Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 904942 (CVE-2021-3429, CVE-2022-2084)

Summary: <app-emulation/cloud-init-22.4: multiple vulnerabilities
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: minor CC: prometheanfire
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B4 [noglsa cleanup]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-24 01:00:38 UTC
CVE-2022-2084 (https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c):
https://ubuntu.com/security/notices/USN-5496-1

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

CVE-2021-3429 (https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668):

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

Please cleanup <22.4.
Comment 1 Hans de Graaff gentoo-dev Security 2023-10-03 08:19:31 UTC
Ping. Please clean up cloud-init 22.2.2 if possible.