{ "summary": { "snap": { "added": [], "removed": [], "diff": [ "lxd" ] }, "deb": { "added": [], "removed": [], "diff": [ "bind9-dnsutils", "bind9-host", "bind9-libs:riscv64", "libldap-2.5-0:riscv64", "libldap-common", "python3-zipp" ] } }, "diff": { "deb": [ { "name": "bind9-dnsutils", "from_version": { "source_package_name": "bind9", "source_package_version": "1:9.18.24-0ubuntu0.22.04.1", "version": "1:9.18.24-0ubuntu0.22.04.1" }, "to_version": { "source_package_name": "bind9", "source_package_version": "1:9.18.28-0ubuntu0.22.04.1", "version": "1:9.18.28-0ubuntu0.22.04.1" }, "cves": [ { "cve": "CVE-2024-0760", "url": "https://ubuntu.com/security/CVE-2024-0760", "cve_description": "A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1737", "url": "https://ubuntu.com/security/CVE-2024-1737", "cve_description": "Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1975", "url": "https://ubuntu.com/security/CVE-2024-1975", "cve_description": "If a server hosts a zone containing a \"KEY\" Resource Record, or a resolver DNSSEC-validates a \"KEY\" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-4076", "url": "https://ubuntu.com/security/CVE-2024-4076", "cve_description": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-0760", "url": "https://ubuntu.com/security/CVE-2024-0760", "cve_description": "A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1737", "url": "https://ubuntu.com/security/CVE-2024-1737", "cve_description": "Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1975", "url": "https://ubuntu.com/security/CVE-2024-1975", "cve_description": "If a server hosts a zone containing a \"KEY\" Resource Record, or a resolver DNSSEC-validates a \"KEY\" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-4076", "url": "https://ubuntu.com/security/CVE-2024-4076", "cve_description": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" } ], "log": [ "", " * Updated to 9.18.28 to fix multiple security issues.", " - CVE-2024-0760: A flood of DNS messages over TCP may make the server", " unstable", " - CVE-2024-1737: BIND's database will be slow if a very large number of", " RRs exist at the same name", " - CVE-2024-1975: SIG(0) can be used to exhaust CPU resources", " - CVE-2024-4076: Assertion failure when serving both stale cache data", " and authoritative zone content", "" ], "package": "bind9", "version": "1:9.18.28-0ubuntu0.22.04.1", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 16 Jul 2024 14:16:20 -0400" } ], "notes": null }, { "name": "bind9-host", "from_version": { "source_package_name": "bind9", "source_package_version": "1:9.18.24-0ubuntu0.22.04.1", "version": "1:9.18.24-0ubuntu0.22.04.1" }, "to_version": { "source_package_name": "bind9", "source_package_version": "1:9.18.28-0ubuntu0.22.04.1", "version": "1:9.18.28-0ubuntu0.22.04.1" }, "cves": [ { "cve": "CVE-2024-0760", "url": "https://ubuntu.com/security/CVE-2024-0760", "cve_description": "A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1737", "url": "https://ubuntu.com/security/CVE-2024-1737", "cve_description": "Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1975", "url": "https://ubuntu.com/security/CVE-2024-1975", "cve_description": "If a server hosts a zone containing a \"KEY\" Resource Record, or a resolver DNSSEC-validates a \"KEY\" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-4076", "url": "https://ubuntu.com/security/CVE-2024-4076", "cve_description": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-0760", "url": "https://ubuntu.com/security/CVE-2024-0760", "cve_description": "A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1737", "url": "https://ubuntu.com/security/CVE-2024-1737", "cve_description": "Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1975", "url": "https://ubuntu.com/security/CVE-2024-1975", "cve_description": "If a server hosts a zone containing a \"KEY\" Resource Record, or a resolver DNSSEC-validates a \"KEY\" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-4076", "url": "https://ubuntu.com/security/CVE-2024-4076", "cve_description": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" } ], "log": [ "", " * Updated to 9.18.28 to fix multiple security issues.", " - CVE-2024-0760: A flood of DNS messages over TCP may make the server", " unstable", " - CVE-2024-1737: BIND's database will be slow if a very large number of", " RRs exist at the same name", " - CVE-2024-1975: SIG(0) can be used to exhaust CPU resources", " - CVE-2024-4076: Assertion failure when serving both stale cache data", " and authoritative zone content", "" ], "package": "bind9", "version": "1:9.18.28-0ubuntu0.22.04.1", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 16 Jul 2024 14:16:20 -0400" } ], "notes": null }, { "name": "bind9-libs:riscv64", "from_version": { "source_package_name": "bind9", "source_package_version": "1:9.18.24-0ubuntu0.22.04.1", "version": "1:9.18.24-0ubuntu0.22.04.1" }, "to_version": { "source_package_name": "bind9", "source_package_version": "1:9.18.28-0ubuntu0.22.04.1", "version": "1:9.18.28-0ubuntu0.22.04.1" }, "cves": [ { "cve": "CVE-2024-0760", "url": "https://ubuntu.com/security/CVE-2024-0760", "cve_description": "A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1737", "url": "https://ubuntu.com/security/CVE-2024-1737", "cve_description": "Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1975", "url": "https://ubuntu.com/security/CVE-2024-1975", "cve_description": "If a server hosts a zone containing a \"KEY\" Resource Record, or a resolver DNSSEC-validates a \"KEY\" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-4076", "url": "https://ubuntu.com/security/CVE-2024-4076", "cve_description": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-0760", "url": "https://ubuntu.com/security/CVE-2024-0760", "cve_description": "A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1737", "url": "https://ubuntu.com/security/CVE-2024-1737", "cve_description": "Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-1975", "url": "https://ubuntu.com/security/CVE-2024-1975", "cve_description": "If a server hosts a zone containing a \"KEY\" Resource Record, or a resolver DNSSEC-validates a \"KEY\" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" }, { "cve": "CVE-2024-4076", "url": "https://ubuntu.com/security/CVE-2024-4076", "cve_description": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.", "cve_priority": "medium", "cve_public_date": "2024-07-23 15:15:00 UTC" } ], "log": [ "", " * Updated to 9.18.28 to fix multiple security issues.", " - CVE-2024-0760: A flood of DNS messages over TCP may make the server", " unstable", " - CVE-2024-1737: BIND's database will be slow if a very large number of", " RRs exist at the same name", " - CVE-2024-1975: SIG(0) can be used to exhaust CPU resources", " - CVE-2024-4076: Assertion failure when serving both stale cache data", " and authoritative zone content", "" ], "package": "bind9", "version": "1:9.18.28-0ubuntu0.22.04.1", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 16 Jul 2024 14:16:20 -0400" } ], "notes": null }, { "name": "libldap-2.5-0:riscv64", "from_version": { "source_package_name": "openldap", "source_package_version": "2.5.18+dfsg-0ubuntu0.22.04.1", "version": "2.5.18+dfsg-0ubuntu0.22.04.1" }, "to_version": { "source_package_name": "openldap", "source_package_version": "2.5.18+dfsg-0ubuntu0.22.04.2", "version": "2.5.18+dfsg-0ubuntu0.22.04.2" }, "cves": [], "launchpad_bugs_fixed": [ 2072976 ], "changes": [ { "cves": [], "log": [ "", " * d/p/remove-extraneous-quote-configure-ac.patch: Remove extraneous", " quote from configure.ac, fixing loading of back_perl. (LP: #2072976)", "" ], "package": "openldap", "version": "2.5.18+dfsg-0ubuntu0.22.04.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2072976 ], "author": "Sergio Durigan Junior ", "date": "Fri, 12 Jul 2024 17:51:23 -0400" } ], "notes": null }, { "name": "libldap-common", "from_version": { "source_package_name": "openldap", "source_package_version": "2.5.18+dfsg-0ubuntu0.22.04.1", "version": "2.5.18+dfsg-0ubuntu0.22.04.1" }, "to_version": { "source_package_name": "openldap", "source_package_version": "2.5.18+dfsg-0ubuntu0.22.04.2", "version": "2.5.18+dfsg-0ubuntu0.22.04.2" }, "cves": [], "launchpad_bugs_fixed": [ 2072976 ], "changes": [ { "cves": [], "log": [ "", " * d/p/remove-extraneous-quote-configure-ac.patch: Remove extraneous", " quote from configure.ac, fixing loading of back_perl. (LP: #2072976)", "" ], "package": "openldap", "version": "2.5.18+dfsg-0ubuntu0.22.04.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2072976 ], "author": "Sergio Durigan Junior ", "date": "Fri, 12 Jul 2024 17:51:23 -0400" } ], "notes": null }, { "name": "python3-zipp", "from_version": { "source_package_name": "python-zipp", "source_package_version": "1.0.0-3", "version": "1.0.0-3" }, "to_version": { "source_package_name": "python-zipp", "source_package_version": "1.0.0-3ubuntu0.1", "version": "1.0.0-3ubuntu0.1" }, "cves": [ { "cve": "CVE-2024-5569", "url": "https://ubuntu.com/security/CVE-2024-5569", "cve_description": "A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the `Path` module in both zipp and zipfile, such as `joinpath`, the overloaded division operator, and `iterdir`. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.", "cve_priority": "medium", "cve_public_date": "2024-07-09 00:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-5569", "url": "https://ubuntu.com/security/CVE-2024-5569", "cve_description": "A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the `Path` module in both zipp and zipfile, such as `joinpath`, the overloaded division operator, and `iterdir`. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.", "cve_priority": "medium", "cve_public_date": "2024-07-09 00:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: denial of service vulnerability", " - debian/patches/CVE-2024-5569.patch: Sanitize malformed paths", " - CVE-2024-5569", "" ], "package": "python-zipp", "version": "1.0.0-3ubuntu0.1", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Shishir Subedi ", "date": "Sun, 21 Jul 2024 20:11:39 +0545" } ], "notes": null } ], "snap": [ { "name": "lxd", "from_version": { "source_package_name": null, "source_package_version": null, "version": "28388" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": "29375" } } ] }, "added": { "deb": [], "snap": [] }, "removed": { "deb": [], "snap": [] }, "notes": "Changelog diff for Ubuntu 22.04 jammy image from release image serial 20240716 to 20240726", "from_series": "jammy", "to_series": "jammy", "from_serial": "20240716", "to_serial": "20240726", "from_manifest_filename": "release_manifest.previous", "to_manifest_filename": "manifest.current" }