Canonical Cloud-init 19.1

CPE Details

Canonical Cloud-init 19.1
19.1
2019-12-06
18h06 +00:00
2019-12-06
18h06 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:canonical:cloud-init:19.1:*:*:*:*:*:*:*

Informations

Vendor

canonical

Product

cloud-init

Version

19.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-1786 2023-04-26 22h23 +00:00 Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
5.5
Moyen
CVE-2022-2084 2023-04-19 21h47 +00:00 Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.
5.5
Moyen
CVE-2021-3429 2023-04-19 21h42 +00:00 When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.
5.5
Moyen
CVE-2020-8632 2020-02-05 12h40 +00:00 In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
5.5
Moyen
CVE-2020-8631 2020-02-05 12h39 +00:00 cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
5.5
Moyen