A new release of the Ubuntu Cloud Images for stable Ubuntu release 20.04 LTS (Focal Fossa) is available at [1]. These new images superseded the existing images [2]. Images are available for download or immediate use on EC2 via publish AMI ids. Users who wish to update their existing installations can do so with: 'sudo apt-get update && sudo apt-get dist-upgrade && sudo reboot'. The following packages have been updated. Please see the full changelogs for a complete listing of changes: * apport: 2.20.11-0ubuntu27.4 => 2.20.11-0ubuntu27.6 * grub2: 2.04-1ubuntu26.1 => 2.04-1ubuntu26.2 * grub2-signed: 1.142.3+2.04-1ubuntu26.1 => 1.142.4+2.04-1ubuntu26.2 * libssh: 0.9.3-2ubuntu2 => 0.9.3-2ubuntu2.1 * linux-meta: 5.4.0.42.45 => 5.4.0.42.46 The following is a complete changelog for this image. new: {} removed: {} changed: ['apport', 'grub-common', 'grub-efi-amd64-bin', 'grub-efi-amd64-signed', 'grub-pc', 'grub-pc-bin', 'grub2-common', 'libssh-4:amd64', 'linux-headers-generic', 'linux-headers-virtual', 'linux-image-virtual', 'linux-virtual', 'python3-apport', 'python3-problem-report'] new snaps: {} removed snaps: {} changed snaps: ['lxd'] ==== apport: 2.20.11-0ubuntu27.4 => 2.20.11-0ubuntu27.6 ==== ==== apport python3-apport python3-problem-report * SECURITY UPDATE: information disclosure issue (LP: #1885633) - data/apport: also drop gid when checking if user session is closing. - CVE-2020-11936 * SECURITY UPDATE: crash via malformed ignore file (LP: #1877023) - apport/report.py: don't crash on malformed mtime values. - CVE-2020-15701 * SECURITY UPDATE: TOCTOU in core file location - data/apport: make sure the process hasn't been replaced after Apport has started. - CVE-2020-15702 * apport/ui.py, test/test_ui.py: make sure a PID is specified when using --hanging (LP: #1876659) * WARNING: This package does _not_ contain the changes from 2.20.11-0ubuntu27.5 in focal-proposed. ==== grub2: 2.04-1ubuntu26.1 => 2.04-1ubuntu26.2 ==== ==== grub-common grub-efi-amd64-bin grub-pc grub-pc-bin grub2-common * debian/postinst.in: Avoid calling grub-install on upgrade of the grub-pc package, since we cannot be certain that it will install to the correct disk and a grub-install failure will render the system unbootable. LP: #1889556. ==== grub2-signed: 1.142.3+2.04-1ubuntu26.1 => 1.142.4+2.04-1ubuntu26.2 ==== ==== grub-efi-amd64-signed ==== libssh: 0.9.3-2ubuntu2 => 0.9.3-2ubuntu2.1 ==== ==== libssh-4:amd64 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2020-16135-*.patch: fix a NULL dereference checking the return of ssh_buffer_new() and added others checks in src/sftpservcer.c, src/buffer.c. - CVE-2020-16135 ==== linux-meta: 5.4.0.42.45 => 5.4.0.42.46 ==== ==== linux-headers-generic linux-headers-virtual linux-image-virtual linux-virtual * No change upload to bump the upload number to the same number the Bionic HWE meta has: 5.4.0.42.46~18.04.35. -- [1] http://cloud-images.ubuntu.com/releases/focal/release-20200804/ [2] http://cloud-images.ubuntu.com/releases/focal/release-20200729/