{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "gcc-14-base",
                "libexpat1",
                "libgcc-s1",
                "libgnutls30t64",
                "libpng16-16t64",
                "libstdc++6"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "gcc-14-base",
                "from_version": {
                    "source_package_name": "gcc-14",
                    "source_package_version": "14.2.0-4ubuntu2~24.04",
                    "version": "14.2.0-4ubuntu2~24.04"
                },
                "to_version": {
                    "source_package_name": "gcc-14",
                    "source_package_version": "14.2.0-4ubuntu2~24.04.1",
                    "version": "14.2.0-4ubuntu2~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2101084
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/pr118976.diff: Fix memory corruption when executing 256-bit",
                            "    Scalable Vector Extensions code on 128-bit CPUs (LP: #2101084).",
                            ""
                        ],
                        "package": "gcc-14",
                        "version": "14.2.0-4ubuntu2~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2101084
                        ],
                        "author": "Vladimir Petko <vladimir.petko@canonical.com>",
                        "date": "Fri, 19 Dec 2025 10:36:50 +1300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libexpat1",
                "from_version": {
                    "source_package_name": "expat",
                    "source_package_version": "2.6.1-2ubuntu0.3",
                    "version": "2.6.1-2ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "expat",
                    "source_package_version": "2.6.1-2ubuntu0.4",
                    "version": "2.6.1-2ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-24515",
                        "url": "https://ubuntu.com/security/CVE-2026-24515",
                        "cve_description": "In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-01-23 08:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2026-25210",
                        "url": "https://ubuntu.com/security/CVE-2026-25210",
                        "cve_description": "In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-01-30 07:16:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-24515",
                                "url": "https://ubuntu.com/security/CVE-2026-24515",
                                "cve_description": "In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-01-23 08:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2026-25210",
                                "url": "https://ubuntu.com/security/CVE-2026-25210",
                                "cve_description": "In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-01-30 07:16:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: NULL pointer dereference",
                            "    - debian/patches/CVE-2026-24515.patch: updates",
                            "      XML_ExternalEntityParserCreate to copy unknown encoding handler user",
                            "      data in expat/lib/xmlparse.c.",
                            "    - CVE-2026-24515",
                            "  * SECURITY UPDATE: integer overflow",
                            "    - debian/patches/CVE-2026-25210*.patch: adds an integer overflow check for",
                            "      tag buffer reallocation in the doContent function of",
                            "      expat/lib/xmlparse.c.",
                            "    - CVE-2026-25210",
                            ""
                        ],
                        "package": "expat",
                        "version": "2.6.1-2ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Ian Constantin <ian.constantin@canonical.com>",
                        "date": "Wed, 04 Feb 2026 17:24:08 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libgcc-s1",
                "from_version": {
                    "source_package_name": "gcc-14",
                    "source_package_version": "14.2.0-4ubuntu2~24.04",
                    "version": "14.2.0-4ubuntu2~24.04"
                },
                "to_version": {
                    "source_package_name": "gcc-14",
                    "source_package_version": "14.2.0-4ubuntu2~24.04.1",
                    "version": "14.2.0-4ubuntu2~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2101084
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/pr118976.diff: Fix memory corruption when executing 256-bit",
                            "    Scalable Vector Extensions code on 128-bit CPUs (LP: #2101084).",
                            ""
                        ],
                        "package": "gcc-14",
                        "version": "14.2.0-4ubuntu2~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2101084
                        ],
                        "author": "Vladimir Petko <vladimir.petko@canonical.com>",
                        "date": "Fri, 19 Dec 2025 10:36:50 +1300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libgnutls30t64",
                "from_version": {
                    "source_package_name": "gnutls28",
                    "source_package_version": "3.8.3-1.1ubuntu3.4",
                    "version": "3.8.3-1.1ubuntu3.4"
                },
                "to_version": {
                    "source_package_name": "gnutls28",
                    "source_package_version": "3.8.3-1.1ubuntu3.5",
                    "version": "3.8.3-1.1ubuntu3.5"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-14831",
                        "url": "https://ubuntu.com/security/CVE-2025-14831",
                        "cve_description": "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-02-09 15:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-9820",
                        "url": "https://ubuntu.com/security/CVE-2025-9820",
                        "cve_description": "A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.",
                        "cve_priority": "low",
                        "cve_public_date": "2026-01-26 20:16:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-14831",
                                "url": "https://ubuntu.com/security/CVE-2025-14831",
                                "cve_description": "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-02-09 15:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-9820",
                                "url": "https://ubuntu.com/security/CVE-2025-9820",
                                "cve_description": "A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.",
                                "cve_priority": "low",
                                "cve_public_date": "2026-01-26 20:16:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: DoS via malicious certificates",
                            "    - debian/patches/CVE-2025-14831-*.patch: rework processing algorithms",
                            "      to exhibit better performance characteristics in",
                            "      lib/x509/name_constraints.c, tests/name-constraints-ip.c.",
                            "    - CVE-2025-14831",
                            "  * SECURITY UPDATE: stack overflow via long token label",
                            "    - debian/patches/CVE-2025-9820.patch: avoid stack overwrite when",
                            "      initializing a token in lib/pkcs11_write.c, tests/Makefile.am,",
                            "      tests/pkcs11/long-label.c.",
                            "    - CVE-2025-9820",
                            ""
                        ],
                        "package": "gnutls28",
                        "version": "3.8.3-1.1ubuntu3.5",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 10 Feb 2026 11:09:12 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpng16-16t64",
                "from_version": {
                    "source_package_name": "libpng1.6",
                    "source_package_version": "1.6.43-5ubuntu0.4",
                    "version": "1.6.43-5ubuntu0.4"
                },
                "to_version": {
                    "source_package_name": "libpng1.6",
                    "source_package_version": "1.6.43-5ubuntu0.5",
                    "version": "1.6.43-5ubuntu0.5"
                },
                "cves": [
                    {
                        "cve": "CVE-2026-25646",
                        "url": "https://ubuntu.com/security/CVE-2026-25646",
                        "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-02-10 18:16:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2026-25646",
                                "url": "https://ubuntu.com/security/CVE-2026-25646",
                                "cve_description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-02-10 18:16:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: OOB read in png_set_quantize()",
                            "    - debian/patches/CVE-2026-25646.patch: fix a heap buffer overflow in",
                            "      pngrtran.c.",
                            "    - CVE-2026-25646",
                            ""
                        ],
                        "package": "libpng1.6",
                        "version": "1.6.43-5ubuntu0.5",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Wed, 11 Feb 2026 09:27:12 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libstdc++6",
                "from_version": {
                    "source_package_name": "gcc-14",
                    "source_package_version": "14.2.0-4ubuntu2~24.04",
                    "version": "14.2.0-4ubuntu2~24.04"
                },
                "to_version": {
                    "source_package_name": "gcc-14",
                    "source_package_version": "14.2.0-4ubuntu2~24.04.1",
                    "version": "14.2.0-4ubuntu2~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2101084
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/pr118976.diff: Fix memory corruption when executing 256-bit",
                            "    Scalable Vector Extensions code on 128-bit CPUs (LP: #2101084).",
                            ""
                        ],
                        "package": "gcc-14",
                        "version": "14.2.0-4ubuntu2~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2101084
                        ],
                        "author": "Vladimir Petko <vladimir.petko@canonical.com>",
                        "date": "Fri, 19 Dec 2025 10:36:50 +1300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 24.04 noble image from release image serial 20260209 to 20260217",
    "from_series": "noble",
    "to_series": "noble",
    "from_serial": "20260209",
    "to_serial": "20260217",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}