Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 904942 (CVE-2021-3429, CVE-2022-2084) - <app-emulation/cloud-init-22.4: multiple vulnerabilities
Summary: <app-emulation/cloud-init-22.4: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2021-3429, CVE-2022-2084
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [noglsa cleanup]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-04-24 01:00 UTC by John Helmert III
Modified: 2023-10-03 08:19 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-24 01:00:38 UTC
CVE-2022-2084 (https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c):
https://ubuntu.com/security/notices/USN-5496-1

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

CVE-2021-3429 (https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668):

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

Please cleanup <22.4.
Comment 1 Hans de Graaff gentoo-dev Security 2023-10-03 08:19:31 UTC
Ping. Please clean up cloud-init 22.2.2 if possible.