CVE-2020-8631

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:cloud-init:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html - Mailing List, Third Party Advisory
References () https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 - Issue Tracking, Patch, Third Party Advisory () https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/canonical/cloud-init/pull/204 - Patch, Third Party Advisory () https://github.com/canonical/cloud-init/pull/204 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html - Mailing List, Third Party Advisory

Information

Published : 2020-02-05 14:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8631

Mitre link : CVE-2020-8631

CVE.ORG link : CVE-2020-8631


JSON object : View

Products Affected

opensuse

  • leap

debian

  • debian_linux

canonical

  • cloud-init
CWE
CWE-330

Use of Insufficiently Random Values