{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "amd64-microcode"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "amd64-microcode",
                "from_version": {
                    "source_package_name": "amd64-microcode",
                    "source_package_version": "3.20231019.1ubuntu2",
                    "version": "3.20231019.1ubuntu2"
                },
                "to_version": {
                    "source_package_name": "amd64-microcode",
                    "source_package_version": "3.20231019.1ubuntu2.1",
                    "version": "3.20231019.1ubuntu2.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2023-31315",
                        "url": "https://ubuntu.com/security/CVE-2023-31315",
                        "cve_description": "Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-08-12 13:38:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2023-31315",
                                "url": "https://ubuntu.com/security/CVE-2023-31315",
                                "cve_description": "Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-08-12 13:38:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: arbitrary code execution via improper MSR access",
                            "    - amd-ucode/microcode_amd_fam{17,19}h.bin{,.asc}: add updated AMD",
                            "      fam17h and fam19h CPU microcodes",
                            "    - Updated microcodes:",
                            "      Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f Length=3200 bytes",
                            "      Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c Length=3200 bytes",
                            "      Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a Length=5568 bytes",
                            "      Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 Length=5568 bytes",
                            "      Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 Length=5568 bytes",
                            "      Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 Length=5568 bytes",
                            "      Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 Length=5568 bytes",
                            "      Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 Length=5568 bytes",
                            "    - CVE-2023-31315",
                            ""
                        ],
                        "package": "amd64-microcode",
                        "version": "3.20231019.1ubuntu2.1",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Alex Murray <alex.murray@canonical.com>",
                        "date": "Wed, 16 Oct 2024 15:45:37 +1030"
                    }
                ],
                "notes": null
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 24.04 noble image from daily image serial 20241016 to 20241021",
    "from_series": "noble",
    "to_series": "noble",
    "from_serial": "20241016",
    "to_serial": "20241021",
    "from_manifest_filename": "daily_manifest.previous",
    "to_manifest_filename": "manifest.current"
}