reporting this problem.
+ Improve behavior of libpq's quoting functions (Andres Freund, Tom Lane) The changes made for CVE-2025-1094 had one serious oversight:
In addition, modify all these quoting functions so that when invalid
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Mon, 24 Feb 2025 13:09:01 -0300 |
|||||
Source diff to previous version | |||||
|
Version: 14.15-0ubuntu0.22.04.1 | 2024-12-02 15:06:57 UTC | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
postgresql-14 (14.15-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2085196). + This release encompasses changes from upstream's 14.14 and 14.15
+ A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.12, see
+ Ensure cached plans are marked as dependent on the calling role when
If a CTE, subquery, sublink, security invoker view, or coercion
The PostgreSQL Project thanks Wolfgang Walther for reporting this
+ Make libpq discard error messages
An error message received before encryption negotiation is completed
The PostgreSQL Project thanks Jacob Champion for reporting this
+ Fix unintended interactions between SET SESSION AUTHORIZATION
The SQL standard mandates that SET SESSION AUTHORIZATION have a
The PostgreSQL Project thanks Tom Lane for reporting this problem.
+ Prevent trusted PL/Perl code from changing environment variables
The ability to manipulate process environment variables such as PATH
The PostgreSQL Project thanks Coby Abrams for reporting this problem.
+ Restore functionality of ALTER {ROLE|DATABASE} SET
The fix for CVE-2024-10978 accidentally caused settings for role to
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Sergio Durigan Junior <email address hidden> Mon, 25 Nov 2024 16:05:41 -0500 |
|||||||||||
Source diff to previous version | |||||||||||
|
Version: 14.13-0ubuntu0.22.04.1 | 2024-08-19 17:07:09 UTC | ||||
---|---|---|---|---|---|
postgresql-14 (14.13-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2076183). + A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.12, see
+ Prevent unauthorized code execution during pg_dump (Masahiko Sawada) An attacker able to create and drop non-temporary objects could inject
The PostgreSQL Project thanks Noah Misch for reporting this problem.
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update.
-- Athos Ribeiro <email address hidden> Tue, 06 Aug 2024 15:14:44 -0300 |
|||||
|