{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "libpython3.13:ppc64el",
                "libpython3.13-minimal:ppc64el",
                "libpython3.13-stdlib:ppc64el",
                "python3.13",
                "python3.13-gdbm",
                "python3.13-minimal",
                "ubuntu-pro-client",
                "ubuntu-pro-client-l10n"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "libpython3.13:ppc64el",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.3",
                    "version": "3.13.3-1ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.4",
                    "version": "3.13.3-1ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.3-1ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "plucky-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:23:35 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.13-minimal:ppc64el",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.3",
                    "version": "3.13.3-1ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.4",
                    "version": "3.13.3-1ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.3-1ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "plucky-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:23:35 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.13-stdlib:ppc64el",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.3",
                    "version": "3.13.3-1ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.4",
                    "version": "3.13.3-1ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.3-1ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "plucky-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:23:35 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.3",
                    "version": "3.13.3-1ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.4",
                    "version": "3.13.3-1ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.3-1ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "plucky-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:23:35 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13-gdbm",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.3",
                    "version": "3.13.3-1ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.4",
                    "version": "3.13.3-1ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.3-1ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "plucky-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:23:35 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13-minimal",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.3",
                    "version": "3.13.3-1ubuntu0.3"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.3-1ubuntu0.4",
                    "version": "3.13.3-1ubuntu0.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.3-1ubuntu0.4",
                        "urgency": "medium",
                        "distributions": "plucky-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:23:35 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-pro-client",
                "from_version": {
                    "source_package_name": "ubuntu-advantage-tools",
                    "source_package_version": "36ubuntu0~25.04",
                    "version": "36ubuntu0~25.04"
                },
                "to_version": {
                    "source_package_name": "ubuntu-advantage-tools",
                    "source_package_version": "37.1ubuntu0~25.04",
                    "version": "37.1ubuntu0~25.04"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2129712,
                    2129712,
                    2123870,
                    2125453,
                    2107604
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport 37.1ubuntu0 to plucky (LP: #2129712)",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37.1ubuntu0~25.04",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [
                            2129712
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Mon, 27 Oct 2025 09:42:17 -0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * do-release-upgrade: immediately release the APT lock acquired to run the",
                            "    post-upgrade hook (LP: #2129712)",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37.1ubuntu0",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2129712
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Thu, 23 Oct 2025 16:30:36 -0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/apparmor/ubuntu_pro_[apt_news|esm_cache].jinja2: update coreutils path",
                            "    Thanks to Georgia Garcia <georgia.garcia@canonical.com> (LP: #2123870)",
                            "  * New upstream release 37: (LP: #2125453)",
                            "    - attach: don't show a notice if attaching a one-time token set for a",
                            "      future release (GH: #3485)",
                            "    - enable: add the --auto option to enable all default services based on",
                            "      the contract",
                            "    - entitlements:",
                            "      + add esm-infra-legacy support",
                            "      + add esm-apps-legacy support",
                            "    - fips: show correct kernel versions when downgrading on clouds (GH: #3488)",
                            "    - upgrade-lts-contract: (LP: #2107604)",
                            "      + remove implicit dependency on lsof",
                            "      + fix the logic to hold the apt lock while performing operations",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37ubuntu0",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2123870,
                            2125453,
                            2107604
                        ],
                        "author": "Renan Rodrigo <renanrodrigo@canonical.com>",
                        "date": "Mon, 22 Sep 2025 21:51:46 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-pro-client-l10n",
                "from_version": {
                    "source_package_name": "ubuntu-advantage-tools",
                    "source_package_version": "36ubuntu0~25.04",
                    "version": "36ubuntu0~25.04"
                },
                "to_version": {
                    "source_package_name": "ubuntu-advantage-tools",
                    "source_package_version": "37.1ubuntu0~25.04",
                    "version": "37.1ubuntu0~25.04"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2129712,
                    2129712,
                    2123870,
                    2125453,
                    2107604
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Backport 37.1ubuntu0 to plucky (LP: #2129712)",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37.1ubuntu0~25.04",
                        "urgency": "medium",
                        "distributions": "plucky",
                        "launchpad_bugs_fixed": [
                            2129712
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Mon, 27 Oct 2025 09:42:17 -0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * do-release-upgrade: immediately release the APT lock acquired to run the",
                            "    post-upgrade hook (LP: #2129712)",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37.1ubuntu0",
                        "urgency": "medium",
                        "distributions": "resolute",
                        "launchpad_bugs_fixed": [
                            2129712
                        ],
                        "author": "Renan Rodrigo <rr@ubuntu.com>",
                        "date": "Thu, 23 Oct 2025 16:30:36 -0300"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/apparmor/ubuntu_pro_[apt_news|esm_cache].jinja2: update coreutils path",
                            "    Thanks to Georgia Garcia <georgia.garcia@canonical.com> (LP: #2123870)",
                            "  * New upstream release 37: (LP: #2125453)",
                            "    - attach: don't show a notice if attaching a one-time token set for a",
                            "      future release (GH: #3485)",
                            "    - enable: add the --auto option to enable all default services based on",
                            "      the contract",
                            "    - entitlements:",
                            "      + add esm-infra-legacy support",
                            "      + add esm-apps-legacy support",
                            "    - fips: show correct kernel versions when downgrading on clouds (GH: #3488)",
                            "    - upgrade-lts-contract: (LP: #2107604)",
                            "      + remove implicit dependency on lsof",
                            "      + fix the logic to hold the apt lock while performing operations",
                            ""
                        ],
                        "package": "ubuntu-advantage-tools",
                        "version": "37ubuntu0",
                        "urgency": "medium",
                        "distributions": "questing",
                        "launchpad_bugs_fixed": [
                            2123870,
                            2125453,
                            2107604
                        ],
                        "author": "Renan Rodrigo <renanrodrigo@canonical.com>",
                        "date": "Mon, 22 Sep 2025 21:51:46 -0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 25.04 plucky image from release image serial 20251122 to 20251127",
    "from_series": "plucky",
    "to_series": "plucky",
    "from_serial": "20251122",
    "to_serial": "20251127",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}