CVE-2020-8632
Summary
| CVE | CVE-2020-8632 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-05 14:15:00 UTC |
| Updated | 2022-01-01 20:03:00 UTC |
| Description | In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [security-announce] openSUSE-SU-2020:0400-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
|
| cc_set_password: increase random pwlength from 9 to 20 by raharper · Pull Request #189 · canonical/cloud-init · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| Bug #1860795 “cc_set_passwords is too short for RANDOM” : Bugs : cloud-init package : Ubuntu |
MISC |
bugs.launchpad.net |
Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 2113-1] cloud-init security update |
MLIST |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 352245 Amazon Linux Security Advisory for cloud-init: ALAS-2021-1486
- 377271 Alibaba Cloud Linux Security Update for cloud-init (ALINUX2-SA-2020:0167)
- 900234 CBL-Mariner Linux Security Update for cloud-init 19.1
- 903427 Common Base Linux Mariner (CBL-Mariner) Security Update for cloud-init (1888)