The new versions fix 75 bugs and fix the vulnerability
(CVE-2020-1720) caused by a missing authorization check when running the "ALTER ... DEPENDS ON EXTENSION" command. Under certain circumstances, the vulnerability allows an unprivileged user to remove any function, procedure, materialized view, index, or trigger. The attack is possible if the administrator has installed any extension, and the user can issue a CREATE command, or the owner of the extension can be persuaded to issue a DROP EXTENSION command.
Additionally, we can note the emergence of a new application
- Support for any type of target tables (views, fdw (Foreign Data Wrapper), sharded tables, distributed citus tables);
- Ability to redefine table names (replication from one table to another);
- Support for bidirectional replication through the transfer of only local changes, ignoring replications coming from outside;
- Availability of a conflict resolution system based on the LWW (last-writer-win) algorithm;
- The ability to store information about the progress of replication and unused replicas in a separate table that can be used for recovery after the resumption of work of a temporarily unavailable receiving node.
Source: opennet.ru