Package "libecpg-dev"
| Name: | libecpg-dev |
Description: |
development files for ECPG (Embedded PostgreSQL for C) |
| Latest version: | 18.4-0ubuntu0.26.04.1 |
| Release: | resolute (26.04) |
| Level: | updates |
| Repository: | main |
| Head package: | postgresql-18 |
| Homepage: | http://www.postgresql.org/ |
Links
Download "libecpg-dev"
Other versions of "libecpg-dev" in Resolute
| Repository | Area | Version |
|---|---|---|
| base | main | 18.3-1 |
| security | main | 18.4-0ubuntu0.26.04.1 |
| PPA: Postgresql | 9.4.1-1.pgdg10.4+1 | |
| PPA: Postgresql | 9.6.3-1.pgdg12.4+1 | |
| PPA: Postgresql | 11.3-1.pgdg14.04+1 | |
| PPA: Postgresql | 13.3-1.pgdg16.04+1 | |
| PPA: Postgresql | 15.3-1.pgdg18.04+1 | |
| PPA: Postgresql | 17.5-1.pgdg20.04+1 | |
| PPA: Postgresql | 18.4-1.pgdg22.04+1 | |
Changelog
| Version: 18.4-0ubuntu0.26.04.1 | 2026-05-21 23:07:41 UTC | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
postgresql-18 (18.4-0ubuntu0.26.04.1) resolute-security; urgency=medium * New upstream version (LP: #2152636). + A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 18.2, see
+ Prevent unbounded recursion while processing startup packets A malicious client could crash the connected backend by alternating
+ Fix assorted integer overflows in memory-allocation calculations Various places were incautious about the possibility of integer overflow
+ Properly quote subscription names in pg_createsubscriber The given subscription name was inserted into SQL commands without
+ Properly quote object names in logical replication origin checks ALTER SUBSCRIPTION ... REFRESH PUBLICATION interpolated schema and
+ Reject over-length options in ts_headline() The StartSel, StopSel and FragmentDelimiter strings must not exceed 32Kb
+ Detect faulty input when restoring attribute MCV statistics The statistics restore functions were insufficiently careful about
+ Guard against malicious time zone names in timeofday() and pg_strftime() A crafted time zone setting could pass % sequences to snprintf(),
+ When creating a multirange type, ensure the user has CREATE privilege on
The multirange type can be put into a different schema than its parent
+ Use timing-safe string comparisons in authentication code Use timingsafe_bcmp() instead of memcpy() or strcmp() when checking
+ Mark PQfn() as unsafe, and avoid using it within libpq For a non-integral result type, PQfn() is not passed the size of the
+ Prevent path traversal in pg_basebackup and pg_rewind These applications failed to validate output file paths read from their
+ Guard against field overflow within contrib/intarray's query_int type
Parsing of these query structures did not check for overflow of 16-bit
+ Guard against overly long values of contrib/ltree's lquery type Values with more than 64K items caused internal overflows, potentially
+ Prevent SQL injection and buffer overruns in contrib/spi check_foreign_key() was insufficiently careful about quoting key values,
+ Details about these and many further changes can be found at:
* d/postgresql-18.NEWS: add NEWS file. -- Athos Ribeiro <email address hidden> Fri, 15 May 2026 05:16:50 -0300 |
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||