{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "libssh-4:riscv64"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "libssh-4:riscv64",
                "from_version": {
                    "source_package_name": "libssh",
                    "source_package_version": "0.9.6-2ubuntu0.22.04.5",
                    "version": "0.9.6-2ubuntu0.22.04.5"
                },
                "to_version": {
                    "source_package_name": "libssh",
                    "source_package_version": "0.9.6-2ubuntu0.22.04.6",
                    "version": "0.9.6-2ubuntu0.22.04.6"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8277",
                        "url": "https://ubuntu.com/security/CVE-2025-8277",
                        "cve_description": "A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.",
                        "cve_priority": "low",
                        "cve_public_date": "2025-09-09 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2026-0964",
                        "url": "https://ubuntu.com/security/CVE-2026-0964",
                        "cve_description": "[Improper sanitation of paths received from SCP servers]",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-02-13"
                    },
                    {
                        "cve": "CVE-2026-0965",
                        "url": "https://ubuntu.com/security/CVE-2026-0965",
                        "cve_description": "[Denial of Service via improper configuration file handling]",
                        "cve_priority": "low",
                        "cve_public_date": "2026-02-13"
                    },
                    {
                        "cve": "CVE-2026-0966",
                        "url": "https://ubuntu.com/security/CVE-2026-0966",
                        "cve_description": "[Buffer underflow in ssh_get_hexa() on invalid input]",
                        "cve_priority": "low",
                        "cve_public_date": "2026-02-13"
                    },
                    {
                        "cve": "CVE-2026-0967",
                        "url": "https://ubuntu.com/security/CVE-2026-0967",
                        "cve_description": "[Denial of Service via inefficient regular expression processing]",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-02-13"
                    },
                    {
                        "cve": "CVE-2026-0968",
                        "url": "https://ubuntu.com/security/CVE-2026-0968",
                        "cve_description": "[Denial of Service due to malformed SFTP message]",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-02-13"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8277",
                                "url": "https://ubuntu.com/security/CVE-2025-8277",
                                "cve_description": "A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.",
                                "cve_priority": "low",
                                "cve_public_date": "2025-09-09 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2026-0964",
                                "url": "https://ubuntu.com/security/CVE-2026-0964",
                                "cve_description": "[Improper sanitation of paths received from SCP servers]",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-02-13"
                            },
                            {
                                "cve": "CVE-2026-0965",
                                "url": "https://ubuntu.com/security/CVE-2026-0965",
                                "cve_description": "[Denial of Service via improper configuration file handling]",
                                "cve_priority": "low",
                                "cve_public_date": "2026-02-13"
                            },
                            {
                                "cve": "CVE-2026-0966",
                                "url": "https://ubuntu.com/security/CVE-2026-0966",
                                "cve_description": "[Buffer underflow in ssh_get_hexa() on invalid input]",
                                "cve_priority": "low",
                                "cve_public_date": "2026-02-13"
                            },
                            {
                                "cve": "CVE-2026-0967",
                                "url": "https://ubuntu.com/security/CVE-2026-0967",
                                "cve_description": "[Denial of Service via inefficient regular expression processing]",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-02-13"
                            },
                            {
                                "cve": "CVE-2026-0968",
                                "url": "https://ubuntu.com/security/CVE-2026-0968",
                                "cve_description": "[Denial of Service due to malformed SFTP message]",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-02-13"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: memory leak in key exchange",
                            "    - debian/patches/CVE-2025-8277-1.patch: adjust packet filter to work",
                            "      when DH-GEX is guessed wrongly in src/packet.c.",
                            "    - debian/patches/CVE-2025-8277-2.patch: fix memory leak of unused",
                            "      ephemeral key pair after client's wrong KEX guess in src/dh_crypto.c,",
                            "      src/dh_key.c, src/ecdh_crypto.c, src/ecdh_gcrypt.c,",
                            "      src/ecdh_mbedcrypto.c.",
                            "    - debian/patches/CVE-2025-8277-3.patch: free previously allocated",
                            "      pubkeys in src/ecdh_crypto.c, src/ecdh_gcrypt.c.",
                            "    - debian/patches/CVE-2025-8277-4.patch: avoid leaking ecdh keys in",
                            "      src/ecdh_mbedcrypto.c, src/wrapper.c.",
                            "    - CVE-2025-8277",
                            "  * SECURITY UPDATE: Improper sanitation of paths received from SCP servers",
                            "    - debian/patches/CVE-2026-0964.patch: reject invalid paths received",
                            "      through scp in src/scp.c.",
                            "    - CVE-2026-0964",
                            "  * SECURITY UPDATE: DoS via improper configuration file handling",
                            "    - debian/patches/CVE-2026-0965.patch: do not attempt to read",
                            "      non-regular and too large configuration files in",
                            "      include/libssh/misc.h, include/libssh/priv.h, src/bind_config.c,",
                            "      src/config.c, src/dh-gex.c, src/known_hosts.c, src/knownhosts.c,",
                            "      src/misc.c, tests/unittests/torture_config.c.",
                            "    - CVE-2026-0965",
                            "  * SECURITY UPDATE: Buffer underflow in ssh_get_hexa() on invalid input",
                            "    - debian/patches/CVE-2026-0966-1.patch: avoid heap buffer underflow in",
                            "      ssh_get_hexa in src/misc.c.",
                            "    - debian/patches/CVE-2026-0966-2.patch: test coverage for ssh_get_hexa",
                            "      in tests/unittests/torture_misc.c.",
                            "    - debian/patches/CVE-2026-0966-3.patch: update guided tour to use",
                            "      SHA256 fingerprints in doc/guided_tour.dox.",
                            "    - CVE-2026-0966",
                            "  * SECURITY UPDATE: DoS via inefficient regular expression processing",
                            "    - debian/patches/CVE-2026-0967.patch: avoid recursive matching (ReDoS)",
                            "      in src/match.c, tests/unittests/torture_config.c.",
                            "    - CVE-2026-0967",
                            "  * SECURITY UPDATE: DoS due to malformed SFTP message",
                            "    - debian/patches/CVE-2026-0968-1.patch: sanitize input handling in",
                            "      sftp_parse_longname() in src/sftp.c.",
                            "    - debian/patches/CVE-2026-0968-2.patch: reproducer for invalid longname",
                            "      data in tests/unittests/CMakeLists.txt,",
                            "      tests/unittests/torture_unit_sftp.c.",
                            "    - CVE-2026-0968",
                            ""
                        ],
                        "package": "libssh",
                        "version": "0.9.6-2ubuntu0.22.04.6",
                        "urgency": "medium",
                        "distributions": "jammy-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Fri, 13 Feb 2026 10:22:49 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 22.04 jammy image from release image serial 20260218 to 20260219",
    "from_series": "jammy",
    "to_series": "jammy",
    "from_serial": "20260218",
    "to_serial": "20260219",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}