CVE-2022-2084 (https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c): https://ubuntu.com/security/notices/USN-5496-1 Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords. CVE-2021-3429 (https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668): When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user. Please cleanup <22.4.
Ping. Please clean up cloud-init 22.2.2 if possible.