A new release of the Ubuntu Cloud Images for stable Ubuntu release 23.04 (Lunar Lobster) is available at [1]. These new images superseded the existing images [2]. Images are available for download or immediate use on EC2 via publish AMI ids. Users who wish to update their existing installations can do so with: 'sudo apt-get update && sudo apt-get dist-upgrade && sudo reboot'. The following packages have been updated. Please see the full changelogs for a complete listing of changes: * cloud-init: 23.1.1-0ubuntu2 => 23.1.2-0ubuntu0~23.04.1 * git: 1:2.39.2-1ubuntu1 => 1:2.39.2-1ubuntu1.1 * openssl: 3.0.8-1ubuntu1 => 3.0.8-1ubuntu1.1 * ubuntu-release-upgrader: 1:23.04.5 => 1:23.04.6 The following is a complete changelog for this image. new: {} removed: {} changed: ['cloud-init', 'git', 'git-man', 'libssl3:amd64', 'openssl', 'python3-distupgrade', 'ubuntu-release-upgrader-core'] new snaps: {} removed snaps: {} changed snaps: ['snapd'] ==== cloud-init: 23.1.1-0ubuntu2 => 23.1.2-0ubuntu0~23.04.1 ==== ==== cloud-init * d/changelog: updating 23.1.1-0ubuntu2 changelog entry deleting mention of a snapshot that was not performed * SECURITY UPDATE: Make user/vendor data sensitive and remove log permissions Because user data and vendor data may contain sensitive information, this commit ensures that any user data or vendor data written to instance-data.json gets redacted and is only available to root user. Also, modify the permissions of cloud-init.log to be 640, so that sensitive data leaked to the log isn't world readable. Additionally, remove the logging of user data and vendor data to cloud-init.log from the Vultr datasource. This is based on upstream release of 23.1.2 [(LP: #2013967)] - d/cloud-init.postinst: postinst fixes for LP: #2013967 Redact sensitive keys from world-readable instance-data.json on upgrade. Set perms 640 for /var/log/cloud-init.log on pkg upgrade. Redact sensitive Vultr messages from /var/log/cloud-init.log - (CVE-2023-1786) ==== git: 1:2.39.2-1ubuntu1 => 1:2.39.2-1ubuntu1.1 ==== ==== git git-man * SECURITY UPDATE: Overwriting path - debian/patches/CVE-2023_25652_25815_29007/0022-*.patch: apply --reject overwriting existing .rej symlink if it exists in apply.c, t/t4115-apply-symlink.sh. - CVE-2023-25652 * SECURITY UPDATE: Malicious placement of crafted messages - debian/patches/CVE-2023_25652_25815_29007/0024-*patch: avoid using gettext if the locale dir is not present in gettext.c. - CVE-2023-25815 * SECURITY UPDATE: Arbitrary configuration injection - debian/patches/CVE-2023_25652_25815_29007/0025-*.patch: avoid fixed-sized buffer when renaming/deleting a section in config.c, t/t1300-config.sh. - debian/patches/CVE-2023_25652_25815_29007/0026-*.patch: avoid integer truncation in copy_or_rename_section_in_file() in config.c. - debian/patches/CVE-2023_25652_25815_29007/0027-*.patch: disallow overly-long lines in copy_or_rename_section_in_file in config.c. - CVE-2023-29007 ==== openssl: 3.0.8-1ubuntu1 => 3.0.8-1ubuntu1.1 ==== ==== libssl3:amd64 openssl * SECURITY UPDATE: excessive resource use when verifying policy constraints - debian/patches/CVE-2023-0464-1.patch: limit the number of nodes created in a policy tree (the default limit is set to 1000 nodes). - debian/patches/CVE-2023-0464-2.patch: add test cases for the policy resource overuse. - debian/patches/CVE-2023-0464-3.patch: disable the policy tree exponential growth test conditionally. - CVE-2023-0464 * SECURITY UPDATE: invalid certificate policies ignored in leaf certificates - debian/patches/CVE-2023-0465-1.patch: ensure that EXFLAG_INVALID_POLICY is checked even in leaf certs. - debian/patches/CVE-2023-0465-2.patch: generate some certificates with the certificatePolicies extension. - debian/patches/CVE-2023-0465-3.patch: add a certificate policies test. - CVE-2023-0466 * SECURITY UPDATE: certificate policy check in X509_VERIFY_PARAM_add0_policy not enabled as documented - debian/patches/CVE-2023-0466.patch: fix documentation of X509_VERIFY_PARAM_add0_policy(). - CVE-2023-0466 ==== ubuntu-release-upgrader: 1:23.04.5 => 1:23.04.6 ==== ==== python3-distupgrade ubuntu-release-upgrader-core * DistUpgradeQuirks: Stop ignoring crashes from tracker-extract-3 during upgrade as the underlying crash was fixed. -- [1] http://cloud-images.ubuntu.com/releases/lunar/release-20230502/ [2] http://cloud-images.ubuntu.com/releases/lunar/release-20230420/