{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "dpkg",
                "intel-microcode"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "dpkg",
                "from_version": {
                    "source_package_name": "dpkg",
                    "source_package_version": "1.22.6ubuntu6",
                    "version": "1.22.6ubuntu6"
                },
                "to_version": {
                    "source_package_name": "dpkg",
                    "source_package_version": "1.22.6ubuntu6.1",
                    "version": "1.22.6ubuntu6.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2064539,
                    2064538
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * SRU:",
                            "    - Disable framepointer on ppc64el. LP: #2064539.",
                            "    - Disable framepointer on s390x, leaving only -mbackchain. LP: #2064538.",
                            ""
                        ],
                        "package": "dpkg",
                        "version": "1.22.6ubuntu6.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [
                            2064539,
                            2064538
                        ],
                        "author": "Matthias Klose <doko@ubuntu.com>",
                        "date": "Wed, 17 Jul 2024 11:09:50 +0200"
                    }
                ],
                "notes": null
            },
            {
                "name": "intel-microcode",
                "from_version": {
                    "source_package_name": "intel-microcode",
                    "source_package_version": "3.20240514.0ubuntu0.24.04.1",
                    "version": "3.20240514.0ubuntu0.24.04.1"
                },
                "to_version": {
                    "source_package_name": "intel-microcode",
                    "source_package_version": "3.20240813.0ubuntu0.24.04.2",
                    "version": "3.20240813.0ubuntu0.24.04.2"
                },
                "cves": [
                    {
                        "cve": "CVE-2024-24853",
                        "url": "https://ubuntu.com/security/CVE-2024-24853",
                        "cve_description": "Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel® Processor may allow a privileged user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2024-25939",
                        "url": "https://ubuntu.com/security/CVE-2024-25939",
                        "cve_description": "Mirrored regions with different values in 3rd Generation Intel® Xeon® Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2024-24980",
                        "url": "https://ubuntu.com/security/CVE-2024-24980",
                        "cve_description": "Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel® Xeon® Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2023-42667",
                        "url": "https://ubuntu.com/security/CVE-2023-42667",
                        "cve_description": "Improper isolation in the Intel® Core™ Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2023-49141",
                        "url": "https://ubuntu.com/security/CVE-2023-49141",
                        "cve_description": "Improper isolation in some Intel® Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2024-24853",
                        "url": "https://ubuntu.com/security/CVE-2024-24853",
                        "cve_description": "Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel® Processor may allow a privileged user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2024-25939",
                        "url": "https://ubuntu.com/security/CVE-2024-25939",
                        "cve_description": "Mirrored regions with different values in 3rd Generation Intel® Xeon® Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2024-24980",
                        "url": "https://ubuntu.com/security/CVE-2024-24980",
                        "cve_description": "Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel® Xeon® Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2023-42667",
                        "url": "https://ubuntu.com/security/CVE-2023-42667",
                        "cve_description": "Improper isolation in the Intel® Core™ Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    },
                    {
                        "cve": "CVE-2023-49141",
                        "url": "https://ubuntu.com/security/CVE-2023-49141",
                        "cve_description": "Improper isolation in some Intel® Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-14"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-24853",
                                "url": "https://ubuntu.com/security/CVE-2024-24853",
                                "cve_description": "Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel® Processor may allow a privileged user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2024-25939",
                                "url": "https://ubuntu.com/security/CVE-2024-25939",
                                "cve_description": "Mirrored regions with different values in 3rd Generation Intel® Xeon® Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2024-24980",
                                "url": "https://ubuntu.com/security/CVE-2024-24980",
                                "cve_description": "Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel® Xeon® Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2023-42667",
                                "url": "https://ubuntu.com/security/CVE-2023-42667",
                                "cve_description": "Improper isolation in the Intel® Core™ Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2023-49141",
                                "url": "https://ubuntu.com/security/CVE-2023-49141",
                                "cve_description": "Improper isolation in some Intel® Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Respin based on newly retagged upstream microcode",
                            "    datafile 20240813",
                            "    - Updated microcodes:",
                            "      sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304",
                            "    - CVE-2024-24853 (INTEL-SA-01083)",
                            "    - CVE-2024-25939 (INTEL-SA-01118)",
                            "    - CVE-2024-24980 (INTEL-SA-01100)",
                            "    - CVE-2023-42667 (INTEL-SA-01038)",
                            "    - CVE-2023-49141 (INTEL-SA-01046)",
                            "  * ucode-blacklist: revert previous change to blacklist models 0x8e and",
                            "    0x9e from late-loading as late-loading is not supported in Ubuntu",
                            "    anymore either",
                            ""
                        ],
                        "package": "intel-microcode",
                        "version": "3.20240813.0ubuntu0.24.04.2",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Alex Murray <alex.murray@canonical.com>",
                        "date": "Fri, 16 Aug 2024 09:37:04 +0930"
                    },
                    {
                        "cves": [
                            {
                                "cve": "CVE-2024-24853",
                                "url": "https://ubuntu.com/security/CVE-2024-24853",
                                "cve_description": "Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel® Processor may allow a privileged user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2024-25939",
                                "url": "https://ubuntu.com/security/CVE-2024-25939",
                                "cve_description": "Mirrored regions with different values in 3rd Generation Intel® Xeon® Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2024-24980",
                                "url": "https://ubuntu.com/security/CVE-2024-24980",
                                "cve_description": "Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel® Xeon® Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2023-42667",
                                "url": "https://ubuntu.com/security/CVE-2023-42667",
                                "cve_description": "Improper isolation in the Intel® Core™ Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            },
                            {
                                "cve": "CVE-2023-49141",
                                "url": "https://ubuntu.com/security/CVE-2023-49141",
                                "cve_description": "Improper isolation in some Intel® Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-14"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: New upstream microcode datafile 20240813",
                            "    - Updated microcodes:",
                            "      sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936",
                            "      sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720",
                            "      sig 0x000606a6, pf_mask 0x87, 2024-04-01, rev 0xd0003e7, size 308224",
                            "      sig 0x000606c1, pf_mask 0x10, 2024-04-03, rev 0x10002b0, size 300032",
                            "      sig 0x000706a1, pf_mask 0x01, 2024-04-19, rev 0x0042, size 76800",
                            "      sig 0x000706e5, pf_mask 0x80, 2024-02-15, rev 0x00c6, size 114688",
                            "      sig 0x000806c1, pf_mask 0x80, 2024-02-15, rev 0x00b8, size 112640",
                            "      sig 0x000806c2, pf_mask 0xc2, 2024-02-15, rev 0x0038, size 99328",
                            "      sig 0x000806d1, pf_mask 0xc2, 2024-02-15, rev 0x0052, size 104448",
                            "      sig 0x000806e9, pf_mask 0x10, 2024-02-01, rev 0x00f6, size 106496",
                            "      sig 0x000806e9, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 106496",
                            "      sig 0x000806ea, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 105472",
                            "      sig 0x000806eb, pf_mask 0xd0, 2024-02-01, rev 0x00f6, size 106496",
                            "      sig 0x000806ec, pf_mask 0x94, 2024-02-05, rev 0x00fc, size 106496",
                            "      sig 0x00090661, pf_mask 0x01, 2024-04-05, rev 0x001a, size 20480",
                            "      sig 0x000906ea, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 105472",
                            "      sig 0x000906eb, pf_mask 0x02, 2024-02-01, rev 0x00f6, size 106496",
                            "      sig 0x000906ec, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 106496",
                            "      sig 0x000906ed, pf_mask 0x22, 2024-02-05, rev 0x0100, size 106496",
                            "      sig 0x000a0652, pf_mask 0x20, 2024-02-01, rev 0x00fc, size 97280",
                            "      sig 0x000a0655, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 97280",
                            "      sig 0x000a0660, pf_mask 0x80, 2024-02-01, rev 0x00fe, size 97280",
                            "      sig 0x000a0661, pf_mask 0x80, 2024-02-01, rev 0x00fc, size 97280",
                            "      sig 0x000a0671, pf_mask 0x02, 2024-03-07, rev 0x0062, size 108544",
                            "      sig 0x000a06a4, pf_mask 0xe6, 2024-04-15, rev 0x001e, size 137216",
                            "    - CVE-2024-24853 (INTEL-SA-01083)",
                            "    - CVE-2024-25939 (INTEL-SA-01118)",
                            "    - CVE-2024-24980 (INTEL-SA-01100)",
                            "    - CVE-2023-42667 (INTEL-SA-01038)",
                            "    - CVE-2023-49141 (INTEL-SA-01046)",
                            "  * source: update symlinks to reflect id of the latest release, 20240813",
                            ""
                        ],
                        "package": "intel-microcode",
                        "version": "3.20240813.0ubuntu0.24.04.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Alex Murray <alex.murray@canonical.com>",
                        "date": "Wed, 14 Aug 2024 14:12:55 +0930"
                    }
                ],
                "notes": null
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 24.04 noble image from daily image serial 20240809 to 20240819",
    "from_series": "noble",
    "to_series": "noble",
    "from_serial": "20240809",
    "to_serial": "20240819",
    "from_manifest_filename": "daily_manifest.previous",
    "to_manifest_filename": "manifest.current"
}