Latest Changelogs for all releases
Note: Only updates for "head" packages where the changelog is available are shown on this page (view all).
| nss | Mar 4th 20:08 | ||
|---|---|---|---|
| Release: jammy | Repo: universe | Level: updates | New version: 2:3.98-0ubuntu0.22.04.3 |
| Packages in group: | libnss3-tools | ||
|
nss (2:3.98-0ubuntu0.22.04.3) jammy-security; urgency=medium * SECURITY UPDATE: integer overflow in platform-independent ghash
-- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:28:10 -0500 |
|||
| CVE-2026-2781 | Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird | ||
| qemu | Mar 4th 20:08 | ||
|---|---|---|---|
| Release: jammy | Repo: universe | Level: security | New version: 1:6.2+dfsg-2ubuntu6.28 |
| Packages in group: | qemu-guest-agent qemu-system-x86-microvm qemu-system-x86-xen qemu-user qemu-user-binfmt qemu-user-static | ||
|
qemu (1:6.2+dfsg-2ubuntu6.28) jammy-security; urgency=medium * SECURITY UPDATE: denial-of-service
-- Fabian Toepfer <email address hidden> Tue, 03 Mar 2026 15:02:56 +0100 |
|||
| CVE-2024-8354 | A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a U | ||
| CVE-2025-11234 | A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to | ||
| nss | Mar 4th 20:08 | ||
|---|---|---|---|
| Release: jammy | Repo: main | Level: updates | New version: 2:3.98-0ubuntu0.22.04.3 |
| Packages in group: | libnss3 libnss3-dev | ||
|
nss (2:3.98-0ubuntu0.22.04.3) jammy-security; urgency=medium * SECURITY UPDATE: integer overflow in platform-independent ghash
-- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:28:10 -0500 |
|||
| CVE-2026-2781 | Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird | ||
| postgresql-14 | Mar 4th 20:08 | ||
|---|---|---|---|
| Release: jammy | Repo: main | Level: updates | New version: 14.22-0ubuntu0.22.04.1 |
| Packages in group: | libecpg6 libecpg-compat3 libecpg-dev libpgtypes3 libpq5 libpq-dev postgresql-client-14 postgresql-doc-14 postgresql-plperl-14 postgresql-plpython3-14 postgresql-pltcl-14 (... see all) | ||
|
postgresql-14 (14.22-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2127668). + This release encompasses changes from upstream's 14.21 and 14.22
+ A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.19, see
+ Guard against unexpected dimensions of oidvector/int2vector (Tom Lane) These data types are expected to be 1-dimensional arrays containing no
+ Harden selectivity estimators against being attached to operators that
contrib/intarray contained a selectivity estimation function that could
+ Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
Decrypting a crafted message with an overlength session key caused a
+ Fix inadequate validation of multibyte character lengths (Thomas Munro,
Assorted bugs allowed an attacker able to issue crafted SQL to overrun
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:13:13 -0300 (See more...) |
|||
| 2127668 | New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9 | ||
| CVE-2026-2003 | Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili | ||
| CVE-2026-2004 | Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod | ||
| CVE-2026-2005 | Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. | ||
| CVE-2026-2006 | Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe | ||
| qemu | Mar 4th 20:08 | ||
|---|---|---|---|
| Release: jammy | Repo: main | Level: security | New version: 1:6.2+dfsg-2ubuntu6.28 |
| Packages in group: | qemu-block-extra qemu-system qemu-system-arm qemu-system-common qemu-system-data qemu-system-gui qemu-system-mips qemu-system-misc qemu-system-ppc qemu-system-s390x qemu-system-sparc (... see all) | ||
|
qemu (1:6.2+dfsg-2ubuntu6.28) jammy-security; urgency=medium * SECURITY UPDATE: denial-of-service
-- Fabian Toepfer <email address hidden> Tue, 03 Mar 2026 15:02:56 +0100 |
|||
| CVE-2024-8354 | A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a U | ||
| CVE-2025-11234 | A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to | ||
| postgresql-17 | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: questing | Repo: universe | Level: security | New version: 17.9-0ubuntu0.25.10.1 |
| Packages in group: | postgresql-server-dev-17 | ||
|
postgresql-17 (17.9-0ubuntu0.25.10.1) questing-security; urgency=medium * New upstream version (LP: #2127668). + This release encompasses changes from upstream's 17.8 and 17.9
+ A dump/restore is not required for those running 17.X. + However, if you are upgrading from a version earlier than 17.6, see
+ Guard against unexpected dimensions of oidvector/int2vector (Tom Lane) These data types are expected to be 1-dimensional arrays containing no
+ Harden selectivity estimators against being attached to operators that
contrib/intarray contained a selectivity estimation function that could
+ Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
Decrypting a crafted message with an overlength session key caused a
+ Fix inadequate validation of multibyte character lengths (Thomas Munro,
Assorted bugs allowed an attacker able to issue crafted SQL to overrun
+ Details about these and many further changes can be found at:
* d/postgresql-17.NEWS: Update. -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:11:37 -0300 (See more...) |
|||
| 2127668 | New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9 | ||
| CVE-2026-2003 | Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili | ||
| CVE-2026-2004 | Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod | ||
| CVE-2026-2005 | Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. | ||
| CVE-2026-2006 | Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe | ||
| nss | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: questing | Repo: main | Level: security | New version: 2:3.114-1ubuntu0.1 |
| Packages in group: | libnss3 libnss3-dev libnss3-tools | ||
|
nss (2:3.114-1ubuntu0.1) questing-security; urgency=medium * SECURITY UPDATE: integer overflow in platform-independent ghash
-- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:27:13 -0500 |
|||
| CVE-2026-2781 | Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird | ||
| postgresql-17 | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: questing | Repo: main | Level: security | New version: 17.9-0ubuntu0.25.10.1 |
| Packages in group: | libecpg6 libecpg-compat3 libecpg-dev libpgtypes3 libpq5 libpq-dev postgresql-client-17 postgresql-doc-17 postgresql-plperl-17 postgresql-plpython3-17 postgresql-pltcl-17 (... see all) | ||
|
postgresql-17 (17.9-0ubuntu0.25.10.1) questing-security; urgency=medium * New upstream version (LP: #2127668). + This release encompasses changes from upstream's 17.8 and 17.9
+ A dump/restore is not required for those running 17.X. + However, if you are upgrading from a version earlier than 17.6, see
+ Guard against unexpected dimensions of oidvector/int2vector (Tom Lane) These data types are expected to be 1-dimensional arrays containing no
+ Harden selectivity estimators against being attached to operators that
contrib/intarray contained a selectivity estimation function that could
+ Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
Decrypting a crafted message with an overlength session key caused a
+ Fix inadequate validation of multibyte character lengths (Thomas Munro,
Assorted bugs allowed an attacker able to issue crafted SQL to overrun
+ Details about these and many further changes can be found at:
* d/postgresql-17.NEWS: Update. -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:11:37 -0300 (See more...) |
|||
| 2127668 | New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9 | ||
| CVE-2026-2003 | Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili | ||
| CVE-2026-2004 | Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod | ||
| CVE-2026-2005 | Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. | ||
| CVE-2026-2006 | Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe | ||
| postgresql-16 | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: noble | Repo: universe | Level: security | New version: 16.13-0ubuntu0.24.04.1 |
| Packages in group: | postgresql-server-dev-16 | ||
|
postgresql-16 (16.13-0ubuntu0.24.04.1) noble-security; urgency=medium * New upstream version (LP: #2127668). + This release encompasses changes from upstream's 16.12 and 16.13
+ A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 16.10, see
+ Guard against unexpected dimensions of oidvector/int2vector (Tom Lane) These data types are expected to be 1-dimensional arrays containing no
+ Harden selectivity estimators against being attached to operators that
contrib/intarray contained a selectivity estimation function that could
+ Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
Decrypting a crafted message with an overlength session key caused a
+ Fix inadequate validation of multibyte character lengths (Thomas Munro,
Assorted bugs allowed an attacker able to issue crafted SQL to overrun
+ Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:12:24 -0300 (See more...) |
|||
| 2127668 | New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9 | ||
| CVE-2026-2003 | Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili | ||
| CVE-2026-2004 | Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod | ||
| CVE-2026-2005 | Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. | ||
| CVE-2026-2006 | Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe | ||
| nss | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: noble | Repo: main | Level: security | New version: 2:3.98-1ubuntu0.1 |
| Packages in group: | libnss3 libnss3-dev libnss3-tools | ||
|
nss (2:3.98-1ubuntu0.1) noble-security; urgency=medium * SECURITY UPDATE: integer overflow in platform-independent ghash
-- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:27:34 -0500 |
|||
| CVE-2026-2781 | Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird | ||
| postgresql-16 | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: noble | Repo: main | Level: security | New version: 16.13-0ubuntu0.24.04.1 |
| Packages in group: | libecpg6 libecpg-compat3 libecpg-dev libpgtypes3 libpq5 libpq-dev postgresql-client-16 postgresql-doc-16 postgresql-plperl-16 postgresql-plpython3-16 postgresql-pltcl-16 (... see all) | ||
|
postgresql-16 (16.13-0ubuntu0.24.04.1) noble-security; urgency=medium * New upstream version (LP: #2127668). + This release encompasses changes from upstream's 16.12 and 16.13
+ A dump/restore is not required for those running 16.X. + However, if you are upgrading from a version earlier than 16.10, see
+ Guard against unexpected dimensions of oidvector/int2vector (Tom Lane) These data types are expected to be 1-dimensional arrays containing no
+ Harden selectivity estimators against being attached to operators that
contrib/intarray contained a selectivity estimation function that could
+ Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
Decrypting a crafted message with an overlength session key caused a
+ Fix inadequate validation of multibyte character lengths (Thomas Munro,
Assorted bugs allowed an attacker able to issue crafted SQL to overrun
+ Details about these and many further changes can be found at:
* d/postgresql-16.NEWS: Update. -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:12:24 -0300 (See more...) |
|||
| 2127668 | New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9 | ||
| CVE-2026-2003 | Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili | ||
| CVE-2026-2004 | Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod | ||
| CVE-2026-2005 | Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. | ||
| CVE-2026-2006 | Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe | ||
| postgresql-14 | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: jammy | Repo: universe | Level: security | New version: 14.22-0ubuntu0.22.04.1 |
| Packages in group: | postgresql-server-dev-14 | ||
|
postgresql-14 (14.22-0ubuntu0.22.04.1) jammy-security; urgency=medium * New upstream version (LP: #2127668). + This release encompasses changes from upstream's 14.21 and 14.22
+ A dump/restore is not required for those running 14.X. + However, if you are upgrading from a version earlier than 14.19, see
+ Guard against unexpected dimensions of oidvector/int2vector (Tom Lane) These data types are expected to be 1-dimensional arrays containing no
+ Harden selectivity estimators against being attached to operators that
contrib/intarray contained a selectivity estimation function that could
+ Fix buffer overrun in contrib/pgcrypto's PGP decryption functions
Decrypting a crafted message with an overlength session key caused a
+ Fix inadequate validation of multibyte character lengths (Thomas Munro,
Assorted bugs allowed an attacker able to issue crafted SQL to overrun
+ Details about these and many further changes can be found at:
* d/postgresql-14.NEWS: Update. -- Athos Ribeiro <email address hidden> Wed, 25 Feb 2026 11:13:13 -0300 (See more...) |
|||
| 2127668 | New PostgreSQL upstream microreleases 14.22, 16.13, and 17.9 | ||
| CVE-2026-2003 | Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viabili | ||
| CVE-2026-2004 | Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary cod | ||
| CVE-2026-2005 | Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. | ||
| CVE-2026-2006 | Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffe | ||
| nss | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: jammy | Repo: universe | Level: security | New version: 2:3.98-0ubuntu0.22.04.3 |
| Packages in group: | libnss3-tools | ||
|
nss (2:3.98-0ubuntu0.22.04.3) jammy-security; urgency=medium * SECURITY UPDATE: integer overflow in platform-independent ghash
-- Marc Deslauriers <email address hidden> Thu, 26 Feb 2026 13:28:10 -0500 |
|||
| CVE-2026-2781 | Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird | ||
| linux-signed-azure-fde | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: jammy | Repo: main | Level: security | New version: 5.15.0-1102.111.1 |
| Packages in group: | linux-image-5.15.0-1019-azure-fde linux-image-5.15.0-1024-azure-fde linux-image-5.15.0-1029-azure-fde linux-image-5.15.0-1030-azure-fde linux-image-5.15.0-1031-azure-fde linux-image-5.15.0-1033-azure-fde linux-image-5.15.0-1034-azure-fde linux-image-5.15.0-1035-azure-fde linux-image-5.15.0-1036-azure-fde linux-image-5.15.0-1037-azure-fde linux-image-5.15.0-1038-azure-fde (... see all) | ||
|
linux-signed-azure-fde (5.15.0-1102.111.1) jammy; urgency=medium * Master version: 5.15.0-1102.111.1 -- John Cabaj <email address hidden> Fri, 21 Nov 2025 16:30:32 -0600 |
|||
| linux-meta-azure-fde | Mar 4th 15:08 | ||
|---|---|---|---|
| Release: jammy | Repo: main | Level: security | New version: 5.15.0.1102.111.78 |
| Packages in group: | linux-azure-fde-5.15 linux-azure-fde-lts-22.04 linux-cloud-tools-azure-fde-5.15 linux-cloud-tools-azure-fde-lts-22.04 linux-headers-azure-fde-5.15 linux-headers-azure-fde-lts-22.04 linux-image-azure-fde-5.15 linux-image-azure-fde-lts-22.04 linux-modules-extra-azure-fde-5.15 linux-modules-extra-azure-fde-lts-22.04 linux-tools-azure-fde-5.15 (... see all) | ||
|
linux-meta-azure-fde (5.15.0.1102.111.78) jammy; urgency=medium * Bump ABI 5.15.0-1102.111 -- John Cabaj <email address hidden> Fri, 21 Nov 2025 16:30:18 -0600 |
|||