{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [
                "linux-headers-6.17.0-6",
                "linux-headers-6.17.0-6-generic",
                "linux-image-6.17.0-6-generic",
                "linux-modules-6.17.0-6-generic",
                "linux-tools-6.17.0-6",
                "linux-tools-6.17.0-6-generic"
            ],
            "removed": [
                "gir1.2-girepository-2.0:ppc64el",
                "libgirepository-1.0-1:ppc64el",
                "linux-headers-6.17.0-5",
                "linux-headers-6.17.0-5-generic",
                "linux-image-6.17.0-5-generic",
                "linux-modules-6.17.0-5-generic",
                "linux-tools-6.17.0-5",
                "linux-tools-6.17.0-5-generic"
            ],
            "diff": [
                "apport-symptoms",
                "bcache-tools",
                "bpftool",
                "chrony",
                "command-not-found",
                "finalrd",
                "fonts-ubuntu-console",
                "friendly-recovery",
                "gcc-15-base:ppc64el",
                "krb5-locales",
                "libatomic1:ppc64el",
                "libduktape207:ppc64el",
                "libgcc-s1:ppc64el",
                "libgssapi-krb5-2:ppc64el",
                "libk5crypto3:ppc64el",
                "libkrb5-3:ppc64el",
                "libkrb5support0:ppc64el",
                "libpng16-16t64:ppc64el",
                "libservicelog-1.1-1:ppc64el",
                "libsgutils2-1.48:ppc64el",
                "libstdc++6:ppc64el",
                "libvpd-2.2-3",
                "libxml2-16:ppc64el",
                "linux-headers-generic",
                "linux-headers-virtual",
                "linux-image-virtual",
                "linux-libc-dev:ppc64el",
                "linux-perf",
                "linux-tools-common",
                "linux-virtual",
                "python3-commandnotfound",
                "python3-jmespath",
                "python3-jsonschema-specifications",
                "rsync",
                "servicelog",
                "sg3-utils",
                "sg3-utils-udev",
                "tmux",
                "ubuntu-kernel-accessories",
                "ubuntu-minimal",
                "ubuntu-server",
                "ubuntu-standard",
                "usb-modeswitch"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "apport-symptoms",
                "from_version": {
                    "source_package_name": "apport-symptoms",
                    "source_package_version": "0.25",
                    "version": "0.25"
                },
                "to_version": {
                    "source_package_name": "apport-symptoms",
                    "source_package_version": "0.25build1",
                    "version": "0.25build1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "apport-symptoms",
                        "version": "0.25build1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 11:23:28 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "bcache-tools",
                "from_version": {
                    "source_package_name": "bcache-tools",
                    "source_package_version": "1.0.8-5build1",
                    "version": "1.0.8-5build1"
                },
                "to_version": {
                    "source_package_name": "bcache-tools",
                    "source_package_version": "1.0.8-5build2",
                    "version": "1.0.8-5build2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "bcache-tools",
                        "version": "1.0.8-5build2",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 11:23:41 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "bpftool",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "7.7.0+6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "7.7.0+6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "chrony",
                "from_version": {
                    "source_package_name": "chrony",
                    "source_package_version": "4.7-1ubuntu1",
                    "version": "4.7-1ubuntu1"
                },
                "to_version": {
                    "source_package_name": "chrony",
                    "source_package_version": "4.7-1ubuntu3",
                    "version": "4.7-1ubuntu3"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132159
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * configure: switch sed separator from % to # to cope with dpkg",
                            ""
                        ],
                        "package": "chrony",
                        "version": "4.7-1ubuntu3",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Tue, 25 Nov 2025 14:22:57 -0500"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/control: Recommends: networkd-dispatcher (LP: #2132159)",
                            "    This package ships networkd-dispatcher scripts. Directly declare a",
                            "    Recommends: networkd-dispatcher instead of relying on systemd to do so.",
                            ""
                        ],
                        "package": "chrony",
                        "version": "4.7-1ubuntu2",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132159
                        ],
                        "author": "Nick Rosbrook <enr0n@ubuntu.com>",
                        "date": "Mon, 24 Nov 2025 08:49:04 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "command-not-found",
                "from_version": {
                    "source_package_name": "command-not-found",
                    "source_package_version": "23.04.0",
                    "version": "23.04.0"
                },
                "to_version": {
                    "source_package_name": "command-not-found",
                    "source_package_version": "23.04.0build1",
                    "version": "23.04.0build1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "command-not-found",
                        "version": "23.04.0build1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 11:24:20 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "finalrd",
                "from_version": {
                    "source_package_name": "finalrd",
                    "source_package_version": "9build1",
                    "version": "9build1"
                },
                "to_version": {
                    "source_package_name": "finalrd",
                    "source_package_version": "9build2",
                    "version": "9build2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "finalrd",
                        "version": "9build2",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Graham Inggs <ginggs@ubuntu.com>",
                        "date": "Wed, 26 Nov 2025 16:07:18 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "fonts-ubuntu-console",
                "from_version": {
                    "source_package_name": "fonts-ubuntu",
                    "source_package_version": "0.869+git20240321-0ubuntu1",
                    "version": "0.869+git20240321-0ubuntu1"
                },
                "to_version": {
                    "source_package_name": "fonts-ubuntu",
                    "source_package_version": "0.869+git20240321-0ubuntu2",
                    "version": "0.869+git20240321-0ubuntu2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "fonts-ubuntu",
                        "version": "0.869+git20240321-0ubuntu2",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 11:32:00 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "friendly-recovery",
                "from_version": {
                    "source_package_name": "friendly-recovery",
                    "source_package_version": "0.2.42",
                    "version": "0.2.42"
                },
                "to_version": {
                    "source_package_name": "friendly-recovery",
                    "source_package_version": "0.2.42build1",
                    "version": "0.2.42build1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "friendly-recovery",
                        "version": "0.2.42build1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Graham Inggs <ginggs@ubuntu.com>",
                        "date": "Wed, 26 Nov 2025 17:22:07 +0000"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "gcc-15-base:ppc64el",
                "from_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-8ubuntu1",
                    "version": "15.2.0-8ubuntu1"
                },
                "to_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-9ubuntu1",
                    "version": "15.2.0-9ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian; remaining changes:",
                            "    - Build from upstream sources.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@ubuntu.com>",
                        "date": "Sat, 22 Nov 2025 13:16:32 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Update to git 20251122 from the gcc-15 branch.",
                            "    - Fix PR tree-optimization/122225, PR target/122695 (loongarch),",
                            "      PR target/122539 (ARM), PR lto/122515, PR target/121853 (AArch64),",
                            "      PR tree-optimization/121776, PR middle-end/121581,",
                            "      PR rtl-optimization/122627, PR target/119275 (RISCV),",
                            "      PR target/122216 (ARM), PR target/122175 (ARM), PR target/122189 (ARM),",
                            "      PR target/122446 (x86), PR lto/122620, PR target/122097 (loongarch),",
                            "      PR ada/111433, PR ada/122640, PR c++/120529, PR c++/119580,",
                            "      PR c++/122677, PR c++/122625, PR fortran/122709, PR libstdc++/122743,",
                            "      PR libstdc++/122726, PR libstdc++/122661.",
                            "  * Build using amdgcn-tools-21 instead of -19.",
                            "  * Update VCS attributes.",
                            "  * Add libgcobol symbols file.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@debian.org>",
                        "date": "Sat, 22 Nov 2025 13:14:34 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "krb5-locales",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.21.3-5ubuntu2",
                    "version": "1.21.3-5ubuntu2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.22.1-2",
                    "version": "1.22.1-2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2123950,
                    2110460
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Fix FTBFS with gcc-15 because of old-style function",
                            "    declarations (LP: #2123950).",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu2",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2123950
                        ],
                        "author": "Eduardo Barretto <eduardo.barretto@canonical.com>",
                        "date": "Tue, 16 Sep 2025 10:21:10 +0200"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2110460). Remaining changes:",
                            "    - SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "      communications could lead to forgery attacks.",
                            "      + debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "        by adding support for the Message-Authenticator attribute in non-EAP",
                            "        authentication methods.",
                            "      + CVE-2024-3596",
                            "    - Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            "    - SECURITY UPDATE: denial of service via two memory leaks",
                            "      + debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "        src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "      + CVE-2024-26458",
                            "      + CVE-2024-26461",
                            "  * Dropped:",
                            "    - SECURITY UPDATE: kadmind DoS via iprop log file",
                            "      + debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "        calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "      + CVE-2025-24528",
                            "      [In 1.21.3-5]",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2110460
                        ],
                        "author": "Andreas Hasenack <andreas@canonical.com>",
                        "date": "Tue, 22 Jul 2025 15:48:33 -0300"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: denial of service via two memory leaks",
                            "    - debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "      src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "    - CVE-2024-26458",
                            "    - CVE-2024-26461",
                            "  * SECURITY UPDATE: kadmind DoS via iprop log file",
                            "    - debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "      calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "    - CVE-2025-24528",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu2",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 25 Feb 2025 10:22:31 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu1",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 04 Feb 2025 11:30:48 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": true
            },
            {
                "name": "libatomic1:ppc64el",
                "from_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-8ubuntu1",
                    "version": "15.2.0-8ubuntu1"
                },
                "to_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-9ubuntu1",
                    "version": "15.2.0-9ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian; remaining changes:",
                            "    - Build from upstream sources.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@ubuntu.com>",
                        "date": "Sat, 22 Nov 2025 13:16:32 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Update to git 20251122 from the gcc-15 branch.",
                            "    - Fix PR tree-optimization/122225, PR target/122695 (loongarch),",
                            "      PR target/122539 (ARM), PR lto/122515, PR target/121853 (AArch64),",
                            "      PR tree-optimization/121776, PR middle-end/121581,",
                            "      PR rtl-optimization/122627, PR target/119275 (RISCV),",
                            "      PR target/122216 (ARM), PR target/122175 (ARM), PR target/122189 (ARM),",
                            "      PR target/122446 (x86), PR lto/122620, PR target/122097 (loongarch),",
                            "      PR ada/111433, PR ada/122640, PR c++/120529, PR c++/119580,",
                            "      PR c++/122677, PR c++/122625, PR fortran/122709, PR libstdc++/122743,",
                            "      PR libstdc++/122726, PR libstdc++/122661.",
                            "  * Build using amdgcn-tools-21 instead of -19.",
                            "  * Update VCS attributes.",
                            "  * Add libgcobol symbols file.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@debian.org>",
                        "date": "Sat, 22 Nov 2025 13:14:34 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libduktape207:ppc64el",
                "from_version": {
                    "source_package_name": "duktape",
                    "source_package_version": "2.7.0+tests-0ubuntu3",
                    "version": "2.7.0+tests-0ubuntu3"
                },
                "to_version": {
                    "source_package_name": "duktape",
                    "source_package_version": "2.7.0+tests-0ubuntu4",
                    "version": "2.7.0+tests-0ubuntu4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "duktape",
                        "version": "2.7.0+tests-0ubuntu4",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 11:25:25 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libgcc-s1:ppc64el",
                "from_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-8ubuntu1",
                    "version": "15.2.0-8ubuntu1"
                },
                "to_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-9ubuntu1",
                    "version": "15.2.0-9ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian; remaining changes:",
                            "    - Build from upstream sources.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@ubuntu.com>",
                        "date": "Sat, 22 Nov 2025 13:16:32 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Update to git 20251122 from the gcc-15 branch.",
                            "    - Fix PR tree-optimization/122225, PR target/122695 (loongarch),",
                            "      PR target/122539 (ARM), PR lto/122515, PR target/121853 (AArch64),",
                            "      PR tree-optimization/121776, PR middle-end/121581,",
                            "      PR rtl-optimization/122627, PR target/119275 (RISCV),",
                            "      PR target/122216 (ARM), PR target/122175 (ARM), PR target/122189 (ARM),",
                            "      PR target/122446 (x86), PR lto/122620, PR target/122097 (loongarch),",
                            "      PR ada/111433, PR ada/122640, PR c++/120529, PR c++/119580,",
                            "      PR c++/122677, PR c++/122625, PR fortran/122709, PR libstdc++/122743,",
                            "      PR libstdc++/122726, PR libstdc++/122661.",
                            "  * Build using amdgcn-tools-21 instead of -19.",
                            "  * Update VCS attributes.",
                            "  * Add libgcobol symbols file.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@debian.org>",
                        "date": "Sat, 22 Nov 2025 13:14:34 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libgssapi-krb5-2:ppc64el",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.21.3-5ubuntu2",
                    "version": "1.21.3-5ubuntu2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.22.1-2",
                    "version": "1.22.1-2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2123950,
                    2110460
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Fix FTBFS with gcc-15 because of old-style function",
                            "    declarations (LP: #2123950).",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu2",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2123950
                        ],
                        "author": "Eduardo Barretto <eduardo.barretto@canonical.com>",
                        "date": "Tue, 16 Sep 2025 10:21:10 +0200"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2110460). Remaining changes:",
                            "    - SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "      communications could lead to forgery attacks.",
                            "      + debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "        by adding support for the Message-Authenticator attribute in non-EAP",
                            "        authentication methods.",
                            "      + CVE-2024-3596",
                            "    - Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            "    - SECURITY UPDATE: denial of service via two memory leaks",
                            "      + debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "        src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "      + CVE-2024-26458",
                            "      + CVE-2024-26461",
                            "  * Dropped:",
                            "    - SECURITY UPDATE: kadmind DoS via iprop log file",
                            "      + debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "        calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "      + CVE-2025-24528",
                            "      [In 1.21.3-5]",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2110460
                        ],
                        "author": "Andreas Hasenack <andreas@canonical.com>",
                        "date": "Tue, 22 Jul 2025 15:48:33 -0300"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: denial of service via two memory leaks",
                            "    - debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "      src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "    - CVE-2024-26458",
                            "    - CVE-2024-26461",
                            "  * SECURITY UPDATE: kadmind DoS via iprop log file",
                            "    - debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "      calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "    - CVE-2025-24528",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu2",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 25 Feb 2025 10:22:31 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu1",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 04 Feb 2025 11:30:48 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": true
            },
            {
                "name": "libk5crypto3:ppc64el",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.21.3-5ubuntu2",
                    "version": "1.21.3-5ubuntu2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.22.1-2",
                    "version": "1.22.1-2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2123950,
                    2110460
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Fix FTBFS with gcc-15 because of old-style function",
                            "    declarations (LP: #2123950).",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu2",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2123950
                        ],
                        "author": "Eduardo Barretto <eduardo.barretto@canonical.com>",
                        "date": "Tue, 16 Sep 2025 10:21:10 +0200"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2110460). Remaining changes:",
                            "    - SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "      communications could lead to forgery attacks.",
                            "      + debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "        by adding support for the Message-Authenticator attribute in non-EAP",
                            "        authentication methods.",
                            "      + CVE-2024-3596",
                            "    - Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            "    - SECURITY UPDATE: denial of service via two memory leaks",
                            "      + debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "        src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "      + CVE-2024-26458",
                            "      + CVE-2024-26461",
                            "  * Dropped:",
                            "    - SECURITY UPDATE: kadmind DoS via iprop log file",
                            "      + debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "        calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "      + CVE-2025-24528",
                            "      [In 1.21.3-5]",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2110460
                        ],
                        "author": "Andreas Hasenack <andreas@canonical.com>",
                        "date": "Tue, 22 Jul 2025 15:48:33 -0300"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: denial of service via two memory leaks",
                            "    - debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "      src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "    - CVE-2024-26458",
                            "    - CVE-2024-26461",
                            "  * SECURITY UPDATE: kadmind DoS via iprop log file",
                            "    - debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "      calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "    - CVE-2025-24528",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu2",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 25 Feb 2025 10:22:31 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu1",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 04 Feb 2025 11:30:48 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": true
            },
            {
                "name": "libkrb5-3:ppc64el",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.21.3-5ubuntu2",
                    "version": "1.21.3-5ubuntu2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.22.1-2",
                    "version": "1.22.1-2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2123950,
                    2110460
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Fix FTBFS with gcc-15 because of old-style function",
                            "    declarations (LP: #2123950).",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu2",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2123950
                        ],
                        "author": "Eduardo Barretto <eduardo.barretto@canonical.com>",
                        "date": "Tue, 16 Sep 2025 10:21:10 +0200"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2110460). Remaining changes:",
                            "    - SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "      communications could lead to forgery attacks.",
                            "      + debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "        by adding support for the Message-Authenticator attribute in non-EAP",
                            "        authentication methods.",
                            "      + CVE-2024-3596",
                            "    - Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            "    - SECURITY UPDATE: denial of service via two memory leaks",
                            "      + debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "        src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "      + CVE-2024-26458",
                            "      + CVE-2024-26461",
                            "  * Dropped:",
                            "    - SECURITY UPDATE: kadmind DoS via iprop log file",
                            "      + debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "        calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "      + CVE-2025-24528",
                            "      [In 1.21.3-5]",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2110460
                        ],
                        "author": "Andreas Hasenack <andreas@canonical.com>",
                        "date": "Tue, 22 Jul 2025 15:48:33 -0300"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: denial of service via two memory leaks",
                            "    - debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "      src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "    - CVE-2024-26458",
                            "    - CVE-2024-26461",
                            "  * SECURITY UPDATE: kadmind DoS via iprop log file",
                            "    - debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "      calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "    - CVE-2025-24528",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu2",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 25 Feb 2025 10:22:31 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu1",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 04 Feb 2025 11:30:48 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": true
            },
            {
                "name": "libkrb5support0:ppc64el",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.21.3-5ubuntu2",
                    "version": "1.21.3-5ubuntu2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.22.1-2",
                    "version": "1.22.1-2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-26458",
                        "url": "https://ubuntu.com/security/CVE-2024-26458",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-26461",
                        "url": "https://ubuntu.com/security/CVE-2024-26461",
                        "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                        "cve_priority": "low",
                        "cve_public_date": "2024-02-29 01:44:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-24528",
                        "url": "https://ubuntu.com/security/CVE-2025-24528",
                        "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-01-31"
                    },
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2123950,
                    2110460
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Fix FTBFS with gcc-15 because of old-style function",
                            "    declarations (LP: #2123950).",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu2",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2123950
                        ],
                        "author": "Eduardo Barretto <eduardo.barretto@canonical.com>",
                        "date": "Tue, 16 Sep 2025 10:21:10 +0200"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2110460). Remaining changes:",
                            "    - SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "      communications could lead to forgery attacks.",
                            "      + debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "        by adding support for the Message-Authenticator attribute in non-EAP",
                            "        authentication methods.",
                            "      + CVE-2024-3596",
                            "    - Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            "    - SECURITY UPDATE: denial of service via two memory leaks",
                            "      + debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "        src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "      + CVE-2024-26458",
                            "      + CVE-2024-26461",
                            "  * Dropped:",
                            "    - SECURITY UPDATE: kadmind DoS via iprop log file",
                            "      + debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "        calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "      + CVE-2025-24528",
                            "      [In 1.21.3-5]",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-5ubuntu1",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2110460
                        ],
                        "author": "Andreas Hasenack <andreas@canonical.com>",
                        "date": "Tue, 22 Jul 2025 15:48:33 -0300"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-26458",
                                "url": "https://ubuntu.com/security/CVE-2024-26458",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-26461",
                                "url": "https://ubuntu.com/security/CVE-2024-26461",
                                "cve_description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
                                "cve_priority": "low",
                                "cve_public_date": "2024-02-29 01:44:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-24528",
                                "url": "https://ubuntu.com/security/CVE-2025-24528",
                                "cve_description": "In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-01-31"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: denial of service via two memory leaks",
                            "    - debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in",
                            "      src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.",
                            "    - CVE-2024-26458",
                            "    - CVE-2024-26461",
                            "  * SECURITY UPDATE: kadmind DoS via iprop log file",
                            "    - debian/patches/CVE-2025-24528.patch: prevent overflow when",
                            "      calculating ulog block size in src/lib/kdb/kdb_log.c.",
                            "    - CVE-2025-24528",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu2",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 25 Feb 2025 10:22:31 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authentication",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.21.3-4ubuntu1",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 04 Feb 2025 11:30:48 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": true
            },
            {
                "name": "libpng16-16t64:ppc64el",
                "from_version": {
                    "source_package_name": "libpng1.6",
                    "source_package_version": "1.6.50-1",
                    "version": "1.6.50-1"
                },
                "to_version": {
                    "source_package_name": "libpng1.6",
                    "source_package_version": "1.6.51-1",
                    "version": "1.6.51-1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-64505",
                        "url": "https://ubuntu.com/security/CVE-2025-64505",
                        "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-11-25 00:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-64506",
                        "url": "https://ubuntu.com/security/CVE-2025-64506",
                        "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-11-25 00:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-64720",
                        "url": "https://ubuntu.com/security/CVE-2025-64720",
                        "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-11-25 00:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-65018",
                        "url": "https://ubuntu.com/security/CVE-2025-65018",
                        "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-11-25 00:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-64505",
                                "url": "https://ubuntu.com/security/CVE-2025-64505",
                                "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-11-25 00:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-64506",
                                "url": "https://ubuntu.com/security/CVE-2025-64506",
                                "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-11-25 00:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-64720",
                                "url": "https://ubuntu.com/security/CVE-2025-64720",
                                "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-11-25 00:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-65018",
                                "url": "https://ubuntu.com/security/CVE-2025-65018",
                                "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-11-25 00:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * New upstream version 1.6.51.",
                            "    - CVE-2025-64505 - Heap buffer overflow. Closes: #1121219",
                            "    - CVE-2025-64506 - Heap buffer overread. Closes: #1121218",
                            "    - CVE-2025-64720 - Buffer overflow. Closes: #1121217",
                            "    - CVE-2025-65018 - Heap buffer. Closes: #1121216",
                            "  * Enable salsa-ci.",
                            "  * Update d/copyright years, remove unused section.",
                            "  * udeb: install library into usr/lib ",
                            ""
                        ],
                        "package": "libpng1.6",
                        "version": "1.6.51-1",
                        "urgency": "high",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Tobias Frost <tobi@debian.org>",
                        "date": "Mon, 24 Nov 2025 21:06:25 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libservicelog-1.1-1:ppc64el",
                "from_version": {
                    "source_package_name": "libservicelog",
                    "source_package_version": "1.1.19-1build1",
                    "version": "1.1.19-1build1"
                },
                "to_version": {
                    "source_package_name": "libservicelog",
                    "source_package_version": "1.1.19-1build2",
                    "version": "1.1.19-1build2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "libservicelog",
                        "version": "1.1.19-1build2",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 13:46:19 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libsgutils2-1.48:ppc64el",
                "from_version": {
                    "source_package_name": "sg3-utils",
                    "source_package_version": "1.48-2ubuntu1",
                    "version": "1.48-2ubuntu1"
                },
                "to_version": {
                    "source_package_name": "sg3-utils",
                    "source_package_version": "1.48-3ubuntu1",
                    "version": "1.48-3ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125993
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2125993). Remaining changes:",
                            "    - d/p/0001-Fix-path-for-udevadm.patch: update to match 1.48 and use /usr/bin",
                            ""
                        ],
                        "package": "sg3-utils",
                        "version": "1.48-3ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2125993
                        ],
                        "author": "Hector Cao <hector.cao@canonical.com>",
                        "date": "Mon, 24 Nov 2025 15:28:07 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add fix for missing output fields in sg_inq (Closes: #1109923)",
                            ""
                        ],
                        "package": "sg3-utils",
                        "version": "1.48-3",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Jonathan McDowell <noodles@earth.li>",
                        "date": "Sun, 17 Aug 2025 12:28:23 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libstdc++6:ppc64el",
                "from_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-8ubuntu1",
                    "version": "15.2.0-8ubuntu1"
                },
                "to_version": {
                    "source_package_name": "gcc-15",
                    "source_package_version": "15.2.0-9ubuntu1",
                    "version": "15.2.0-9ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian; remaining changes:",
                            "    - Build from upstream sources.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@ubuntu.com>",
                        "date": "Sat, 22 Nov 2025 13:16:32 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Update to git 20251122 from the gcc-15 branch.",
                            "    - Fix PR tree-optimization/122225, PR target/122695 (loongarch),",
                            "      PR target/122539 (ARM), PR lto/122515, PR target/121853 (AArch64),",
                            "      PR tree-optimization/121776, PR middle-end/121581,",
                            "      PR rtl-optimization/122627, PR target/119275 (RISCV),",
                            "      PR target/122216 (ARM), PR target/122175 (ARM), PR target/122189 (ARM),",
                            "      PR target/122446 (x86), PR lto/122620, PR target/122097 (loongarch),",
                            "      PR ada/111433, PR ada/122640, PR c++/120529, PR c++/119580,",
                            "      PR c++/122677, PR c++/122625, PR fortran/122709, PR libstdc++/122743,",
                            "      PR libstdc++/122726, PR libstdc++/122661.",
                            "  * Build using amdgcn-tools-21 instead of -19.",
                            "  * Update VCS attributes.",
                            "  * Add libgcobol symbols file.",
                            ""
                        ],
                        "package": "gcc-15",
                        "version": "15.2.0-9",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Matthias Klose <doko@debian.org>",
                        "date": "Sat, 22 Nov 2025 13:14:34 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libvpd-2.2-3",
                "from_version": {
                    "source_package_name": "libvpd",
                    "source_package_version": "2.2.9-1build1",
                    "version": "2.2.9-1build1"
                },
                "to_version": {
                    "source_package_name": "libvpd",
                    "source_package_version": "2.2.9-1build2",
                    "version": "2.2.9-1build2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "libvpd",
                        "version": "2.2.9-1build2",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 13:48:32 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libxml2-16:ppc64el",
                "from_version": {
                    "source_package_name": "libxml2",
                    "source_package_version": "2.15.1+dfsg-1",
                    "version": "2.15.1+dfsg-1"
                },
                "to_version": {
                    "source_package_name": "libxml2",
                    "source_package_version": "2.15.1+dfsg-2",
                    "version": "2.15.1+dfsg-2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merges changes from concurrent NMU upload.",
                            "",
                            "  [ Helmut Grohne ]",
                            "  * Fix FTBFS with nopython build profile (Closes: #1120104)",
                            "",
                            "  [ Matthias Klose ]",
                            "  * d/rules: Add some explicit dependencies for custom build targets",
                            "    (Closes: #1105428)",
                            ""
                        ],
                        "package": "libxml2",
                        "version": "2.15.1+dfsg-2",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Aron Xu <aron@debian.org>",
                        "date": "Wed, 26 Nov 2025 17:25:09 +0800"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-generic",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-6.6",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Packaging] Update oem transitionals",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:26:47 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-6.6",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Packaging] Update oem transitionals",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:26:47 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-6.6",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Packaging] Update oem transitionals",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:26:47 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-libc-dev:ppc64el",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-perf",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-common",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.17.0-6.6",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Packaging] Update oem transitionals",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:26:47 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-commandnotfound",
                "from_version": {
                    "source_package_name": "command-not-found",
                    "source_package_version": "23.04.0",
                    "version": "23.04.0"
                },
                "to_version": {
                    "source_package_name": "command-not-found",
                    "source_package_version": "23.04.0build1",
                    "version": "23.04.0build1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "command-not-found",
                        "version": "23.04.0build1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 11:24:20 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-jmespath",
                "from_version": {
                    "source_package_name": "python-jmespath",
                    "source_package_version": "1.0.1-1",
                    "version": "1.0.1-1"
                },
                "to_version": {
                    "source_package_name": "python-jmespath",
                    "source_package_version": "1.0.1-1build1",
                    "version": "1.0.1-1build1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "python-jmespath",
                        "version": "1.0.1-1build1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 15:09:10 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3-jsonschema-specifications",
                "from_version": {
                    "source_package_name": "python-jsonschema-specifications",
                    "source_package_version": "2023.12.1-2",
                    "version": "2023.12.1-2"
                },
                "to_version": {
                    "source_package_name": "python-jsonschema-specifications",
                    "source_package_version": "2023.12.1-4",
                    "version": "2023.12.1-4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add relocate-misplaced-metaschema.patch (Closes: #1114655).",
                            ""
                        ],
                        "package": "python-jsonschema-specifications",
                        "version": "2023.12.1-4",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Thomas Goirand <zigo@debian.org>",
                        "date": "Thu, 27 Nov 2025 10:29:31 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Fix d/watch, using mode=git now (Closes: #1120960).",
                            ""
                        ],
                        "package": "python-jsonschema-specifications",
                        "version": "2023.12.1-3",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Thomas Goirand <zigo@debian.org>",
                        "date": "Wed, 26 Nov 2025 12:17:27 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "rsync",
                "from_version": {
                    "source_package_name": "rsync",
                    "source_package_version": "3.4.1+ds1-6",
                    "version": "3.4.1+ds1-6"
                },
                "to_version": {
                    "source_package_name": "rsync",
                    "source_package_version": "3.4.1+ds1-7",
                    "version": "3.4.1+ds1-7"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-10158",
                        "url": "https://ubuntu.com/security/CVE-2025-10158",
                        "cve_description": "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The  malicious  rsync client requires at least read access to the remote rsync module in order to trigger the issue.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-11-18 15:16:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-10158",
                                "url": "https://ubuntu.com/security/CVE-2025-10158",
                                "cve_description": "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The  malicious  rsync client requires at least read access to the remote rsync module in order to trigger the issue.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-11-18 15:16:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * Team upload.",
                            "",
                            "  [ Arnaud Rebillout ]",
                            "  * d/control: Switch back to python3-cmarkgfm for all architectures",
                            "",
                            "  [ Matheus Polkorny ]",
                            "  * d/p/CVE-2025-10158.patch: Import upstream patch to fix CVE-2025-10158",
                            "",
                            "    A malicious client acting as the receiver of an rsync file transfer",
                            "    can trigger an out of bounds read of a heap based buffer,",
                            "    via a negative array index. (Closes: #1121442)",
                            ""
                        ],
                        "package": "rsync",
                        "version": "3.4.1+ds1-7",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Matheus Polkorny <mpolkorny@gmail.com>",
                        "date": "Thu, 27 Nov 2025 21:01:55 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "servicelog",
                "from_version": {
                    "source_package_name": "servicelog",
                    "source_package_version": "1.1.16-1build1",
                    "version": "1.1.16-1build1"
                },
                "to_version": {
                    "source_package_name": "servicelog",
                    "source_package_version": "1.1.16-1build2",
                    "version": "1.1.16-1build2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2132257
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change mass rebuild for Ubuntu 26.04 (LP: #2132257)",
                            ""
                        ],
                        "package": "servicelog",
                        "version": "1.1.16-1build2",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2132257
                        ],
                        "author": "Sebastien Bacher <seb128@ubuntu.com>",
                        "date": "Mon, 01 Dec 2025 15:14:06 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "sg3-utils",
                "from_version": {
                    "source_package_name": "sg3-utils",
                    "source_package_version": "1.48-2ubuntu1",
                    "version": "1.48-2ubuntu1"
                },
                "to_version": {
                    "source_package_name": "sg3-utils",
                    "source_package_version": "1.48-3ubuntu1",
                    "version": "1.48-3ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125993
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2125993). Remaining changes:",
                            "    - d/p/0001-Fix-path-for-udevadm.patch: update to match 1.48 and use /usr/bin",
                            ""
                        ],
                        "package": "sg3-utils",
                        "version": "1.48-3ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2125993
                        ],
                        "author": "Hector Cao <hector.cao@canonical.com>",
                        "date": "Mon, 24 Nov 2025 15:28:07 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add fix for missing output fields in sg_inq (Closes: #1109923)",
                            ""
                        ],
                        "package": "sg3-utils",
                        "version": "1.48-3",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Jonathan McDowell <noodles@earth.li>",
                        "date": "Sun, 17 Aug 2025 12:28:23 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "sg3-utils-udev",
                "from_version": {
                    "source_package_name": "sg3-utils",
                    "source_package_version": "1.48-2ubuntu1",
                    "version": "1.48-2ubuntu1"
                },
                "to_version": {
                    "source_package_name": "sg3-utils",
                    "source_package_version": "1.48-3ubuntu1",
                    "version": "1.48-3ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2125993
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian unstable (LP: #2125993). Remaining changes:",
                            "    - d/p/0001-Fix-path-for-udevadm.patch: update to match 1.48 and use /usr/bin",
                            ""
                        ],
                        "package": "sg3-utils",
                        "version": "1.48-3ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2125993
                        ],
                        "author": "Hector Cao <hector.cao@canonical.com>",
                        "date": "Mon, 24 Nov 2025 15:28:07 +0100"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Add fix for missing output fields in sg_inq (Closes: #1109923)",
                            ""
                        ],
                        "package": "sg3-utils",
                        "version": "1.48-3",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Jonathan McDowell <noodles@earth.li>",
                        "date": "Sun, 17 Aug 2025 12:28:23 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "tmux",
                "from_version": {
                    "source_package_name": "tmux",
                    "source_package_version": "3.5a-3build1",
                    "version": "3.5a-3build1"
                },
                "to_version": {
                    "source_package_name": "tmux",
                    "source_package_version": "3.6a-1",
                    "version": "3.6a-1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  [ Sébastien Delafond ]",
                            "  * Add d/gbp.conf",
                            "  * d/watch: v5",
                            "  * Bump up Standards-Version",
                            "  * d/gbp: use pristine-tar",
                            "  * d/gbp: use gz",
                            "  * d/watch: uversion mangle",
                            "  * New upstream version 3.6a",
                            "  * Rediff patches",
                            ""
                        ],
                        "package": "tmux",
                        "version": "3.6a-1",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Sebastien Delafond <seb@debian.org>",
                        "date": "Wed, 26 Nov 2025 16:50:39 +0100"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-kernel-accessories",
                "from_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.561",
                    "version": "1.561"
                },
                "to_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.562",
                    "version": "1.562"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Refreshed dependencies",
                            "  * Removed gnome-accessibility-themes from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-gsettings from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-networkmanager from desktop-minimal-",
                            "    recommends, desktop-raspi-recommends, desktop-recommends",
                            ""
                        ],
                        "package": "ubuntu-meta",
                        "version": "1.562",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Jeremy Bícha <jbicha@ubuntu.com>",
                        "date": "Fri, 28 Nov 2025 16:14:30 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-minimal",
                "from_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.561",
                    "version": "1.561"
                },
                "to_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.562",
                    "version": "1.562"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Refreshed dependencies",
                            "  * Removed gnome-accessibility-themes from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-gsettings from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-networkmanager from desktop-minimal-",
                            "    recommends, desktop-raspi-recommends, desktop-recommends",
                            ""
                        ],
                        "package": "ubuntu-meta",
                        "version": "1.562",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Jeremy Bícha <jbicha@ubuntu.com>",
                        "date": "Fri, 28 Nov 2025 16:14:30 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-server",
                "from_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.561",
                    "version": "1.561"
                },
                "to_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.562",
                    "version": "1.562"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Refreshed dependencies",
                            "  * Removed gnome-accessibility-themes from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-gsettings from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-networkmanager from desktop-minimal-",
                            "    recommends, desktop-raspi-recommends, desktop-recommends",
                            ""
                        ],
                        "package": "ubuntu-meta",
                        "version": "1.562",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Jeremy Bícha <jbicha@ubuntu.com>",
                        "date": "Fri, 28 Nov 2025 16:14:30 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-standard",
                "from_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.561",
                    "version": "1.561"
                },
                "to_version": {
                    "source_package_name": "ubuntu-meta",
                    "source_package_version": "1.562",
                    "version": "1.562"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Refreshed dependencies",
                            "  * Removed gnome-accessibility-themes from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-gsettings from desktop-minimal-recommends,",
                            "    desktop-raspi-recommends, desktop-recommends",
                            "  * Removed libproxy1-plugin-networkmanager from desktop-minimal-",
                            "    recommends, desktop-raspi-recommends, desktop-recommends",
                            ""
                        ],
                        "package": "ubuntu-meta",
                        "version": "1.562",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Jeremy Bícha <jbicha@ubuntu.com>",
                        "date": "Fri, 28 Nov 2025 16:14:30 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "usb-modeswitch",
                "from_version": {
                    "source_package_name": "usb-modeswitch",
                    "source_package_version": "2.6.1-4ubuntu1",
                    "version": "2.6.1-4ubuntu1"
                },
                "to_version": {
                    "source_package_name": "usb-modeswitch",
                    "source_package_version": "2.6.2-1ubuntu1",
                    "version": "2.6.2-1ubuntu1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Merge with Debian unstable. Remaining changes:",
                            "    - debian/control:",
                            "      + Drop build-deps jimsh and libjim-dev",
                            "      + Depends on tcl",
                            "    - debian/rules: don't use the dynlink option, we use tcl rather than",
                            "      libjim which is in Universe",
                            ""
                        ],
                        "package": "usb-modeswitch",
                        "version": "2.6.2-1ubuntu1",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [],
                        "author": "Sudip Mukherjee <sudipm.mukherjee@gmail.com>",
                        "date": "Mon, 01 Dec 2025 20:03:05 +0000"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * New upstream release. (Closes: #1098047)",
                            "  * debian/watch: update to use xml file now",
                            "  * debian/control: use standard 4.7.2 (no changes)",
                            ""
                        ],
                        "package": "usb-modeswitch",
                        "version": "2.6.2-1",
                        "urgency": "medium",
                        "distributions": "unstable",
                        "launchpad_bugs_fixed": [],
                        "author": "Thorsten Alteholz <debian@alteholz.de>",
                        "date": "Tue, 23 Sep 2025 17:57:14 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [
            {
                "name": "linux-headers-6.17.0-6",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": "linux-headers-6.17.0-6 version '6.17.0-6.6' (source package linux version '6.17.0-6.6') was added. linux-headers-6.17.0-6 version '6.17.0-6.6' has the same source package name, linux, as removed package linux-headers-6.17.0-5. As such we can use the source package version of the removed package, '6.17.0-5.5', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-6.17.0-6-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": "linux-headers-6.17.0-6-generic version '6.17.0-6.6' (source package linux version '6.17.0-6.6') was added. linux-headers-6.17.0-6-generic version '6.17.0-6.6' has the same source package name, linux, as removed package linux-headers-6.17.0-5. As such we can use the source package version of the removed package, '6.17.0-5.5', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-6.17.0-6-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": "linux-image-6.17.0-6-generic version '6.17.0-6.6' (source package linux version '6.17.0-6.6') was added. linux-image-6.17.0-6-generic version '6.17.0-6.6' has the same source package name, linux, as removed package linux-headers-6.17.0-5. As such we can use the source package version of the removed package, '6.17.0-5.5', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.17.0-6-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": "linux-modules-6.17.0-6-generic version '6.17.0-6.6' (source package linux version '6.17.0-6.6') was added. linux-modules-6.17.0-6-generic version '6.17.0-6.6' has the same source package name, linux, as removed package linux-headers-6.17.0-5. As such we can use the source package version of the removed package, '6.17.0-5.5', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.17.0-6",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": "linux-tools-6.17.0-6 version '6.17.0-6.6' (source package linux version '6.17.0-6.6') was added. linux-tools-6.17.0-6 version '6.17.0-6.6' has the same source package name, linux, as removed package linux-headers-6.17.0-5. As such we can use the source package version of the removed package, '6.17.0-5.5', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.17.0-6-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-6.6",
                    "version": "6.17.0-6.6"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2126040,
                    2126948,
                    1981437
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * questing/linux: 6.17.0-6.6 -proposed tracker (LP: #2126040)",
                            "",
                            "  * Questing update: v6.17.1 upstream stable release (LP: #2126948)",
                            "    - blk-mq: fix blk_mq_tags double free while nr_requests grown",
                            "    - gcc-plugins: Remove TODO_verify_il for GCC >= 16",
                            "    - scsi: target: target_core_configfs: Add length check to avoid buffer",
                            "      overflow",
                            "    - ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free",
                            "    - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()",
                            "    - media: b2c2: Fix use-after-free causing by irq_check_work in",
                            "      flexcop_pci_remove",
                            "    - media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in",
                            "      probe",
                            "    - media: tuner: xc5000: Fix use-after-free in xc5000_release",
                            "    - media: rc: fix races with imon_disconnect()",
                            "    - media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID",
                            "    - mm: swap: check for stable address space before operating on the VMA",
                            "    - wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()",
                            "    - media: iris: Fix memory leak by freeing untracked persist buffer",
                            "    - media: stm32-csi: Fix dereference before NULL check",
                            "    - ASoC: qcom: audioreach: fix potential null pointer dereference",
                            "    - Linux 6.17.1",
                            "",
                            "  * RISC-V kernel config is out of sync with other archs (LP: #1981437)",
                            "    - [Config] riscv64: Update EFI_SBAT_FILE",
                            "    - [Config] riscv64: Enable EFI_ZBOOT",
                            "    - [Config] riscv64: Disable support for non-RVA23 SoCs",
                            "    - [Config] riscv64: Disable RISCV_ISA_FALLBACK",
                            "    - [Config] riscv64: Sync config with other architectures",
                            "",
                            "  * Miscellaneous Ubuntu changes",
                            "    - [Config] updateconfigs after rebase to 6.17",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.17.0-6.6",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2126040,
                            2126948,
                            1981437
                        ],
                        "author": "Timo Aaltonen <timo.aaltonen@canonical.com>",
                        "date": "Tue, 07 Oct 2025 14:15:18 +0300"
                    }
                ],
                "notes": "linux-tools-6.17.0-6-generic version '6.17.0-6.6' (source package linux version '6.17.0-6.6') was added. linux-tools-6.17.0-6-generic version '6.17.0-6.6' has the same source package name, linux, as removed package linux-headers-6.17.0-5. As such we can use the source package version of the removed package, '6.17.0-5.5', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "removed": {
        "deb": [
            {
                "name": "gir1.2-girepository-2.0:ppc64el",
                "from_version": {
                    "source_package_name": "gobject-introspection",
                    "source_package_version": "1.86.0-6",
                    "version": "1.86.0-6"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libgirepository-1.0-1:ppc64el",
                "from_version": {
                    "source_package_name": "gobject-introspection",
                    "source_package_version": "1.86.0-6",
                    "version": "1.86.0-6"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-6.17.0-5",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-6.17.0-5-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-6.17.0-5-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.17.0-5-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.17.0-5",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.17.0-5-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.17.0-5.5",
                    "version": "6.17.0-5.5"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 26.04 resolute image from daily image serial 20251126 to 20251202",
    "from_series": "resolute",
    "to_series": "resolute",
    "from_serial": "20251126",
    "to_serial": "20251202",
    "from_manifest_filename": "daily_manifest.previous",
    "to_manifest_filename": "manifest.current"
}