Ubuntu cloud image artefacts¶
This document provides detailed information on various Ubuntu cloud image artefacts available on cloud-images.ubuntu.com.
Images¶
This section contains information on all of the Ubuntu cloud images available for download. These images are pre-configured and ready for deployment in cloud environments, supporting multiple architectures and configurations.
Architectures supported¶
amd64: Standard 64-bit PC architecture.
arm64: 64-bit ARM architecture.
armhf: Hard-float 32-bit ARM architecture.
ppc64el: 64-bit PowerPC little-endian architecture.
riscv64: 64-bit RISC-V architecture.
s390x: IBM System z (s390x) architecture.
Initial ramdisk (initrd)¶
Extension |
|
Example filename |
|
Format description |
An initial ramdisk is a temporary root file system loaded into memory during the boot process to initialise the system before the real root file system is mounted. |
Use cases |
Initrds are used to ensure the kernel can boot by loading necessary drivers and modules before the root filesystem is mounted. This allows the support of diverse hardware and virtual environments, making them useful for cloud instance startup. In addition to extra driver support, early boot features such as labels for partition names and root encryption rely on features provided by the initrd. |
Linux kernel image¶
Extension |
|
Example filename |
|
Format description |
The vmlinuz image contains a compressed image of the Linux kernel. |
Use cases |
The Linux kernel is the core component of the operating system. It handles essential functions such as process management, memory management and system calls. Kernel images may be customised for specific hardware configurations, leading to offerings for each supported architecture. |
LXD tarball¶
Extension |
|
Example filename |
|
Format description |
Tar archive compressed with XZ (LZMA2), containing an image suitable for LXD container deployment. |
Use cases |
These files are specifically formatted for LXD, a system container manager. They contain LXD metadata and when combined with root tarballs ( |
Open Virtual Appliance (OVA)¶
Extension |
|
Example filename |
|
Format description |
An OVA is a single file distribution of an Open Virtualisation Format (OVF) package. |
Use cases |
OVA files encapsulate an entire virtual machine setup including configuration, disk images and other metadata. They are used for easy deployment of virtual appliances across different virtualisation providers such as VirtualBox or VMware. You can import an |
QEMU Copy On Write (QCOW)¶
Extension |
|
Example filename |
|
Format description |
QCOW image files are disk image files containing raw sector-by-sector copies of a storage device. |
Use cases |
QCOW images are used for creating bootable disks and virtual machines in virtualisation environments. Some of the features that make QCOW images attractive are their support for dynamic disk sizing, snapshot support and copy-on-write. One of the primary use cases of our published QCOW images is to use QEMU to create and manage virtual machines. Other providers, such as VirtualBox, can be used for this, or you can use a Refer to Launch QCOW images using QEMU for instructions on using QCOW images with QEMU. |
Root tarball¶
Extension |
|
Example filename |
|
Format description |
Tar archive compressed with XZ (LZMA2), containing a root file system for various architectures. |
Use cases |
These files are used for deploying base system images in virtual machines and containers. You can use |
SquashFS¶
Extension |
|
Example filename |
|
Format description |
SquashFS is a compressed read-only file system format. |
Use cases |
SquashFS files are used for embedding file systems in read-only environments, often in embedded systems or live CDs. In cloud environments, they are used for distributing lightweight operating system images that are ready to use. You can use a |
Tarball (gzip)¶
Extension |
|
Example filename |
|
Format description |
|
Use cases |
Our |
Vagrant box¶
Extension |
|
Example filename |
|
Format description |
The Vagrant box format is used to package and distribute virtual machine environments managed by Vagrant. |
Use cases |
These files contain a virtual machine image along with metadata required for Vagrant. Vagrant simplifies the creation and provisioning of virtual environments, making it easier to manage and share development environments across different systems. You can use a |
Virtual Hard Disk (VHD)¶
Extension |
|
Example filename |
|
Format description |
A VHD is a file format used by virtualisation software to store virtual hard disk images. |
Use cases |
VHD files are used in cloud environments for storing VM disk images. They allow easy deployment and scaling of virtual machines. In general, you can use a The VHD files we publish are tailored specifically for use in the Azure cloud. They do not contain standard VM images and will not function outside of Azure, including on-premises Hyper-V or local development environments. |
Other files¶
This section includes information on checksums, GPG signatures, changelogs and manifest files. These files help verify the integrity and authenticity of the images, provide details on changes between versions and list all included packages.
Note
On Ubuntu systems, the public keys for Ubuntu cloud images are present in /usr/share/keyrings/ubuntu-cloudimage-keyring.gpg
. You can use this keyring to verify GPG signatures and checksums of downloaded artefacts with a command such as gpg --verify --keyring /usr/share/keyrings/ubuntu-cloudimage-keyring.gpg SHA256SUMS.gpg SHA256SUMS && sha256sum -c SHA256SUMS
.
Changelogs¶
Extension |
|
Example filename |
|
Format description |
JSON-formatted changelogs detailing the changes in the respective image builds. |
Data format |
- summary:
- snap:
- added: Lists newly added snap packages.
- removed: Lists removed snap packages.
- diff: Lists snap packages that have changed.
- deb:
- added: Lists newly added deb packages.
- removed: Lists removed deb packages.
- diff: Lists deb packages that have changed.
- diff:
- deb: Detailed information on changed deb packages:
- name: The name of the package.
- from_version: Previous version details, including the source package name and version.
- to_version: New version details, including the source package name and version.
- cves: Common Vulnerabilities and Exposures fixed.
- launchpad_bugs_fixed: IDs of fixed Launchpad bugs.
- changes: A list of changes with details like CVEs, change logs,
package name, version, urgency, distributions, author and date.
- notes: Additional notes, if any.
- snap: Detailed information on changed snap packages (same structure as deb).
- added: Lists newly added deb and snap packages.
- removed: Lists removed deb and snap packages.
- notes: General notes regarding the changelog.
- from_series: The series name of the previous image (e.g. noble).
- to_series: The series name of the current image.
- from_serial: The serial number of the previous image (e.g. 20240612).
- to_serial: The serial number of the current image.
- from_manifest_filename: Filename of the previous manifest.
- to_manifest_filename: Filename of the current manifest.
|
Example |
Example changelog {
"summary": {
"snap": {
"added": [],
"removed": [],
"diff": []
},
"deb": {
"added": [
"linux-headers-6.8.0-36",
],
"removed": [
"linux-headers-6.8.0-35",
],
"diff": [
"dracut-install",
]
}
},
"diff": {
"deb": [
{
"name": "dracut-install",
"from_version": {
"source_package_name": "dracut",
"source_package_version": "060+5-1ubuntu3",
"version": "060+5-1ubuntu3"
},
"to_version": {
"source_package_name": "dracut",
"source_package_version": "060+5-1ubuntu3.1",
"version": "060+5-1ubuntu3.1"
},
"cves": [],
"launchpad_bugs_fixed": [
2065180
],
"changes": [
{
"cves": [],
"log": [
"",
" * perf(dracut-install): preload kmod resources
for quicker module lookup",
" (LP: #2065180)",
""
],
"package": "dracut",
"version": "060+5-1ubuntu3.1",
"urgency": "medium",
"distributions": "noble",
"launchpad_bugs_fixed": [
2065180
],
"author": "Benjamin Drung <[email protected]>",
"date": "Tue, 04 Jun 2024 17:21:56 +0200"
}
],
"notes": null
}
],
"snap": []
},
"added": {
"deb": [
{
"name": "linux-headers-6.8.0-36",
"from_version": {
"source_package_name": "linux",
"source_package_version": "6.8.0-35.35",
"version": null
},
"to_version": {
"source_package_name": "linux",
"source_package_version": "6.8.0-36.36",
"version": "6.8.0-36.36"
},
"cves": [
{
"cve": "CVE-2024-26924",
"url": "https://ubuntu.com/security/CVE-2024-26924",
"cve_description": "In the Linux kernel, the following vulnerability live element
Pablo reports a crash with large batches of elements with a back-to-back
add/remove pattern. Quoting Pablo: add_elem(\"00000000\") timeout 100 ms ...
add_elem(\"0000000X\") timeout 100 ms del_elem(\"0000000X\") <----------------
delete one that was just added ... removes element 0000000X Then, KASAN shows
a splat. Looking at the remove function here is a chance that we will drop a
rule that maps to a non-deactivated element. Removal happens in two steps,
first we do a lookup for key k and return the generation. Then, in a second
step, the element gets removed from the set/map. The _remove function does
not work correctly if we have more than one element that share the same key.
This can happen if we insert an element into a set when the set already holds
an element with same key, but the element mapping to the existing key has timed
out or is not active in the next generation. In such case its possible that
removal will unmap the wrong element. If this happens, we will leak the
non-deactivated element, it becomes unreachable. The element that got
deactivated (and will be freed later) will remain reachable in the set data
structure, this can result in a crash when such an element is retrieved during
lookup (stale pointer). Add a check that the fully matching key does in fact
map to the element that we have marked as inactive in the deactivation step.
If not, we need to continue searching. Add a bug/warn trap at the end of the
function as well, the remove function must not ever be called with an
invisible/unreachable/non-existent element. v2: avoid uneeded temporary variable (Stefano)",
"cve_priority": "high",
"cve_public_date": "2024-04-25 06:15:00 UTC"
}
],
"launchpad_bugs_fixed": [
2068150
],
"changes": [
{
"cves": [
{
"cve": "CVE-2024-26924",
"url": "https://ubuntu.com/security/CVE-2024-26924",
"cve_description": "In the Linux kernel, the following vulnerability has been
resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports
a crash with large batches of elements with a back-to-back add/remove pattern.
Quoting Pablo: add_elem(\"00000000\") timeout 100 ms ... add_elem(\"0000000X\")
timeout 100 ms del_elem(\"0000000X\") <---------------- delete one that was
just added ... add_elem(\"00005000\") timeout 100 ms 1) nft_pipapo_remove()
removes element 0000000X Then, KASAN shows a splat. Looking at the remove
function there is a chance that we will drop a rule that maps to a
non-deactivated element. Removal happens in two steps, first we do a lookup
for key k and return the to-be-removed element and mark it as inactive in
the next generation. Then, in a second step, the element gets removed from
the set/map. The _remove function does not work correctly if we have more than
one element that share the same key. This can happen if we insert an element
into a set when the set already holds an element with same key, but the element
mapping to the existing key has timed out or is not active in the next
generation. In such case its possible that removal will unmap the wrong element.
If this happens, we will leak the non-deactivated element, it becomes unreachable.
The element that got deactivated (and will be freed later) will remain reachable
in the set data structure, this can result in a crash when such an element
is retrieved during lookup (stale pointer). Add a check that the fully matching
key does in fact map to the element that we have marked as inactive in the
deactivation step. If not, we need to continue searching. Add a bug/warn trap
at the end of the function as well, the remove function must not ever be called
with an invisible/unreachable/non-existent element. v2: avoid uneeded temporary
variable (Stefano)",
"cve_priority": "high",
"cve_public_date": "2024-04-25 06:15:00 UTC"
}
],
"log": [
"",
" * noble/linux: 6.8.0-36.36 -proposed tracker (LP: #2068150)",
"",
" * CVE-2024-26924",
" - netfilter: nft_set_pipapo: do not free live element",
""
],
"package": "linux",
"version": "6.8.0-36.36",
"urgency": "medium",
"distributions": "noble",
"launchpad_bugs_fixed": [
2068150
],
"author": "Roxana Nicolescu <[email protected]>",
"date": "Mon, 10 Jun 2024 11:26:41 +0200"
}
],
"notes": "linux-headers-6.8.0-36 version '6.8.0-36.36' (source package linux version
'6.8.0-36.36') was added. linux-headers-6.8.0-36 version '6.8.0-36.36' has
the same source package name, linux, as removed package linux-headers-6.8.0-35.
As such we can use the source package version of the removed package,
'6.8.0-35.35', as the starting point in our changelog diff. Kernel packages
are an example of where the binary package name changes for the same source
package. Using the removed package source package version as our starting
point means we can still get meaningful changelog diffs even for what appears
to be a new package."
},
],
"snap": []
},
"removed": {
"deb": [
{
"name": "linux-headers-6.8.0-35",
"from_version": {
"source_package_name": "linux",
"source_package_version": "6.8.0-35.35",
"version": "6.8.0-35.35"
},
"to_version": {
"source_package_name": null,
"source_package_version": null,
"version": null
},
"cves": [],
"launchpad_bugs_fixed": [],
"changes": [],
"notes": null
}
],
"snap": []
},
"notes": "Changelog diff for Ubuntu 24.04 noble image from daily image serial
20240622 to 20240628",
"from_series": "noble",
"to_series": "noble",
"from_serial": "20240622",
"to_serial": "20240628",
"from_manifest_filename": "daily_manifest.previous",
"to_manifest_filename": "manifest.current"
}
|
Checksums¶
Extension |
|
Example filename |
|
Format description |
Contains checksums (MD5 or SHA256) of files to verify integrity. |
Use Cases |
Checksum files are used extensively in software distribution to verify file integrity after download or transfer. |
Example |
md5sum noble-server-cloudimg-amd64.img
# Compare this checksum with the value in MD5SUMS.
cat MD5SUMS | grep noble-server-cloudimg-amd64.img
|
GPG signatures¶
Extension |
|
Example filename |
|
Format description |
GPG signatures for |
Use Cases |
GPG signatures are used in conjunction with checksum files to verify the authenticity of downloaded or transferred files securely. Verify the GPG signature of a checksum file before calculating and comparing the checksums. |
Example |
# Verify the GPG signature
gpg ~~verify SHA256SUMS.gpg SHA256SUMS
If there is no public key for Ubuntu present, you will get an error message with a gpg --keyserver keyserver.ubuntu.com \
--recv-keys <key id>
|
Manifests¶
Extension |
|
Example filename |
|
Format description |
Lists of packages included in various images. |
Data format |
|
Example |
adduser 3.137ubuntu1
apparmor 4.0.0-beta3-0ubuntu3
apport 2.28.1-0ubuntu3
apport-core-dump-handler 2.28.1-0ubuntu3
apport-symptoms 0.25
appstream 1.0.2-1build6
apt 2.7.14build2
...
|