{ "summary": { "snap": { "added": [], "removed": [], "diff": [] }, "deb": { "added": [ "linux-headers-6.8.0-54", "linux-headers-6.8.0-54-generic", "linux-image-6.8.0-54-generic", "linux-modules-6.8.0-54-generic", "linux-tools-6.8.0-54", "linux-tools-6.8.0-54-generic" ], "removed": [ "linux-headers-6.8.0-53", "linux-headers-6.8.0-53-generic", "linux-image-6.8.0-53-generic", "linux-modules-6.8.0-53-generic", "linux-tools-6.8.0-53", "linux-tools-6.8.0-53-generic" ], "diff": [ "libcap2:armhf", "libcap2-bin", "libiniparser1:armhf", "libpam-cap:armhf", "linux-headers-generic", "linux-headers-virtual", "linux-image-virtual", "linux-libc-dev:armhf", "linux-tools-common", "linux-virtual" ] } }, "diff": { "deb": [ { "name": "libcap2:armhf", "from_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.1", "version": "1:2.66-5ubuntu2.1" }, "to_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.2", "version": "1:2.66-5ubuntu2.2" }, "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "log": [ "", " * SECURITY UPDATE: incorrect group name handling", " - debian/patches/CVE-2025-1390-1.patch: fix potential configuration", " parsing error in pam_cap/pam_cap.c.", " - debian/patches/CVE-2025-1390-2.patch: add a test for bad group prefix", " in pam_cap/sudotest.conf.", " - CVE-2025-1390", "" ], "package": "libcap2", "version": "1:2.66-5ubuntu2.2", "urgency": "medium", "distributions": "noble-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 20 Feb 2025 10:49:57 -0500" } ], "notes": null }, { "name": "libcap2-bin", "from_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.1", "version": "1:2.66-5ubuntu2.1" }, "to_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.2", "version": "1:2.66-5ubuntu2.2" }, "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "log": [ "", " * SECURITY UPDATE: incorrect group name handling", " - debian/patches/CVE-2025-1390-1.patch: fix potential configuration", " parsing error in pam_cap/pam_cap.c.", " - debian/patches/CVE-2025-1390-2.patch: add a test for bad group prefix", " in pam_cap/sudotest.conf.", " - CVE-2025-1390", "" ], "package": "libcap2", "version": "1:2.66-5ubuntu2.2", "urgency": "medium", "distributions": "noble-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 20 Feb 2025 10:49:57 -0500" } ], "notes": null }, { "name": "libiniparser1:armhf", "from_version": { "source_package_name": "iniparser", "source_package_version": "4.1-7build1", "version": "4.1-7build1" }, "to_version": { "source_package_name": "iniparser", "source_package_version": "4.1-7ubuntu0.1", "version": "4.1-7ubuntu0.1" }, "cves": [ { "cve": "CVE-2025-0633", "url": "https://ubuntu.com/security/CVE-2025-0633", "cve_description": "Heap-based Buffer Overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows attacker to read out of bound memory", "cve_priority": "medium", "cve_public_date": "2025-02-19 07:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0633", "url": "https://ubuntu.com/security/CVE-2025-0633", "cve_description": "Heap-based Buffer Overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows attacker to read out of bound memory", "cve_priority": "medium", "cve_public_date": "2025-02-19 07:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: heap overflow in iniparser_dumpsection_ini()", " - debian/patches/CVE-2025-0633.patch: return if name doesn't fit in", " buffer in src/iniparser.c.", " - CVE-2025-0633", "" ], "package": "iniparser", "version": "4.1-7ubuntu0.1", "urgency": "medium", "distributions": "noble-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 21 Feb 2025 13:31:27 -0500" } ], "notes": null }, { "name": "libpam-cap:armhf", "from_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.1", "version": "1:2.66-5ubuntu2.1" }, "to_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.2", "version": "1:2.66-5ubuntu2.2" }, "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "log": [ "", " * SECURITY UPDATE: incorrect group name handling", " - debian/patches/CVE-2025-1390-1.patch: fix potential configuration", " parsing error in pam_cap/pam_cap.c.", " - debian/patches/CVE-2025-1390-2.patch: add a test for bad group prefix", " in pam_cap/sudotest.conf.", " - CVE-2025-1390", "" ], "package": "libcap2", "version": "1:2.66-5ubuntu2.2", "urgency": "medium", "distributions": "noble-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 20 Feb 2025 10:49:57 -0500" } ], "notes": null }, { "name": "linux-headers-generic", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-53.55+1", "version": "6.8.0-53.55+1" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.8.0-54.56", "" ], "package": "linux-meta", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 23:00:59 +0100" } ], "notes": null }, { "name": "linux-headers-virtual", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-53.55+1", "version": "6.8.0-53.55+1" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.8.0-54.56", "" ], "package": "linux-meta", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 23:00:59 +0100" } ], "notes": null }, { "name": "linux-image-virtual", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-53.55+1", "version": "6.8.0-53.55+1" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.8.0-54.56", "" ], "package": "linux-meta", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 23:00:59 +0100" } ], "notes": null }, { "name": "linux-libc-dev:armhf", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": null }, { "name": "linux-tools-common", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": null }, { "name": "linux-virtual", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-53.55+1", "version": "6.8.0-53.55+1" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.8.0-54.56", "" ], "package": "linux-meta", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 23:00:59 +0100" } ], "notes": null } ], "snap": [] }, "added": { "deb": [ { "name": "linux-headers-6.8.0-54", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": "linux-headers-6.8.0-54 version '6.8.0-54.56' (source package linux version '6.8.0-54.56') was added. linux-headers-6.8.0-54 version '6.8.0-54.56' has the same source package name, linux, as removed package linux-headers-6.8.0-53. As such we can use the source package version of the removed package, '6.8.0-53.55', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-headers-6.8.0-54-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": "linux-headers-6.8.0-54-generic version '6.8.0-54.56' (source package linux version '6.8.0-54.56') was added. linux-headers-6.8.0-54-generic version '6.8.0-54.56' has the same source package name, linux, as removed package linux-headers-6.8.0-53. As such we can use the source package version of the removed package, '6.8.0-53.55', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-image-6.8.0-54-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": "linux-image-6.8.0-54-generic version '6.8.0-54.56' (source package linux version '6.8.0-54.56') was added. linux-image-6.8.0-54-generic version '6.8.0-54.56' has the same source package name, linux, as removed package linux-headers-6.8.0-53. As such we can use the source package version of the removed package, '6.8.0-53.55', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-modules-6.8.0-54-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": "linux-modules-6.8.0-54-generic version '6.8.0-54.56' (source package linux version '6.8.0-54.56') was added. linux-modules-6.8.0-54-generic version '6.8.0-54.56' has the same source package name, linux, as removed package linux-headers-6.8.0-53. As such we can use the source package version of the removed package, '6.8.0-53.55', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-tools-6.8.0-54", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": "linux-tools-6.8.0-54 version '6.8.0-54.56' (source package linux version '6.8.0-54.56') was added. linux-tools-6.8.0-54 version '6.8.0-54.56' has the same source package name, linux, as removed package linux-headers-6.8.0-53. As such we can use the source package version of the removed package, '6.8.0-53.55', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-tools-6.8.0-54-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.8.0-54.56", "version": "6.8.0-54.56" }, "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux", "version": "6.8.0-54.56", "urgency": "medium", "distributions": "noble", "launchpad_bugs_fixed": [], "author": "Manuel Diewald ", "date": "Fri, 07 Feb 2025 22:09:50 +0100" } ], "notes": "linux-tools-6.8.0-54-generic version '6.8.0-54.56' (source package linux version '6.8.0-54.56') was added. linux-tools-6.8.0-54-generic version '6.8.0-54.56' has the same source package name, linux, as removed package linux-headers-6.8.0-53. As such we can use the source package version of the removed package, '6.8.0-53.55', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." } ], "snap": [] }, "removed": { "deb": [ { "name": "linux-headers-6.8.0-53", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-headers-6.8.0-53-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-image-6.8.0-53-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-modules-6.8.0-53-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-tools-6.8.0-53", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-tools-6.8.0-53-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.8.0-53.55", "version": "6.8.0-53.55" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null } ], "snap": [] }, "notes": "Changelog diff for Ubuntu 24.04 noble image from release image serial 20250221 to 20250225", "from_series": "noble", "to_series": "noble", "from_serial": "20250221", "to_serial": "20250225", "from_manifest_filename": "release_manifest.previous", "to_manifest_filename": "manifest.current" }