{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [],
            "removed": [],
            "diff": [
                "libpython3.13:s390x",
                "libpython3.13-minimal:s390x",
                "libpython3.13-stdlib:s390x",
                "python3.13",
                "python3.13-gdbm",
                "python3.13-minimal"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "libpython3.13:s390x",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.13-minimal:s390x",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpython3.13-stdlib:s390x",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13-gdbm",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "python3.13-minimal",
                "from_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1",
                    "version": "3.13.7-1"
                },
                "to_version": {
                    "source_package_name": "python3.13",
                    "source_package_version": "3.13.7-1ubuntu0.1",
                    "version": "3.13.7-1ubuntu0.1"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-8291",
                        "url": "https://ubuntu.com/security/CVE-2025-8291",
                        "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-07 18:16:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-6075",
                        "url": "https://ubuntu.com/security/CVE-2025-6075",
                        "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-10-31 17:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-8291",
                                "url": "https://ubuntu.com/security/CVE-2025-8291",
                                "cve_description": "The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.   Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-07 18:16:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-6075",
                                "url": "https://ubuntu.com/security/CVE-2025-6075",
                                "cve_description": "If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-10-31 17:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Possible payload obfuscation",
                            "    - debian/patches/CVE-2025-8291.patch: check consistency of",
                            "      the zip64 end of central dir record in Lib/zipfile.py,",
                            "      Lib/test/test_zipfile.py.",
                            "    - CVE-2025-8291",
                            "  * SECURITY UPDATE: Performance degradation",
                            "    - debian/patches/CVE-2025-6075.patch: fix quadratic complexity",
                            "      in os.path.expandvars() in Lib/ntpatch.py, Lib/posixpath.py,",
                            "      Lib/test/test_genericpatch.py, Lib/test/test_npath.py.",
                            "    - CVE-2025-6075",
                            ""
                        ],
                        "package": "python3.13",
                        "version": "3.13.7-1ubuntu0.1",
                        "urgency": "medium",
                        "distributions": "questing-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>",
                        "date": "Mon, 24 Nov 2025 17:21:28 -0330"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [],
        "snap": []
    },
    "removed": {
        "deb": [],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 25.10 questing image from release image serial 20251125 to 20251127",
    "from_series": "questing",
    "to_series": "questing",
    "from_serial": "20251125",
    "to_serial": "20251127",
    "from_manifest_filename": "release_manifest.previous",
    "to_manifest_filename": "manifest.current"
}