CVE-2020-8631
Summary
| CVE | CVE-2020-8631 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-05 14:15:00 UTC |
| Updated | 2021-12-22 18:18:00 UTC |
| Description | cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [security-announce] openSUSE-SU-2020:0400-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
|
| utils: use SystemRandom when generating random password. by xnox · Pull Request #204 · canonical/cloud-init · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| Bug #1860795 “cc_set_passwords is too short for RANDOM” : Bugs : cloud-init package : Ubuntu |
MISC |
bugs.launchpad.net |
Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 2113-1] cloud-init security update |
MLIST |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 352245 Amazon Linux Security Advisory for cloud-init: ALAS-2021-1486
- 377271 Alibaba Cloud Linux Security Update for cloud-init (ALINUX2-SA-2020:0167)
- 900234 CBL-Mariner Linux Security Update for cloud-init 19.1
- 903553 Common Base Linux Mariner (CBL-Mariner) Security Update for cloud-init (1887)