cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
References
Link | Resource |
---|---|
https://github.com/canonical/cloud-init/pull/204 | Patch Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html | Mailing List Third Party Advisory |
Information
Published : 2020-02-05 06:15
Updated : 2021-12-22 10:18
NVD link : CVE-2020-8631
Mitre link : CVE-2020-8631
JSON object : View
CWE
CWE-330
Use of Insufficiently Random Values
Products Affected
debian
- debian_linux
opensuse
- leap
canonical
- cloud-init