Cloud Init Canonical Cloud Init

Do you want an email whenever new security vulnerabilities are reported in Canonical Cloud Init?

By the Year

In 2024 there have been 0 vulnerabilities in Canonical Cloud Init . Last year Cloud Init had 3 security vulnerabilities published. Right now, Cloud Init is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 3 5.50
2022 0 0.00
2021 0 0.00
2020 2 5.50
2019 0 0.00
2018 1 7.10

It may take a day or so for new Cloud Init vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Canonical Cloud Init Security Vulnerabilities

Sensitive data could be exposed in logs of cloud-init before version 23.1.2

CVE-2023-1786 5.5 - Medium - April 26, 2023

Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.

Insertion of Sensitive Information into Log File

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported

CVE-2022-2084 5.5 - Medium - April 19, 2023

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

Insertion of Sensitive Information into Log File

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write

CVE-2021-3429 5.5 - Medium - April 19, 2023

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

Insertion of Sensitive Information into Log File

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords

CVE-2020-8631 5.5 - Medium - February 05, 2020

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.

Use of Insufficiently Random Values

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value

CVE-2020-8632 5.5 - Medium - February 05, 2020

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.

Weak Password Requirements

The default cloud-init configuration

CVE-2018-10896 7.1 - High - August 01, 2018

The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks.

Use of Hard-coded Cryptographic Key

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Canonical Cloud Init or by Canonical? Click the Watch button to subscribe.

Canonical
Vendor

subscribe