EDB Postgres Advanced Server 15.4.0 release notes v16
Released: 21 Aug 2023
Updated: 30 Aug 2023
Upgrading
Once you have upgraded to this version of EDB Postgres Advanced Server, you will need to run edb_sqlpatch
on all your databases to complete the upgrade. This application will check that your databases system objects are up to date with this version. See the EDB SQL Patch documentation for more information on how to deploy this tool.
After applying patches
Users making use of the UTL_MAIL package now require EXECUTE permission on the UTL_SMTP and UTL_TCP packages in addition to EXECUTE permission on UTL_MAIL.
Users making use of the UTL_SMTP package now require EXECUTE permission on the UTL_TCP packages in addition to EXECUTE permission on UTL_SMTP.
EDB Postgres Advanced Server 15.4.0 includes the following enhancements and bug fixes:
Type | Description | Addresses | |
---|---|---|---|
Upstream merge | Merged with community PostgreSQL 15.4. See the PostgreSQL 15 Release Notes for more information. | ||
Security fix | EDB Postgres Advanced Server (EPAS) SECURITY DEFINER functions and procedures may be hijacked via search_path. | CVE-2023-XXXXX-1 | 11+ |
Security fix | EDB Postgres Advanced Server (EPAS) dbms_aq helper function may run arbitrary SQL as a superuser. | CVE-2023-XXXXX-2 | 11+ |
Security fix | EDB Postgres Advanced Server (EPAS) permissions bypass via accesshistory() | CVE-2023-XXXXX-3 | 11+ |
Security fix | EDB Postgres Advanced Server (EPAS) UTL_FILE permission bypass | CVE-2023-XXXXX-4 | 11+ |
Security fix | EDB Postgres Advanced Server (EPAS) permission bypass for materialized views | CVE-2023-XXXXX-5 | 11+ |
Security fix | EDB Postgres Advanced Server (EPAS) authenticated users may fetch any URL | CVE-2023-XXXXX-6 | 11+ |
Security fix | EDB Postgres Advanced Server (EPAS) permission bypass for large objects | CVE-2023-XXXXX-7 | 11+ |
Security fix | EDB Postgres Advanced Server (EPAS) DBMS_PROFILER data may be removed without permission | CVE-2023-XXXXX-8 | 11+ |
Bug fix | Allowed subtypes in INDEX BY clause of the packaged collection. | #1371 | 11+ |
Bug fix | Fixed %type resolution when pointing to a packaged type field. | #1243 | 11+ |
Bug fix | Profile: Fixed upgrade when REUSE constraints were ENABLED /DISABLED . | #92739 | 11+ |
Bug fix | Set correct collation for packaged cursor parameters. | #92739 | 11+ |
Bug fix | Rolled back autonomous transaction creating pg_temp in case of error. | #91614 | 11+ |
Bug fix | Added checks to ensure required WAL logging in EXCHANGE PARTITION command. | 13+ | |
Bug fix | Dumped/restored the sequences created for GENERATED AS IDENTITY constraint. | #90658 | 14+ |
Bug fix | Skipped updating the last DDL time for the parent table in CREATE INDEX. | #91270 | 14+ |
Bug fix | Removed existing package private procedure or function entries from the edb_last_ddl_time while replacing the package body. | 14+ | |
Bug fix | Fixed libpq to allow multiple PQprepare() calls under the same transaction. | #94735 | 14+ |
Bug fix | Fixed a memory leak experienced when using EDB Postgres Distributed (PGD) with Transparent Data Encryption (TDE). | #93936 |
Addresses
Entries in the Addresses column are either CVE numbers or, if preceded by #, a customer case number.