cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html | Mailing List Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 | Issue Tracking Patch Third Party Advisory |
https://github.com/canonical/cloud-init/pull/204 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html | Mailing List Third Party Advisory |
Configurations
History
22 Dec 2021, 18:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html - Mailing List, Third Party Advisory |
Information
Published : 2020-02-05 14:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-8631
Mitre link : CVE-2020-8631
CVE.ORG link : CVE-2020-8631
JSON object : View
Products Affected
canonical
- cloud-init
debian
- debian_linux
opensuse
- leap
CWE
CWE-330
Use of Insufficiently Random Values