{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "krb5-locales",
                "libgssapi-krb5-2:armhf",
                "libk5crypto3:armhf",
                "libkrb5-3:armhf",
                "libkrb5support0:armhf",
                "openssh-client",
                "openssh-server",
                "openssh-sftp-server"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "krb5-locales",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.3",
                    "version": "1.20.1-6ubuntu2.3"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.4",
                    "version": "1.20.1-6ubuntu2.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change rebuild to solve a build issue on armhf.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 13 Feb 2025 07:23:16 -0500"
                    }
                ],
                "notes": null
            },
            {
                "name": "libgssapi-krb5-2:armhf",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.2",
                    "version": "1.20.1-6ubuntu2.2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.4",
                    "version": "1.20.1-6ubuntu2.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change rebuild to solve a build issue on armhf.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 13 Feb 2025 07:23:16 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authenticator",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596 ",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.3",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 28 Jan 2025 00:57:01 -0500"
                    }
                ],
                "notes": null
            },
            {
                "name": "libk5crypto3:armhf",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.2",
                    "version": "1.20.1-6ubuntu2.2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.4",
                    "version": "1.20.1-6ubuntu2.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change rebuild to solve a build issue on armhf.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 13 Feb 2025 07:23:16 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authenticator",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596 ",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.3",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 28 Jan 2025 00:57:01 -0500"
                    }
                ],
                "notes": null
            },
            {
                "name": "libkrb5-3:armhf",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.2",
                    "version": "1.20.1-6ubuntu2.2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.4",
                    "version": "1.20.1-6ubuntu2.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change rebuild to solve a build issue on armhf.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 13 Feb 2025 07:23:16 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authenticator",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596 ",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.3",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 28 Jan 2025 00:57:01 -0500"
                    }
                ],
                "notes": null
            },
            {
                "name": "libkrb5support0:armhf",
                "from_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.2",
                    "version": "1.20.1-6ubuntu2.2"
                },
                "to_version": {
                    "source_package_name": "krb5",
                    "source_package_version": "1.20.1-6ubuntu2.4",
                    "version": "1.20.1-6ubuntu2.4"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-3596",
                        "url": "https://ubuntu.com/security/CVE-2024-3596",
                        "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-07-09 12:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * No-change rebuild to solve a build issue on armhf.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.4",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 13 Feb 2025 07:23:16 -0500"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-3596",
                                "url": "https://ubuntu.com/security/CVE-2024-3596",
                                "cve_description": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-07-09 12:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext",
                            "    communications could lead to forgery attacks.",
                            "    - debian/patches/CVE-2024-3596.patch: Secure Response Authenticator",
                            "      by adding support for the Message-Authenticator attribute in non-EAP",
                            "      authentication methods.",
                            "    - CVE-2024-3596 ",
                            "  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.",
                            ""
                        ],
                        "package": "krb5",
                        "version": "1.20.1-6ubuntu2.3",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Nicolas Campuzano Jimenez <nicolas.campuzano@canonical.com>",
                        "date": "Tue, 28 Jan 2025 00:57:01 -0500"
                    }
                ],
                "notes": null
            },
            {
                "name": "openssh-client",
                "from_version": {
                    "source_package_name": "openssh",
                    "source_package_version": "1:9.6p1-3ubuntu13.5",
                    "version": "1:9.6p1-3ubuntu13.5"
                },
                "to_version": {
                    "source_package_name": "openssh",
                    "source_package_version": "1:9.6p1-3ubuntu13.8",
                    "version": "1:9.6p1-3ubuntu13.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-26465",
                        "url": "https://ubuntu.com/security/CVE-2025-26465",
                        "cve_description": "The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-18"
                    },
                    {
                        "cve": "CVE-2025-26466",
                        "url": "https://ubuntu.com/security/CVE-2025-26466",
                        "cve_description": "The OpenSSH client and server are vulnerable to a pre-authentication denial-of-service attack: an asymmetric resource consumption of both memory and CPU. This vulnerability was introduced in August 2023 (shortly before OpenSSH 9.5p1) by commit dce6d80 (\"Introduce a transport-level ping facility\").",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-18"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-26465",
                                "url": "https://ubuntu.com/security/CVE-2025-26465",
                                "cve_description": "The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-18"
                            },
                            {
                                "cve": "CVE-2025-26466",
                                "url": "https://ubuntu.com/security/CVE-2025-26466",
                                "cve_description": "The OpenSSH client and server are vulnerable to a pre-authentication denial-of-service attack: an asymmetric resource consumption of both memory and CPU. This vulnerability was introduced in August 2023 (shortly before OpenSSH 9.5p1) by commit dce6d80 (\"Introduce a transport-level ping facility\").",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-18"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option",
                            "    - debian/patches/CVE-2025-26465.patch: fix error code handling in",
                            "      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.",
                            "    - CVE-2025-26465",
                            "  * SECURITY UPDATE: pre-authentication denial of service",
                            "    - debian/patches/CVE-2025-26466.patch: don't reply to PING in preauth",
                            "      or in KEX in packet.c.",
                            "    - CVE-2025-26466",
                            "  * NOTE: this package does _not_ contain the changes from",
                            "    (1:9.6p1-3ubuntu13.7) in noble-proposed.",
                            ""
                        ],
                        "package": "openssh",
                        "version": "1:9.6p1-3ubuntu13.8",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 11 Feb 2025 08:41:04 -0500"
                    }
                ],
                "notes": null
            },
            {
                "name": "openssh-server",
                "from_version": {
                    "source_package_name": "openssh",
                    "source_package_version": "1:9.6p1-3ubuntu13.5",
                    "version": "1:9.6p1-3ubuntu13.5"
                },
                "to_version": {
                    "source_package_name": "openssh",
                    "source_package_version": "1:9.6p1-3ubuntu13.8",
                    "version": "1:9.6p1-3ubuntu13.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-26465",
                        "url": "https://ubuntu.com/security/CVE-2025-26465",
                        "cve_description": "The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-18"
                    },
                    {
                        "cve": "CVE-2025-26466",
                        "url": "https://ubuntu.com/security/CVE-2025-26466",
                        "cve_description": "The OpenSSH client and server are vulnerable to a pre-authentication denial-of-service attack: an asymmetric resource consumption of both memory and CPU. This vulnerability was introduced in August 2023 (shortly before OpenSSH 9.5p1) by commit dce6d80 (\"Introduce a transport-level ping facility\").",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-18"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-26465",
                                "url": "https://ubuntu.com/security/CVE-2025-26465",
                                "cve_description": "The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-18"
                            },
                            {
                                "cve": "CVE-2025-26466",
                                "url": "https://ubuntu.com/security/CVE-2025-26466",
                                "cve_description": "The OpenSSH client and server are vulnerable to a pre-authentication denial-of-service attack: an asymmetric resource consumption of both memory and CPU. This vulnerability was introduced in August 2023 (shortly before OpenSSH 9.5p1) by commit dce6d80 (\"Introduce a transport-level ping facility\").",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-18"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option",
                            "    - debian/patches/CVE-2025-26465.patch: fix error code handling in",
                            "      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.",
                            "    - CVE-2025-26465",
                            "  * SECURITY UPDATE: pre-authentication denial of service",
                            "    - debian/patches/CVE-2025-26466.patch: don't reply to PING in preauth",
                            "      or in KEX in packet.c.",
                            "    - CVE-2025-26466",
                            "  * NOTE: this package does _not_ contain the changes from",
                            "    (1:9.6p1-3ubuntu13.7) in noble-proposed.",
                            ""
                        ],
                        "package": "openssh",
                        "version": "1:9.6p1-3ubuntu13.8",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 11 Feb 2025 08:41:04 -0500"
                    }
                ],
                "notes": null
            },
            {
                "name": "openssh-sftp-server",
                "from_version": {
                    "source_package_name": "openssh",
                    "source_package_version": "1:9.6p1-3ubuntu13.5",
                    "version": "1:9.6p1-3ubuntu13.5"
                },
                "to_version": {
                    "source_package_name": "openssh",
                    "source_package_version": "1:9.6p1-3ubuntu13.8",
                    "version": "1:9.6p1-3ubuntu13.8"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-26465",
                        "url": "https://ubuntu.com/security/CVE-2025-26465",
                        "cve_description": "The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-18"
                    },
                    {
                        "cve": "CVE-2025-26466",
                        "url": "https://ubuntu.com/security/CVE-2025-26466",
                        "cve_description": "The OpenSSH client and server are vulnerable to a pre-authentication denial-of-service attack: an asymmetric resource consumption of both memory and CPU. This vulnerability was introduced in August 2023 (shortly before OpenSSH 9.5p1) by commit dce6d80 (\"Introduce a transport-level ping facility\").",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-18"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-26465",
                                "url": "https://ubuntu.com/security/CVE-2025-26465",
                                "cve_description": "The OpenSSH client is vulnerable to an active machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (it is disabled by default): when a vulnerable client connects to a server, an active machine-in-the-middle can impersonate the server by completely bypassing the client's checks of the server's identity.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-18"
                            },
                            {
                                "cve": "CVE-2025-26466",
                                "url": "https://ubuntu.com/security/CVE-2025-26466",
                                "cve_description": "The OpenSSH client and server are vulnerable to a pre-authentication denial-of-service attack: an asymmetric resource consumption of both memory and CPU. This vulnerability was introduced in August 2023 (shortly before OpenSSH 9.5p1) by commit dce6d80 (\"Introduce a transport-level ping facility\").",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-18"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option",
                            "    - debian/patches/CVE-2025-26465.patch: fix error code handling in",
                            "      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.",
                            "    - CVE-2025-26465",
                            "  * SECURITY UPDATE: pre-authentication denial of service",
                            "    - debian/patches/CVE-2025-26466.patch: don't reply to PING in preauth",
                            "      or in KEX in packet.c.",
                            "    - CVE-2025-26466",
                            "  * NOTE: this package does _not_ contain the changes from",
                            "    (1:9.6p1-3ubuntu13.7) in noble-proposed.",
                            ""
                        ],
                        "package": "openssh",
                        "version": "1:9.6p1-3ubuntu13.8",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Tue, 11 Feb 2025 08:41:04 -0500"
                    }
                ],
                "notes": null
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 24.04 noble image from release image serial 20250211 to 20250219",
    "from_series": "noble",
    "to_series": "noble",
    "from_serial": "20250211",
    "to_serial": "20250219",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}