A new release of the Ubuntu Cloud Images for stable Ubuntu release 20.04 LTS (Focal Fossa) is available at [1]. These new images superseded the existing images [2]. Images are available for download or immediate use on EC2 via publish AMI ids. Users who wish to update their existing installations can do so with: 'sudo apt-get update && sudo apt-get dist-upgrade && sudo reboot'. The following packages have been updated. Please see the full changelogs for a complete listing of changes: * apt: 2.0.2ubuntu0.1 => 2.0.2ubuntu0.2 * curl: 7.68.0-1ubuntu2.2 => 7.68.0-1ubuntu2.4 * efivar: 37-2ubuntu2.1 => 37-2ubuntu2.2 * linux-meta: 5.4.0.56.59 => 5.4.0.54.57 * linux-signed: 5.4.0-56.62 => 5.4.0-54.60 * openssl: 1.1.1f-1ubuntu2 => 1.1.1f-1ubuntu2.1 * parted: 3.3-4 => 3.3-4ubuntu0.20.04.1 * python-apt: 2.0.0ubuntu0.20.04.1 => 2.0.0ubuntu0.20.04.2 The following is a complete changelog for this image. new: {'linux-headers-5.4.0-54-generic': '5.4.0-54.60', 'linux-modules-5.4.0-54-generic': '5.4.0-54.60', 'linux-headers-5.4.0-54': '5.4.0-54.60'} removed: {'linux-headers-5.4.0-56': '5.4.0-56.62', 'linux-modules-5.4.0-56-generic': '5.4.0-56.62', 'linux-headers-5.4.0-56-generic': '5.4.0-56.62'} changed: ['apt', 'apt-utils', 'curl', 'libapt-pkg6.0:amd64', 'libcurl3-gnutls:amd64', 'libcurl4:amd64', 'libefiboot1:amd64', 'libefivar1:amd64', 'libparted2:amd64', 'libssl1.1:amd64', 'linux-headers-generic', 'linux-headers-virtual', 'linux-image-5.4.0-54-generic', 'linux-image-virtual', 'linux-virtual', 'openssl', 'parted', 'python-apt-common', 'python3-apt'] new snaps: {} removed snaps: {} changed snaps: ['snapd'] ==== apt: 2.0.2ubuntu0.1 => 2.0.2ubuntu0.2 ==== ==== apt apt-utils libapt-pkg6.0:amd64 * SECURITY UPDATE: Integer overflow in parsing (LP: #1899193) - apt-pkg/contrib/arfile.cc: add extra checks. - apt-pkg/contrib/tarfile.cc: limit tar item sizes to 128 GiB - apt-pkg/deb/debfile.cc: limit control file sizes to 64 MiB - test/*: add tests. - CVE-2020-27350 * Additional hardening: - apt-pkg/contrib/tarfile.cc: Limit size of long names and links to 1 MiB * .gitlab-ci.yml: Test on focal, not unstable ==== curl: 7.68.0-1ubuntu2.2 => 7.68.0-1ubuntu2.4 ==== ==== curl libcurl3-gnutls:amd64 libcurl4:amd64 * SECURITY UPDATE: FTP redirect to malicious host via PASV response - debian/patches/CVE-2020-8284.patch: use CURLOPT_FTP_SKIP_PASV_IP by default in lib/url.c, src/tool_cfgable.c, docs/*, tests/data/*. - CVE-2020-8284 * SECURITY UPDATE: FTP wildcard stack buffer overflow in libcurl - debian/patches/CVE-2020-8285.patch: make wc_statemach loop instead of recurse in lib/ftp.c. - CVE-2020-8285 * SECURITY UPDATE: Inferior OCSP verification - debian/patches/CVE-2020-8286.patch: make the OCSP verification verify the certificate id in lib/vtls/openssl.c. - CVE-2020-8286 ==== efivar: 37-2ubuntu2.1 => 37-2ubuntu2.2 ==== ==== libefiboot1:amd64 libefivar1:amd64 * Cherrypick upstream patch to fix uninitialized variable in parse_acpi_root(), which can lead to a segfault when calling grub-install. LP: #1892792. ==== linux-meta: 5.4.0.56.59 => 5.4.0.54.57 ==== ==== linux-headers-generic linux-headers-virtual linux-image-virtual linux-virtual ==== linux-signed: 5.4.0-56.62 => 5.4.0-54.60 ==== ==== linux-image-5.4.0-54-generic ==== openssl: 1.1.1f-1ubuntu2 => 1.1.1f-1ubuntu2.1 ==== ==== libssl1.1:amd64 openssl * SECURITY UPDATE: EDIPARTYNAME NULL pointer de-ref - debian/patches/CVE-2020-1971-1.patch: use explicit tagging for DirectoryString in crypto/x509v3/v3_genn.c. - debian/patches/CVE-2020-1971-2.patch: correctly compare EdiPartyName in crypto/x509v3/v3_genn.c. - debian/patches/CVE-2020-1971-3.patch: check that multi-strings/CHOICE types don't use implicit tagging in crypto/asn1/asn1_err.c, crypto/asn1/tasn_dec.c, crypto/err/openssl.txt, include/openssl/asn1err.h. - debian/patches/CVE-2020-1971-4.patch: complain if we are attempting to encode with an invalid ASN.1 template in crypto/asn1/asn1_err.c, crypto/asn1/tasn_enc.c, crypto/err/openssl.txt, include/openssl/asn1err.h. - debian/patches/CVE-2020-1971-5.patch: add a test for GENERAL_NAME_cmp in test/v3nametest.c. - debian/patches/CVE-2020-1971-6.patch: add a test for encoding/decoding using an invalid ASN.1 Template in test/asn1_decode_test.c, test/asn1_encode_test.c. - CVE-2020-1971 ==== parted: 3.3-4 => 3.3-4ubuntu0.20.04.1 ==== ==== libparted2:amd64 parted * d/p/fix-end-input-usage-in-do-resizepart.patch: - Fix end_input usage in do_resizepart (LP: #1905579) ==== python-apt: 2.0.0ubuntu0.20.04.1 => 2.0.0ubuntu0.20.04.2 ==== ==== python-apt-common python3-apt * SECURITY UPDATE: various memory and file descriptor leaks (LP: #1899193) - python/arfile.cc, python/generic.h, python/tag.cc, python/tarfile.cc: fix file descriptor and memory leaks - python/apt_instmodule.cc, python/apt_instmodule.h, python/arfile.h: Avoid reference cycle with control,data members in apt_inst.DebFile objects - tests/test_cve_2020_27351.py: Test cases for DebFile (others not easily testable) - CVE-2020-27351 * .gitlab-ci.yml: Fix mypy version for CI * data/templates: Update mirror lists -- [1] http://cloud-images.ubuntu.com/releases/focal/release-20201210/ [2] http://cloud-images.ubuntu.com/releases/focal/release-20201201/