All the vulnerabilites related to Canonical - cloud-init
cve-2022-2084
Vulnerability from cvelistv5
Published
2023-04-19 21:47
Modified
2024-08-03 00:24
Severity ?
EPSS score ?
Summary
Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Canonical Ltd. | cloud-init |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:24:44.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://ubuntu.com/security/notices/USN-5496-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/canonical/cloud-init/releases", "packageName": "cloud-init", "platforms": [ "Linux" ], "product": "cloud-init", "repo": "https://github.com/canonical/cloud-init/", "vendor": "Canonical Ltd.", "versions": [ { "lessThan": "23.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mike Stroyan" } ], "datePublic": "2022-06-29T22:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T21:47:41.034Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "patch" ], "url": "https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c" }, { "tags": [ "vendor-advisory" ], "url": "https://ubuntu.com/security/notices/USN-5496-1" } ], "title": "sensitive data exposure in cloud-init logs" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2022-2084", "datePublished": "2023-04-19T21:47:41.034Z", "dateReserved": "2022-06-14T20:41:08.563Z", "dateUpdated": "2024-08-03T00:24:44.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10896
Vulnerability from cvelistv5
Published
2018-08-01 17:00
Modified
2024-08-05 07:54
Severity ?
EPSS score ?
Summary
The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10896 | x_refsource_CONFIRM | |
https://bugs.launchpad.net/cloud-init/+bug/1781094 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1574338 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Canonical | cloud-init |
Version: 0.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10896" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/cloud-init/+bug/1781094" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cloud-init", "vendor": "Canonical", "versions": [ { "status": "affected", "version": "0.6.2" } ] } ], "datePublic": "2018-07-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The default cloud-init configuration, in cloud-init 0.6.2 and newer, included \"ssh_deletekeys: 0\", disabling cloud-init\u0027s deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "CWE-321", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-01T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10896" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/cloud-init/+bug/1781094" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574338" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-10896", "datePublished": "2018-08-01T17:00:00", "dateReserved": "2018-05-09T00:00:00", "dateUpdated": "2024-08-05T07:54:36.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3429
Vulnerability from cvelistv5
Published
2023-04-19 21:42
Modified
2024-08-03 16:53
Severity ?
EPSS score ?
Summary
When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Canonical Ltd. | cloud-init |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:53:17.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/canonical/cloud-init/releases", "packageName": "cloud-init", "platforms": [ "Linux" ], "product": "cloud-init", "repo": "https://github.com/canonical/cloud-init/", "vendor": "Canonical Ltd.", "versions": [ { "lessThan": "21.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Carl Pearson" } ], "datePublic": "2021-03-26T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T21:42:02.402Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "patch" ], "url": "https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668" } ], "title": "sensitive data exposure in cloud-init logs" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2021-3429", "datePublished": "2023-04-19T21:42:02.402Z", "dateReserved": "2021-03-10T23:54:34.444Z", "dateUpdated": "2024-08-03T16:53:17.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6639
Vulnerability from cvelistv5
Published
2019-11-25 17:29
Modified
2024-08-06 21:36
Severity ?
EPSS score ?
Summary
An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2012-6639 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6639 | x_refsource_MISC | |
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-6639 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2012-6639 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2014/03/06/7 | x_refsource_MISC | |
https://www.securityfocus.com/bid/66019/references | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | cloud-init | cloud-init |
Version: before 0.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.960Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-6639" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6639" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-6639" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2012-6639" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/03/06/7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityfocus.com/bid/66019/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cloud-init", "vendor": "cloud-init", "versions": [ { "status": "affected", "version": "before 0.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data." } ], "problemTypes": [ { "descriptions": [ { "description": "insecure transmission of EC2 instance data can lead to root privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-25T17:29:09", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-6639" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6639" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-6639" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2012-6639" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2014/03/06/7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityfocus.com/bid/66019/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-6639", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "cloud-init", "version": { "version_data": [ { "version_value": "before 0.7.0" } ] } } ] }, "vendor_name": "cloud-init" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "insecure transmission of EC2 instance data can lead to root privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2012-6639", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2012-6639" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6639", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6639" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-6639", "refsource": "MISC", "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-6639" }, { "name": "https://access.redhat.com/security/cve/cve-2012-6639", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2012-6639" }, { "name": "http://www.openwall.com/lists/oss-security/2014/03/06/7", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2014/03/06/7" }, { "name": "https://www.securityfocus.com/bid/66019/references", "refsource": "MISC", "url": "https://www.securityfocus.com/bid/66019/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-6639", "datePublished": "2019-11-25T17:29:09", "dateReserved": "2014-03-06T00:00:00", "dateUpdated": "2024-08-06T21:36:01.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1786
Vulnerability from cvelistv5
Published
2023-04-26 22:23
Modified
2024-08-02 05:57
Severity ?
EPSS score ?
Summary
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Canonical Ltd. | cloud-init |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://bugs.launchpad.net/cloud-init/+bug/2013967" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://ubuntu.com/security/notices/USN-6042-1" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ATBJSXPL2IOAD2LDQRKWPLIC7QXS44GZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/canonical/cloud-init/releases", "packageName": "cloud-init", "platforms": [ "Linux" ], "product": "cloud-init", "repo": "https://github.com/canonical/cloud-init/", "vendor": "Canonical Ltd.", "versions": [ { "lessThan": "23.1.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "James Golovich" } ], "datePublic": "2023-04-26T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-26T22:23:47.305Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "patch" ], "url": "https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b" }, { "tags": [ "issue-tracking" ], "url": "https://bugs.launchpad.net/cloud-init/+bug/2013967" }, { "tags": [ "vendor-advisory" ], "url": "https://ubuntu.com/security/notices/USN-6042-1" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ATBJSXPL2IOAD2LDQRKWPLIC7QXS44GZ/" } ], "title": "sensitive data exposure in cloud-init logs" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2023-1786", "datePublished": "2023-04-26T22:23:47.305Z", "dateReserved": "2023-03-31T20:40:07.757Z", "dateUpdated": "2024-08-02T05:57:25.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8631
Vulnerability from cvelistv5
Published
2020-02-05 13:39
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
References
▼ | URL | Tags |
---|---|---|
https://github.com/canonical/cloud-init/pull/204 | x_refsource_MISC | |
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.363Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/canonical/cloud-init/pull/204" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795" }, { "name": "[debian-lts-announce] 20200221 [SECURITY] [DLA 2113-1] cloud-init security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html" }, { "name": "openSUSE-SU-2020:0400", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-29T05:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/canonical/cloud-init/pull/204" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795" }, { "name": "[debian-lts-announce] 20200221 [SECURITY] [DLA 2113-1] cloud-init security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html" }, { "name": "openSUSE-SU-2020:0400", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-8631", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/canonical/cloud-init/pull/204", "refsource": "MISC", "url": "https://github.com/canonical/cloud-init/pull/204" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795", "refsource": "MISC", "url": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795" }, { "name": "[debian-lts-announce] 20200221 [SECURITY] [DLA 2113-1] cloud-init security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html" }, { "name": "openSUSE-SU-2020:0400", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-8631", "datePublished": "2020-02-05T13:39:50", "dateReserved": "2020-02-05T00:00:00", "dateUpdated": "2024-08-04T10:03:46.363Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8632
Vulnerability from cvelistv5
Published
2020-02-05 13:40
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
References
▼ | URL | Tags |
---|---|---|
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 | x_refsource_MISC | |
https://github.com/canonical/cloud-init/pull/189 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/canonical/cloud-init/pull/189" }, { "name": "[debian-lts-announce] 20200221 [SECURITY] [DLA 2113-1] cloud-init security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html" }, { "name": "openSUSE-SU-2020:0400", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-29T05:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/canonical/cloud-init/pull/189" }, { "name": "[debian-lts-announce] 20200221 [SECURITY] [DLA 2113-1] cloud-init security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html" }, { "name": "openSUSE-SU-2020:0400", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-8632", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795", "refsource": "MISC", "url": "https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795" }, { "name": "https://github.com/canonical/cloud-init/pull/189", "refsource": "MISC", "url": "https://github.com/canonical/cloud-init/pull/189" }, { "name": "[debian-lts-announce] 20200221 [SECURITY] [DLA 2113-1] cloud-init security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html" }, { "name": "openSUSE-SU-2020:0400", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-8632", "datePublished": "2020-02-05T13:40:05", "dateReserved": "2020-02-05T00:00:00", "dateUpdated": "2024-08-04T10:03:46.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }