UbuntuUpdates.org

Latest Changelogs for all releases

All releases Bionic Focal Jammy Noble Plucky Questing
Include all PPAs Exclude daily builds PPAs Exclude all PPAs
Include levels: securityupdatesbackportsproposedbase

Note: Only updates for "head" packages where the changelog is available are shown on this page (view all).

nss Mar 4th 20:08
Release: jammy Repo: universe Level: updates New version: 2:3.98-0ubuntu0.22.04.3
Packages in group:  libnss3-tools

  nss (2:3.98-0ubuntu0.22.04.3) jammy-security; urgency=medium

  * SECURITY UPDATE: integer overflow in platform-independent ghash
    - debian/patches/CVE-2026-2781.patch: properly cast len in
      nss/lib/freebl/gcm.c.
    - CVE-2026-2781

 -- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:28:10 -0500

CVE-2026-2781 Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird

qemu Mar 4th 20:08
Release: jammy Repo: universe Level: security New version: 1:6.2+dfsg-2ubuntu6.28
Packages in group:  qemu-guest-agent qemu-system-x86-microvm qemu-system-x86-xen qemu-user qemu-user-binfmt qemu-user-static

  qemu (1:6.2+dfsg-2ubuntu6.28) jammy-security; urgency=medium

  * SECURITY UPDATE: denial-of-service
    - debian/patches/CVE-2024-8354-2.patch: don't assert for SETUP to non-0
      endpoint in hw/usb/hcd-uhci.
    - CVE-2024-8354
  * SECURITY UPDATE: use-after-free
    - debian/patches/CVE-2025-11234-1.patch: release active GSource in TLS
      channel finalizer in io/channel-tls.c.
    - debian/patches/CVE-2025-11234-2.patch: move websock resource release to
      close method in io/channel-websock.c.
    - debian/patches/CVE-2025-11234-3.patch: fix use after free in websocket
      handshake code in io/channel-websock.c.
    - CVE-2025-11234

 -- Fabian Toepfer <email address hidden> Tue, 03 Mar 2026 15:02:56 +0100

CVE-2024-8354 A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a U
CVE-2025-11234 A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to

nss Mar 4th 20:08
Release: jammy Repo: main Level: updates New version: 2:3.98-0ubuntu0.22.04.3
Packages in group:  libnss3 libnss3-dev

  nss (2:3.98-0ubuntu0.22.04.3) jammy-security; urgency=medium

  * SECURITY UPDATE: integer overflow in platform-independent ghash
    - debian/patches/CVE-2026-2781.patch: properly cast len in
      nss/lib/freebl/gcm.c.
    - CVE-2026-2781

 -- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:28:10 -0500

CVE-2026-2781 Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird

postgresql-14 Mar 4th 20:08
Release: jammy Repo: main Level: updates New version: 14.22-0ubuntu0.22.04.1
Packages in group:  libecpg6 libecpg-compat3 libecpg-dev libpgtypes3 libpq5 libpq-dev postgresql-client-14 postgresql-doc-14 postgresql-plperl-14 postgresql-plpython3-14 postgresql-pltcl-14 (... see all)

  postgresql-14 (14.22-0ubuntu0.22.04.1) jammy-security; urgency=medium

  * New upstream version (LP: #2127668).

    + This release encompasses changes from upstream's 14.21 and 14.22
      releases. The former contains fixes for 4 CVEs (among other things), and
      the latter was a hotfix for regressions introcuced in 14.21.

    + A dump/restore is not required for those running 14.X.

    + However, if you are upgrading from a version earlier than 14.19, see
      those release notes as well please.

    + Guard against unexpected dimensions of oidvector/int2vector (Tom Lane)

      These data types are expected to be 1-dimensional arrays containing no
      nulls, but there are cast pathways that permit violating those
      expectations. Add checks to some functions that were depending on those
      expectations without verifying them, and could misbehave in consequence.
      (CVE-2026-2003)

    + Harden selectivity estimators against being attached to operators that
      accept unexpected data types (Tom Lane)

      contrib/intarray contained a selectivity estimation function that could
      be abused for arbitrary code execution, because it did not check that
      its input was of the expected data type. Third-party extensions should
      check for similar hazards and add defenses using the technique intarray
      now uses. Since such extension fixes will take time, we now require
      superuser privilege to attach a non-built-in selectivity estimator to an
      operator. (CVE-2026-2004)

    + Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
      (Michael Paquier)

      Decrypting a crafted message with an overlength session key caused a
      buffer overrun, with consequences as bad as arbitrary code execution.
      (CVE-2026-2005)

    + Fix inadequate validation of multibyte character lengths (Thomas Munro,
      Noah Misch)

      Assorted bugs allowed an attacker able to issue crafted SQL to overrun
      string buffers, with consequences as bad as arbitrary code execution.
      After these fixes, applications may observe “invalid byte sequence for
      encoding” errors when string functions process invalid text that has
      been stored in the database. (CVE-2026-2006)

    + Details about these and many further changes can be found at:
      https://www.postgresql.org/docs/14/release-14-21.html and
      https://www.postgresql.org/docs/14/release-14-22.html.

  * d/postgresql-14.NEWS: Update.

 -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:13:13 -0300

(See more...)
2127668 New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9
CVE-2026-2003 Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili
CVE-2026-2004 Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod
CVE-2026-2005 Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.
CVE-2026-2006 Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe

qemu Mar 4th 20:08
Release: jammy Repo: main Level: security New version: 1:6.2+dfsg-2ubuntu6.28
Packages in group:  qemu-block-extra qemu-system qemu-system-arm qemu-system-common qemu-system-data qemu-system-gui qemu-system-mips qemu-system-misc qemu-system-ppc qemu-system-s390x qemu-system-sparc (... see all)

  qemu (1:6.2+dfsg-2ubuntu6.28) jammy-security; urgency=medium

  * SECURITY UPDATE: denial-of-service
    - debian/patches/CVE-2024-8354-2.patch: don't assert for SETUP to non-0
      endpoint in hw/usb/hcd-uhci.
    - CVE-2024-8354
  * SECURITY UPDATE: use-after-free
    - debian/patches/CVE-2025-11234-1.patch: release active GSource in TLS
      channel finalizer in io/channel-tls.c.
    - debian/patches/CVE-2025-11234-2.patch: move websock resource release to
      close method in io/channel-websock.c.
    - debian/patches/CVE-2025-11234-3.patch: fix use after free in websocket
      handshake code in io/channel-websock.c.
    - CVE-2025-11234

 -- Fabian Toepfer <email address hidden> Tue, 03 Mar 2026 15:02:56 +0100

CVE-2024-8354 A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a U
CVE-2025-11234 A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to

postgresql-17 Mar 4th 15:08
Release: questing Repo: universe Level: security New version: 17.9-0ubuntu0.25.10.1
Packages in group:  postgresql-server-dev-17

  postgresql-17 (17.9-0ubuntu0.25.10.1) questing-security; urgency=medium

  * New upstream version (LP: #2127668).

    + This release encompasses changes from upstream's 17.8 and 17.9
      releases. The former contains fixes for 4 CVEs (among other things), and
      the latter was a hotfix for regressions introcuced in 17.8.

    + A dump/restore is not required for those running 17.X.

    + However, if you are upgrading from a version earlier than 17.6, see
      those release notes as well please.

    + Guard against unexpected dimensions of oidvector/int2vector (Tom Lane)

      These data types are expected to be 1-dimensional arrays containing no
      nulls, but there are cast pathways that permit violating those
      expectations. Add checks to some functions that were depending on those
      expectations without verifying them, and could misbehave in consequence.
      (CVE-2026-2003)

    + Harden selectivity estimators against being attached to operators that
      accept unexpected data types (Tom Lane)

      contrib/intarray contained a selectivity estimation function that could
      be abused for arbitrary code execution, because it did not check that
      its input was of the expected data type. Third-party extensions should
      check for similar hazards and add defenses using the technique intarray
      now uses. Since such extension fixes will take time, we now require
      superuser privilege to attach a non-built-in selectivity estimator to an
      operator. (CVE-2026-2004)

    + Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
      (Michael Paquier)

      Decrypting a crafted message with an overlength session key caused a
      buffer overrun, with consequences as bad as arbitrary code execution.
      (CVE-2026-2005)

    + Fix inadequate validation of multibyte character lengths (Thomas Munro,
      Noah Misch)

      Assorted bugs allowed an attacker able to issue crafted SQL to overrun
      string buffers, with consequences as bad as arbitrary code execution.
      After these fixes, applications may observe “invalid byte sequence for
      encoding” errors when string functions process invalid text that has
      been stored in the database. (CVE-2026-2006)

    + Details about these and many further changes can be found at:
      https://www.postgresql.org/docs/17/release-17-8.html and
      https://www.postgresql.org/docs/17/release-17-9.html.

  * d/postgresql-17.NEWS: Update.

 -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:11:37 -0300

(See more...)
2127668 New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9
CVE-2026-2003 Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili
CVE-2026-2004 Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod
CVE-2026-2005 Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.
CVE-2026-2006 Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe

nss Mar 4th 15:08
Release: questing Repo: main Level: security New version: 2:3.114-1ubuntu0.1
Packages in group:  libnss3 libnss3-dev libnss3-tools

  nss (2:3.114-1ubuntu0.1) questing-security; urgency=medium

  * SECURITY UPDATE: integer overflow in platform-independent ghash
    - debian/patches/CVE-2026-2781.patch: properly cast len in
      nss/lib/freebl/gcm.c.
    - CVE-2026-2781

 -- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:27:13 -0500

CVE-2026-2781 Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird

postgresql-17 Mar 4th 15:08
Release: questing Repo: main Level: security New version: 17.9-0ubuntu0.25.10.1
Packages in group:  libecpg6 libecpg-compat3 libecpg-dev libpgtypes3 libpq5 libpq-dev postgresql-client-17 postgresql-doc-17 postgresql-plperl-17 postgresql-plpython3-17 postgresql-pltcl-17 (... see all)

  postgresql-17 (17.9-0ubuntu0.25.10.1) questing-security; urgency=medium

  * New upstream version (LP: #2127668).

    + This release encompasses changes from upstream's 17.8 and 17.9
      releases. The former contains fixes for 4 CVEs (among other things), and
      the latter was a hotfix for regressions introcuced in 17.8.

    + A dump/restore is not required for those running 17.X.

    + However, if you are upgrading from a version earlier than 17.6, see
      those release notes as well please.

    + Guard against unexpected dimensions of oidvector/int2vector (Tom Lane)

      These data types are expected to be 1-dimensional arrays containing no
      nulls, but there are cast pathways that permit violating those
      expectations. Add checks to some functions that were depending on those
      expectations without verifying them, and could misbehave in consequence.
      (CVE-2026-2003)

    + Harden selectivity estimators against being attached to operators that
      accept unexpected data types (Tom Lane)

      contrib/intarray contained a selectivity estimation function that could
      be abused for arbitrary code execution, because it did not check that
      its input was of the expected data type. Third-party extensions should
      check for similar hazards and add defenses using the technique intarray
      now uses. Since such extension fixes will take time, we now require
      superuser privilege to attach a non-built-in selectivity estimator to an
      operator. (CVE-2026-2004)

    + Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
      (Michael Paquier)

      Decrypting a crafted message with an overlength session key caused a
      buffer overrun, with consequences as bad as arbitrary code execution.
      (CVE-2026-2005)

    + Fix inadequate validation of multibyte character lengths (Thomas Munro,
      Noah Misch)

      Assorted bugs allowed an attacker able to issue crafted SQL to overrun
      string buffers, with consequences as bad as arbitrary code execution.
      After these fixes, applications may observe “invalid byte sequence for
      encoding” errors when string functions process invalid text that has
      been stored in the database. (CVE-2026-2006)

    + Details about these and many further changes can be found at:
      https://www.postgresql.org/docs/17/release-17-8.html and
      https://www.postgresql.org/docs/17/release-17-9.html.

  * d/postgresql-17.NEWS: Update.

 -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:11:37 -0300

(See more...)
2127668 New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9
CVE-2026-2003 Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili
CVE-2026-2004 Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod
CVE-2026-2005 Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.
CVE-2026-2006 Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe

postgresql-16 Mar 4th 15:08
Release: noble Repo: universe Level: security New version: 16.13-0ubuntu0.24.04.1
Packages in group:  postgresql-server-dev-16

  postgresql-16 (16.13-0ubuntu0.24.04.1) noble-security; urgency=medium

  * New upstream version (LP: #2127668).

    + This release encompasses changes from upstream's 16.12 and 16.13
      releases. The former contains fixes for 4 CVEs (among other things), and
      the latter was a hotfix for regressions introcuced in 16.12.

    + A dump/restore is not required for those running 16.X.

    + However, if you are upgrading from a version earlier than 16.10, see
      those release notes as well please.

    + Guard against unexpected dimensions of oidvector/int2vector (Tom Lane)

      These data types are expected to be 1-dimensional arrays containing no
      nulls, but there are cast pathways that permit violating those
      expectations. Add checks to some functions that were depending on those
      expectations without verifying them, and could misbehave in consequence.
      (CVE-2026-2003)

    + Harden selectivity estimators against being attached to operators that
      accept unexpected data types (Tom Lane)

      contrib/intarray contained a selectivity estimation function that could
      be abused for arbitrary code execution, because it did not check that
      its input was of the expected data type. Third-party extensions should
      check for similar hazards and add defenses using the technique intarray
      now uses. Since such extension fixes will take time, we now require
      superuser privilege to attach a non-built-in selectivity estimator to an
      operator. (CVE-2026-2004)

    + Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
      (Michael Paquier)

      Decrypting a crafted message with an overlength session key caused a
      buffer overrun, with consequences as bad as arbitrary code execution.
      (CVE-2026-2005)

    + Fix inadequate validation of multibyte character lengths (Thomas Munro,
      Noah Misch)

      Assorted bugs allowed an attacker able to issue crafted SQL to overrun
      string buffers, with consequences as bad as arbitrary code execution.
      After these fixes, applications may observe “invalid byte sequence for
      encoding” errors when string functions process invalid text that has
      been stored in the database. (CVE-2026-2006)

    + Details about these and many further changes can be found at:
      https://www.postgresql.org/docs/16/release-16-12.html and
      https://www.postgresql.org/docs/16/release-16-13.html.

  * d/postgresql-16.NEWS: Update.

 -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:12:24 -0300

(See more...)
2127668 New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9
CVE-2026-2003 Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili
CVE-2026-2004 Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod
CVE-2026-2005 Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.
CVE-2026-2006 Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe

nss Mar 4th 15:08
Release: noble Repo: main Level: security New version: 2:3.98-1ubuntu0.1
Packages in group:  libnss3 libnss3-dev libnss3-tools

  nss (2:3.98-1ubuntu0.1) noble-security; urgency=medium

  * SECURITY UPDATE: integer overflow in platform-independent ghash
    - debian/patches/CVE-2026-2781.patch: properly cast len in
      nss/lib/freebl/gcm.c.
    - CVE-2026-2781

 -- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:27:34 -0500

CVE-2026-2781 Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird

postgresql-16 Mar 4th 15:08
Release: noble Repo: main Level: security New version: 16.13-0ubuntu0.24.04.1
Packages in group:  libecpg6 libecpg-compat3 libecpg-dev libpgtypes3 libpq5 libpq-dev postgresql-client-16 postgresql-doc-16 postgresql-plperl-16 postgresql-plpython3-16 postgresql-pltcl-16 (... see all)

  postgresql-16 (16.13-0ubuntu0.24.04.1) noble-security; urgency=medium

  * New upstream version (LP: #2127668).

    + This release encompasses changes from upstream's 16.12 and 16.13
      releases. The former contains fixes for 4 CVEs (among other things), and
      the latter was a hotfix for regressions introcuced in 16.12.

    + A dump/restore is not required for those running 16.X.

    + However, if you are upgrading from a version earlier than 16.10, see
      those release notes as well please.

    + Guard against unexpected dimensions of oidvector/int2vector (Tom Lane)

      These data types are expected to be 1-dimensional arrays containing no
      nulls, but there are cast pathways that permit violating those
      expectations. Add checks to some functions that were depending on those
      expectations without verifying them, and could misbehave in consequence.
      (CVE-2026-2003)

    + Harden selectivity estimators against being attached to operators that
      accept unexpected data types (Tom Lane)

      contrib/intarray contained a selectivity estimation function that could
      be abused for arbitrary code execution, because it did not check that
      its input was of the expected data type. Third-party extensions should
      check for similar hazards and add defenses using the technique intarray
      now uses. Since such extension fixes will take time, we now require
      superuser privilege to attach a non-built-in selectivity estimator to an
      operator. (CVE-2026-2004)

    + Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
      (Michael Paquier)

      Decrypting a crafted message with an overlength session key caused a
      buffer overrun, with consequences as bad as arbitrary code execution.
      (CVE-2026-2005)

    + Fix inadequate validation of multibyte character lengths (Thomas Munro,
      Noah Misch)

      Assorted bugs allowed an attacker able to issue crafted SQL to overrun
      string buffers, with consequences as bad as arbitrary code execution.
      After these fixes, applications may observe “invalid byte sequence for
      encoding” errors when string functions process invalid text that has
      been stored in the database. (CVE-2026-2006)

    + Details about these and many further changes can be found at:
      https://www.postgresql.org/docs/16/release-16-12.html and
      https://www.postgresql.org/docs/16/release-16-13.html.

  * d/postgresql-16.NEWS: Update.

 -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:12:24 -0300

(See more...)
2127668 New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9
CVE-2026-2003 Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili
CVE-2026-2004 Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod
CVE-2026-2005 Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.
CVE-2026-2006 Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe

postgresql-14 Mar 4th 15:08
Release: jammy Repo: universe Level: security New version: 14.22-0ubuntu0.22.04.1
Packages in group:  postgresql-server-dev-14

  postgresql-14 (14.22-0ubuntu0.22.04.1) jammy-security; urgency=medium

  * New upstream version (LP: #2127668).

    + This release encompasses changes from upstream's 14.21 and 14.22
      releases. The former contains fixes for 4 CVEs (among other things), and
      the latter was a hotfix for regressions introcuced in 14.21.

    + A dump/restore is not required for those running 14.X.

    + However, if you are upgrading from a version earlier than 14.19, see
      those release notes as well please.

    + Guard against unexpected dimensions of oidvector/int2vector (Tom Lane)

      These data types are expected to be 1-dimensional arrays containing no
      nulls, but there are cast pathways that permit violating those
      expectations. Add checks to some functions that were depending on those
      expectations without verifying them, and could misbehave in consequence.
      (CVE-2026-2003)

    + Harden selectivity estimators against being attached to operators that
      accept unexpected data types (Tom Lane)

      contrib/intarray contained a selectivity estimation function that could
      be abused for arbitrary code execution, because it did not check that
      its input was of the expected data type. Third-party extensions should
      check for similar hazards and add defenses using the technique intarray
      now uses. Since such extension fixes will take time, we now require
      superuser privilege to attach a non-built-in selectivity estimator to an
      operator. (CVE-2026-2004)

    + Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
      (Michael Paquier)

      Decrypting a crafted message with an overlength session key caused a
      buffer overrun, with consequences as bad as arbitrary code execution.
      (CVE-2026-2005)

    + Fix inadequate validation of multibyte character lengths (Thomas Munro,
      Noah Misch)

      Assorted bugs allowed an attacker able to issue crafted SQL to overrun
      string buffers, with consequences as bad as arbitrary code execution.
      After these fixes, applications may observe “invalid byte sequence for
      encoding” errors when string functions process invalid text that has
      been stored in the database. (CVE-2026-2006)

    + Details about these and many further changes can be found at:
      https://www.postgresql.org/docs/14/release-14-21.html and
      https://www.postgresql.org/docs/14/release-14-22.html.

  * d/postgresql-14.NEWS: Update.

 -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:13:13 -0300

(See more...)
2127668 New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9
CVE-2026-2003 Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili
CVE-2026-2004 Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod
CVE-2026-2005 Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.
CVE-2026-2006 Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe

nss Mar 4th 15:08
Release: jammy Repo: universe Level: security New version: 2:3.98-0ubuntu0.22.04.3
Packages in group:  libnss3-tools

  nss (2:3.98-0ubuntu0.22.04.3) jammy-security; urgency=medium

  * SECURITY UPDATE: integer overflow in platform-independent ghash
    - debian/patches/CVE-2026-2781.patch: properly cast len in
      nss/lib/freebl/gcm.c.
    - CVE-2026-2781

 -- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:28:10 -0500

CVE-2026-2781 Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird

linux-signed-azure-fde Mar 4th 15:08
Release: jammy Repo: main Level: security New version: 5.15.0-1102.111.1
Packages in group:  linux-image-5.15.0-1019-azure-fde linux-image-5.15.0-1024-azure-fde linux-image-5.15.0-1029-azure-fde linux-image-5.15.0-1030-azure-fde linux-image-5.15.0-1031-azure-fde linux-image-5.15.0-1033-azure-fde linux-image-5.15.0-1034-azure-fde linux-image-5.15.0-1035-azure-fde linux-image-5.15.0-1036-azure-fde linux-image-5.15.0-1037-azure-fde linux-image-5.15.0-1038-azure-fde (... see all)

  linux-signed-azure-fde (5.15.0-1102.111.1) jammy; urgency=medium

  * Master version: 5.15.0-1102.111.1

 -- John Cabaj <email address hidden> Fri, 21 Nov 2025 16:30:32 -0600


linux-meta-azure-fde Mar 4th 15:08
Release: jammy Repo: main Level: security New version: 5.15.0.1102.111.78
Packages in group:  linux-azure-fde-5.15 linux-azure-fde-lts-22.04 linux-cloud-tools-azure-fde-5.15 linux-cloud-tools-azure-fde-lts-22.04 linux-headers-azure-fde-5.15 linux-headers-azure-fde-lts-22.04 linux-image-azure-fde-5.15 linux-image-azure-fde-lts-22.04 linux-modules-extra-azure-fde-5.15 linux-modules-extra-azure-fde-lts-22.04 linux-tools-azure-fde-5.15 (... see all)

  linux-meta-azure-fde (5.15.0.1102.111.78) jammy; urgency=medium

  * Bump ABI 5.15.0-1102.111

 -- John Cabaj <email address hidden> Fri, 21 Nov 2025 16:30:18 -0600




About   -   Send Feedback to @ubuntu_updates