A new release of the Ubuntu Cloud Images for stable Ubuntu release 16.04 LTS (Xenial Xerus) is available at [1]. These new images superseded the existing images [2]. Images are available for download or immediate use on EC2 via publish AMI ids. Users who wish to update their existing installations can do so with: 'sudo apt-get update && sudo apt-get dist-upgrade && sudo reboot'. The following packages have been updated. Please see the full changelogs for a complete listing of changes: * libseccomp: 2.4.3-1ubuntu3.16.04.2 => 2.4.3-1ubuntu3.16.04.3 * python3.5: 3.5.2-2ubuntu0~16.04.10 => 3.5.2-2ubuntu0~16.04.11 * sosreport: 3.9-1ubuntu0.16.04.2 => 3.9.1-1ubuntu0.16.04.1 The following is a complete changelog for this image. new: {} removed: {} changed: ['libpython3.5-minimal:amd64', 'libpython3.5-stdlib:amd64', 'libpython3.5:amd64', 'libseccomp2:amd64', 'python3.5', 'python3.5-minimal', 'sosreport'] new snaps: {} removed snaps: {} changed snaps: [] ==== libseccomp: 2.4.3-1ubuntu3.16.04.2 => 2.4.3-1ubuntu3.16.04.3 ==== ==== libseccomp2:amd64 * d/p/db-consolidate-some-of-the-code-which-adds-rules.patch * d/p/db-add-shadow-transactions.patch (LP: #1861177) Backport upstream patches to address performance regression introduced in libseccomp 2.4. ==== python3.5: 3.5.2-2ubuntu0~16.04.10 => 3.5.2-2ubuntu0~16.04.11 ==== ==== libpython3.5-minimal:amd64 libpython3.5-stdlib:amd64 libpython3.5:amd64 python3.5 python3.5-minimal * SECURITY UPDATE: Misleading information - debian/patches/CVE-2019-17514.patch: explain that the orderness of the of the result is system-dependant in Doc/library/glob.rst. - CVE-2019-17514 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2019-9674.patch: add pitfalls to zipfile module doc in Doc/library/zipfile.rst, Misc/NEWS.d/next/Documentation/2019-06-04-09-29-00.bpo-36260.WrGuc-.rst. - CVE-2019-9674 * SECURITY UPDATE: Infinite loop - debian/patches/CVE-2019-20907.patch: avoid infinite loop in the tarfile module in Lib/tarfile.py, Lib/test/test_tarfile.py and add Lib/test/recursion.tar binary for test. - CVE-2019-20907 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2020-14422.patch: Resolve hash collisions for IPv4Interface and IPv6Interface in Lib/ipaddress.py, Lib/test/test_ipaddress.py. - CVE-2020-14422 ==== sosreport: 3.9-1ubuntu0.16.04.2 => 3.9.1-1ubuntu0.16.04.1 ==== ==== sosreport * New 3.9.1 upstream release. (LP: #1884293) This maintenance release includes: - New plugins: sos_extras, ovirt_engine_backup, console, validation_framework. - lxd plugin collections have been overhauled. - Fixed handling of the namespace pattern for the networking plugin. - A basic path is now defined in Policy for all subclasses. Plugin API Enhancements: - Enablement checks have been extended to include architecture constraints. - SoSPredicate has been extended to include architecture constraints, as well as negative constraints for all elements. - Plugins will now capture service status information for all services defined in the services class attr. Further release information and tarballs are available at: - https://github.com/sosreport/sos/releases/tag/3.9.1 * Former patches now fixed upstream: - d/p/0001-unittest-py3-fix.patch * Remaining patch: - d/p/0001-lshw-command.patch * Other specific modifications: - d/p/0002-lds-substitute-oidc-conf.patch - d/p/0003-kvm-change-trigger-to-dev-kvm.patch (LP: #1883320) - d/p/0004-maas-add-snap-support.patch (LP: #1886494) - Add simple.sh as part of the autopkgtest (LP: #1865212) -- [1] http://cloud-images.ubuntu.com/releases/xenial/release-20200724/ [2] http://cloud-images.ubuntu.com/releases/xenial/release-20200721/