{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [
                "linux-image-6.17.0-7-generic",
                "linux-modules-6.17.0-7-generic"
            ],
            "removed": [
                "linux-image-6.17.0-6-generic",
                "linux-modules-6.17.0-6-generic"
            ],
            "diff": [
                "apparmor",
                "iproute2",
                "libapparmor1",
                "libnetplan1",
                "libpython3.13-minimal",
                "libpython3.13-stdlib",
                "linux-image-virtual",
                "netplan-generator",
                "netplan.io",
                "python3-netplan",
                "python3.13",
                "python3.13-minimal",
                "ubuntu-pro-client"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "apparmor",
                "from_version": {
                    "source_package_name": "apparmor",
                    "source_package_version": "5.0.0~alpha1-0ubuntu8.1",
                    "version": "5.0.0~alpha1-0ubuntu8.1"
                },
                "to_version": {
                    "source_package_name": "apparmor",
                    "source_package_version": "5.0.0~alpha1-0ubuntu8.3",
                    "version": "5.0.0~alpha1-0ubuntu8.3"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2130617,
                    2127491,
                    2127111,
                    2126920,
                    2129779
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * This is an SRU, tracked in LP: #2130617",
                            "  * Add patch to grant netrc access to tnftp (LP: #2127491):",
                            "    - d/p/u/profiles-grant-netrc-read-access-to-tnftp.patch",
                            "  * Add patch to fix device tree scan by systemd-detect-virt (LP: #2127111)",
                            "    - d/p/u/profiles-systemd-detect-virt-handle-device-tree-folder.patch",
                            "  * Add patch to allow lsblk reading of Azure NVMe ACPI (LP: #2126920):",
                            "    - d/p/u/lsblk_read_access_azure_acpi.patch",
                            "  * Add patch to fix errors in regression tests with Rust coreutils",
                            "    (LP: #2129779):",
                            "    - d/p/u/regression-fix-for-rust-coreutils.patch",
                            ""
                        ],
                        "package": "apparmor",
                        "version": "5.0.0~alpha1-0ubuntu8.3",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2130617,
                            2127491,
                            2127111,
                            2126920,
                            2129779
                        ],
                        "author": "Ryan Lee <ryan.lee@canonical.com>",
                        "date": "Mon, 20 Oct 2025 11:10:39 -0700"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "iproute2",
                "from_version": {
                    "source_package_name": "iproute2",
                    "source_package_version": "6.16.0-1ubuntu2",
                    "version": "6.16.0-1ubuntu2"
                },
                "to_version": {
                    "source_package_name": "iproute2",
                    "source_package_version": "6.16.0-1ubuntu2.1",
                    "version": "6.16.0-1ubuntu2.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125448
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Modify tc police to permit burst sizes up greater than 4GB (LP: #2125448)",
                            "    - /d/p/2001-lib-Update-backend-of-print_size-to-accept-64-bit-si.patch",
                            "    - /d/p/2002-tc-Add-get_size64-and-get_size64_and_cell.patch",
                            "    - /d/p/2003-tc-Expand-tc_calc_xmittime-tc_calc_xmitsize-to-u64.patch",
                            "    - /d/p/2004-tc-police-enable-use-of-64-bit-burst-parameter.patch",
                            ""
                        ],
                        "package": "iproute2",
                        "version": "6.16.0-1ubuntu2.1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2125448
                        ],
                        "author": "Jorge Merlino <jorge.merlino@canonical.com>",
                        "date": "Wed, 05 Nov 2025 05:24:21 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libapparmor1",
                "from_version": {
                    "source_package_name": "apparmor",
                    "source_package_version": "5.0.0~alpha1-0ubuntu8.1",
                    "version": "5.0.0~alpha1-0ubuntu8.1"
                },
                "to_version": {
                    "source_package_name": "apparmor",
                    "source_package_version": "5.0.0~alpha1-0ubuntu8.3",
                    "version": "5.0.0~alpha1-0ubuntu8.3"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2130617,
                    2127491,
                    2127111,
                    2126920,
                    2129779
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * This is an SRU, tracked in LP: #2130617",
                            "  * Add patch to grant netrc access to tnftp (LP: #2127491):",
                            "    - d/p/u/profiles-grant-netrc-read-access-to-tnftp.patch",
                            "  * Add patch to fix device tree scan by systemd-detect-virt (LP: #2127111)",
                            "    - d/p/u/profiles-systemd-detect-virt-handle-device-tree-folder.patch",
                            "  * Add patch to allow lsblk reading of Azure NVMe ACPI (LP: #2126920):",
                            "    - d/p/u/lsblk_read_access_azure_acpi.patch",
                            "  * Add patch to fix errors in regression tests with Rust coreutils",
                            "    (LP: #2129779):",
                            "    - d/p/u/regression-fix-for-rust-coreutils.patch",
                            ""
                        ],
                        "package": "apparmor",
                        "version": "5.0.0~alpha1-0ubuntu8.3",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2130617,
                            2127491,
                            2127111,
                            2126920,
                            2129779
                        ],
                        "author": "Ryan Lee <ryan.lee@canonical.com>",
                        "date": "Mon, 20 Oct 2025 11:10:39 -0700"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libnetplan1",
                "from_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-7ubuntu3",
                    "version": "1.1.2-7ubuntu3"
                },
                "to_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-8ubuntu1~25.10.1",
                    "version": "1.1.2-8ubuntu1~25.10.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127195
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport netplan.io 1.1.2-8ubuntu1 (LP: #2127195)",
                            "    - Allows non standard OVS setups (e.g. OVS from snap)",
                            "    - Test improvements, especially for slower architectures such as riscv64",
                            "    - d/t/cloud-init.sh: Adopt for actually generated files instead of dummies",
                            "    - d/control: use dbus-daemon instead of dbus-x11 for build-time tests and",
                            "      suggests systemd-resolved",
                            "  * SRU compatibility",
                            "    - d/gbp.conf: Update for Questing",
                            ""
                        ],
                        "package": "netplan.io",
                        "version": "1.1.2-8ubuntu1~25.10.1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2127195
                        ],
                        "author": "Lukas Märdian <slyon@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:04:37 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.13-minimal",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.13-stdlib",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-7.7",
                    "version": "6.17.0-7.7"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-7.7",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.17.0-7.7",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 18 Oct 2025 10:41:23 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "netplan-generator",
                "from_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-7ubuntu3",
                    "version": "1.1.2-7ubuntu3"
                },
                "to_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-8ubuntu1~25.10.1",
                    "version": "1.1.2-8ubuntu1~25.10.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127195
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport netplan.io 1.1.2-8ubuntu1 (LP: #2127195)",
                            "    - Allows non standard OVS setups (e.g. OVS from snap)",
                            "    - Test improvements, especially for slower architectures such as riscv64",
                            "    - d/t/cloud-init.sh: Adopt for actually generated files instead of dummies",
                            "    - d/control: use dbus-daemon instead of dbus-x11 for build-time tests and",
                            "      suggests systemd-resolved",
                            "  * SRU compatibility",
                            "    - d/gbp.conf: Update for Questing",
                            ""
                        ],
                        "package": "netplan.io",
                        "version": "1.1.2-8ubuntu1~25.10.1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2127195
                        ],
                        "author": "Lukas Märdian <slyon@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:04:37 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "netplan.io",
                "from_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-7ubuntu3",
                    "version": "1.1.2-7ubuntu3"
                },
                "to_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-8ubuntu1~25.10.1",
                    "version": "1.1.2-8ubuntu1~25.10.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127195
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport netplan.io 1.1.2-8ubuntu1 (LP: #2127195)",
                            "    - Allows non standard OVS setups (e.g. OVS from snap)",
                            "    - Test improvements, especially for slower architectures such as riscv64",
                            "    - d/t/cloud-init.sh: Adopt for actually generated files instead of dummies",
                            "    - d/control: use dbus-daemon instead of dbus-x11 for build-time tests and",
                            "      suggests systemd-resolved",
                            "  * SRU compatibility",
                            "    - d/gbp.conf: Update for Questing",
                            ""
                        ],
                        "package": "netplan.io",
                        "version": "1.1.2-8ubuntu1~25.10.1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2127195
                        ],
                        "author": "Lukas Märdian <slyon@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:04:37 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-netplan",
                "from_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-7ubuntu3",
                    "version": "1.1.2-7ubuntu3"
                },
                "to_version": {
                    "source_package_name": "netplan.io",
                    "source_package_version": "1.1.2-8ubuntu1~25.10.1",
                    "version": "1.1.2-8ubuntu1~25.10.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127195
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport netplan.io 1.1.2-8ubuntu1 (LP: #2127195)",
                            "    - Allows non standard OVS setups (e.g. OVS from snap)",
                            "    - Test improvements, especially for slower architectures such as riscv64",
                            "    - d/t/cloud-init.sh: Adopt for actually generated files instead of dummies",
                            "    - d/control: use dbus-daemon instead of dbus-x11 for build-time tests and",
                            "      suggests systemd-resolved",
                            "  * SRU compatibility",
                            "    - d/gbp.conf: Update for Questing",
                            ""
                        ],
                        "package": "netplan.io",
                        "version": "1.1.2-8ubuntu1~25.10.1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2127195
                        ],
                        "author": "Lukas Märdian <slyon@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 13:04:37 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13-minimal",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-pro-client",
                "from_version": {
                    "source_package_name": "ubuntu-advantage-tools",
                    "source_package_version": "37ubuntu0",
                    "version": "37ubuntu0"
                },
                "to_version": {
                    "source_package_name": "ubuntu-advantage-tools",
                    "source_package_version": "37.1ubuntu0~25.10",
                    "version": "37.1ubuntu0~25.10"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2129712,
                    2129712
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport 37.1ubuntu0 to questing (LP: #2129712)",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37.1ubuntu0~25.10",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2129712
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Mon, 27 Oct 2025 09:42:19 -0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * do-release-upgrade: immediately release the APT lock acquired to run the",
                            "    post-upgrade hook (LP: #2129712)",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37.1ubuntu0",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2129712
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Thu, 23 Oct 2025 16:30:36 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [
            {
                "name": "linux-image-6.17.0-7-generic",
                "from_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.17.0-6.6",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.17.0-7.7",
                    "version": "6.17.0-7.7"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-7.7",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian/tracking-bug -- resync from main package",
                            ""
                        ],
                        "package": "linux-signed",
                        "version": "6.17.0-7.7",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 18 Oct 2025 10:41:43 +0200"
                    }
                ],
                "notes": "linux-image-6.17.0-7-generic version '6.17.0-7.7' (source package linux-signed version '6.17.0-7.7') was added. linux-image-6.17.0-7-generic version '6.17.0-7.7' has the same source package name, linux-signed, as removed package linux-image-6.17.0-6-generic. As such we can use the source package version of the removed package, '6.17.0-6.6', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.17.0-7-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-7.7",
                    "version": "6.17.0-7.7"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2128695,
                    2127676,
                    2127187,
                    2119479,
                    2106681,
                    2121347,
                    1786013,
                    2123901,
                    2103680,
                    2128209
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-7.7 -proposed tracker (LP: #2128695)",
                            "",
                            "  * Fix incorrect bug number for CONFIG_KERNEL_ZSTD (LP: #2127676)",
                            "    - [Config] Fix bug note for CONFIG_KERNEL_ZSTD",
                            "",
                            "  * support Panter Lake CPU performance preferences (LP: #2127187)",
                            "    - thermal: intel: int340x: Add support for power slider",
                            "    - thermal: intel: int340x: Enable power slider interface for Panther Lake",
                            "    - thermal: intel: int340x: Add module parameter for balanced Slider",
                            "    - thermal: intel: int340x: Add module parameter to change slider offset",
                            "    - thermal: intel: int340x: Power Slider: Validate slider_balance range",
                            "",
                            "  * [SRU][Q/P/N:hwe-6.14] mt7925: Add MBSS support (LP: #2119479)",
                            "    - wifi: mt76: mt7925: add MBSSID support",
                            "",
                            "  * Plucky preinstalled server fails to boot on rb3gen2 (LP: #2106681) //",
                            "    Questing preinstalled server fails to boot on sa8775p boards",
                            "    (LP: #2121347)",
                            "    - [Config] move more qcom interconnect/pinctrl/gcc options to builtin",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] update Ubuntu.md",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * Questing update: v6.17.2 upstream stable release (LP: #2128209)",
                            "    - drm/amdgpu: Enable MES lr_compute_wa by default",
                            "    - USB: serial: option: add SIMCom 8230C compositions",
                            "    - Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1",
                            "    - wifi: rtlwifi: rtl8192cu: Don't claim USB ID 07b8:8188",
                            "    - wifi: rtl8xxxu: Don't claim USB ID 07b8:8188",
                            "    - rust: drm: fix `srctree/` links",
                            "    - rust: block: fix `srctree/` links",
                            "    - rust: pci: fix incorrect platform reference in PCI driver probe doc",
                            "      comment",
                            "    - rust: pci: fix incorrect platform reference in PCI driver unbind doc",
                            "      comment",
                            "    - serial: qcom-geni: Fix blocked task",
                            "    - nvmem: layouts: fix automatic module loading",
                            "    - drivers/misc/amd-sbi/Kconfig: select REGMAP_I2C",
                            "    - binder: fix double-free in dbitmap",
                            "    - serial: stm32: allow selecting console when the driver is module",
                            "    - [Config] stm32: do not select console when driver is module",
                            "    - staging: axis-fifo: fix maximum TX packet length check",
                            "    - staging: axis-fifo: fix TX handling on copy_from_user() failure",
                            "    - staging: axis-fifo: flush RX FIFO on read errors",
                            "    - driver core: faux: Set power.no_pm for faux devices",
                            "    - driver core/PM: Set power.no_callbacks along with power.no_pm",
                            "    - Revert \"crypto: testmgr - desupport SHA-1 for FIPS 140\"",
                            "    - crypto: zstd - Fix compression bug caused by truncation",
                            "    - crypto: rng - Ensure set_ent is always present",
                            "    - net/9p: fix double req put in p9_fd_cancelled",
                            "    - KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O",
                            "    - f2fs: fix to do sanity check on node footer for non inode dnode",
                            "    - ring buffer: Propagate __rb_map_vma return value to caller",
                            "    - Linux 6.17.2",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-7.7",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2128695,
                            2127676,
                            2127187,
                            2119479,
                            2106681,
                            2121347,
                            1786013,
                            2123901,
                            2103680,
                            2128209
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 18 Oct 2025 08:01:45 +0200"
                    }
                ],
                "notes": "linux-modules-6.17.0-7-generic version '6.17.0-7.7' (source package linux version '6.17.0-7.7') was added. linux-modules-6.17.0-7-generic version '6.17.0-7.7' has the same source package name, linux, as removed package linux-modules-6.17.0-6-generic. As such we can use the source package version of the removed package, '6.17.0-6.6', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "removed": {
        "deb": [
            {
                "name": "linux-image-6.17.0-6-generic",
                "from_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.17.0-6-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 25.10 questing image from release image serial 20251121 to 20251205",
    "from_series": "questing",
    "to_series": "questing",
    "from_serial": "20251121",
    "to_serial": "20251205",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}