{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "cloud-init",
                "libgnutls30"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "cloud-init",
                "from_version": {
                    "source_package_name": "cloud-init",
                    "source_package_version": "25.2-0ubuntu1~22.04.1",
                    "version": "25.2-0ubuntu1~22.04.1"
                },
                "to_version": {
                    "source_package_name": "cloud-init",
                    "source_package_version": "25.3-0ubuntu1~22.04.1",
                    "version": "25.3-0ubuntu1~22.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2131604
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/retain-setuptools.patch: void upstream switch to meson build backend.",
                            "  * refresh patches:",
                            "    - d/p/cli-retain-file-argument-as-main-cmd-arg.patch",
                            "    - d/p/grub-dpkg-support.patch",
                            "    - d/p/no-nocloud-network.patch",
                            "    - d/p/no-single-process.patch",
                            "  * Upstream snapshot based on 25.3. (LP: #2131604).",
                            "    List of changes from upstream can be found at",
                            "    https://raw.githubusercontent.com/canonical/cloud-init/25.3/ChangeLog",
                            ""
                        ],
                        "package": "cloud-init",
                        "version": "25.3-0ubuntu1~22.04.1",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [
                            2131604
                        ],
                        "author": "Chad Smith <chad.smith@canonical.com>",
                        "date": "Sat, 15 Nov 2025 11:11:25 -0700"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libgnutls30",
                "from_version": {
                    "source_package_name": "gnutls28",
                    "source_package_version": "3.7.3-4ubuntu1.7",
                    "version": "3.7.3-4ubuntu1.7"
                },
                "to_version": {
                    "source_package_name": "gnutls28",
                    "source_package_version": "3.7.3-4ubuntu1.8",
                    "version": "3.7.3-4ubuntu1.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-14831",
                        "url": "https://ubuntu.com/security/CVE-2025-14831",
                        "cve_description": "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).",
                        "cve_priority": "medium",
                        "cve_public_date": "2026-02-09 15:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-9820",
                        "url": "https://ubuntu.com/security/CVE-2025-9820",
                        "cve_description": "A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.",
                        "cve_priority": "low",
                        "cve_public_date": "2026-01-26 20:16:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-14831",
                                "url": "https://ubuntu.com/security/CVE-2025-14831",
                                "cve_description": "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).",
                                "cve_priority": "medium",
                                "cve_public_date": "2026-02-09 15:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-9820",
                                "url": "https://ubuntu.com/security/CVE-2025-9820",
                                "cve_description": "A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.",
                                "cve_priority": "low",
                                "cve_public_date": "2026-01-26 20:16:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: DoS via malicious certificates",
                            "    - debian/patches/CVE-2025-14831-*.patch: rework processing algorithms",
                            "      to exhibit better performance characteristics in",
                            "      lib/x509/name_constraints.c, tests/name-constraints-ip.c.",
                            "    - CVE-2025-14831",
                            "  * SECURITY UPDATE: stack overflow via long token label",
                            "    - debian/patches/CVE-2025-9820.patch: avoid stack overwrite when",
                            "      initializing a token in lib/pkcs11_write.c, tests/Makefile.am,",
                            "      tests/pkcs11/long-label.c.",
                            "    - CVE-2025-9820",
                            ""
                        ],
                        "package": "gnutls28",
                        "version": "3.7.3-4ubuntu1.8",
                        "urgency": "medium",
                        "distributions": "jammy-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 10 Feb 2026 12:28:21 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 22.04 jammy image from release image serial 20260216 to 20260218",
    "from_series": "jammy",
    "to_series": "jammy",
    "from_serial": "20260216",
    "to_serial": "20260218",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}