Search CVE reports


Toggle filters

1 – 10 of 10 results


CVE-2024-6174

Medium priority
Vulnerable

When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2024-11584

Medium priority
Vulnerable

cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the ”/run/cloud-init/hook-hotplug-cmd” FIFO. An...

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2023-5536

Medium priority
Ignored

A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password.

2 affected packages

cloud-init, subiquity

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Ignored Ignored Ignored
subiquity Ignored Ignored Ignored
Show less packages

CVE-2023-1786

Medium priority
Fixed

Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Fixed Fixed Fixed
Show less packages

CVE-2022-2084

Medium priority
Fixed

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Fixed Fixed Fixed
Show less packages

CVE-2021-3429

Medium priority
Fixed

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as...

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Fixed Fixed
Show less packages

CVE-2020-8632

Low priority

Some fixes available 6 of 8

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Fixed Fixed Fixed
Show less packages

CVE-2020-8631

Low priority

Some fixes available 1 of 4

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Not affected Not affected Fixed
Show less packages

CVE-2019-0816

Medium priority
Fixed

A security feature bypass exists in Azure SSH Keypairs, due to a change in the provisioning logic for some Linux images that use cloud-init, aka ‘Azure SSH Keypairs Security Feature Bypass Vulnerability’.

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init Fixed
Show less packages

CVE-2012-6639

Low priority
Ignored

An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.

1 affected package

cloud-init

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
cloud-init
Show less packages