A new release of the Ubuntu Cloud Images for stable Ubuntu release 22.04 (Jammy Jellyfish) is available at [1]. These new images superseded the existing images [2]. Images are available for download or immediate use on EC2 via publish AMI ids. Users who wish to update their existing installations can do so with: 'sudo apt-get update && sudo apt-get dist-upgrade && sudo reboot'. The following packages have been updated. Please see the full changelogs for a complete listing of changes: * distro-info-data: 0.52ubuntu0.3 => 0.52ubuntu0.4 * freetype: 2.11.1+dfsg-1ubuntu0.1 => 2.11.1+dfsg-1ubuntu0.2 * git: 1:2.34.1-1ubuntu1.8 => 1:2.34.1-1ubuntu1.9 * glib2.0: 2.72.4-0ubuntu1 => 2.72.4-0ubuntu2 The following is a complete changelog for this image. new: {} removed: {} changed: ['distro-info-data', 'git', 'git-man', 'libfreetype6:amd64', 'libglib2.0-0:amd64', 'libglib2.0-bin', 'libglib2.0-data'] new snaps: {} removed snaps: {} changed snaps: ['core20', 'snapd'] ==== distro-info-data: 0.52ubuntu0.3 => 0.52ubuntu0.4 ==== ==== distro-info-data * Add Ubuntu 23.10 Mantic Minotaur. (LP: #2018028) * Update Debian ELTS dates to ~10 years of support (Closes: #1014837) * Correct release date of Debian 8 (jessie) to 2015-04-26 * Add Debian 14 "forky" with a vague creation date. * Set the planned release date for Debian bookworm (and an EoL based on it). * Adjust trixie's creation date to match bookworm's release. ==== freetype: 2.11.1+dfsg-1ubuntu0.1 => 2.11.1+dfsg-1ubuntu0.2 ==== ==== libfreetype6:amd64 * SECURITY UPDATE: Integer overflow - debian/patches/CVE-2023-2004.patch: fix a integer overflow in src/truetype/ttgxvar.c. - CVE-2023-2004 ==== git: 1:2.34.1-1ubuntu1.8 => 1:2.34.1-1ubuntu1.9 ==== ==== git git-man * SECURITY UPDATE: Overwriting path - debian/patches/CVE-2023_25652_25815_29007/0022-*.patch: apply --reject overwriting existing .rej symlink if it exists in apply.c, t/t4115-apply-symlink.sh. - CVE-2023-25652 * SECURITY UPDATE: Malicious placement of crafted messages - debian/patches/CVE-2023_25652_25815_29007/0024-*patch: avoid using gettext if the locale dir is not present in gettext.c. - CVE-2023-25815 * SECURITY UPDATE: Arbitrary configuration injection - debian/patches/CVE-2023_25652_25815_29007/0025-*.patch: avoid fixed-sized buffer when renaming/deleting a section in config.c, t/t1300-config.sh. - debian/patches/CVE-2023_25652_25815_29007/0026-*.patch: avoid integer truncation in copy_or_rename_section_in_file() in config.c. - debian/patches/CVE-2023_25652_25815_29007/0027-*.patch: disallow overly-long lines in copy_or_rename_section_in_file in config.c. - CVE-2023-29007 ==== glib2.0: 2.72.4-0ubuntu1 => 2.72.4-0ubuntu2 ==== ==== libglib2.0-0:amd64 libglib2.0-bin libglib2.0-data * d/p/0001-gio-Make-portal-support-aware-of-snaps.patch: - Make portal support aware of snaps (LP: #1998267) -- [1] http://cloud-images.ubuntu.com/releases/jammy/release-20230510/ [2] http://cloud-images.ubuntu.com/releases/jammy/release-20230427/