Debian Cloud-Init vulnerabilities
9 known vulnerabilities affecting debian/cloud-init.
Total CVEs
9
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM6LOW1
Vulnerabilities
Page 1 of 1
CVE-2024-6174HIGHCVSS 8.8fixed in cloud-init 22.4.2-1+deb12u3 (bookworm)2024
CVE-2024-6174 [HIGH] CVE-2024-6174: cloud-init - When a non-x86 platform is detected, cloud-init grants root access to a hardcode...
When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
Scope: local
bookworm: resolved (fixed in 22.4.2-1+deb12u3)
bullseye: open
forky: resolved (fixed in 25.1.4-1)
sid: resolved (fixed in 25.1.4-1)
trixie: resolved (fixed in 25.
debian
CVE-2024-11584MEDIUMCVSS 5.9fixed in cloud-init 22.4.2-1+deb12u3 (bookworm)2024
CVE-2024-11584 [MEDIUM] CVE-2024-11584: cloud-init - cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.s...
cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger hotplug-hook commands.
Scope: local
bookworm: resolved (fixed in 22.4.2-1+deb12u3)
bullseye: open
fo
debian
CVE-2023-1786MEDIUMCVSS 5.5fixed in cloud-init 23.2-1 (forky)2023
CVE-2023-1786 [MEDIUM] CVE-2023-1786: cloud-init - Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An ...
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 23.2-1)
sid: resolved (fixed in 23.2-1)
trixie: resolved (fixed in 23.2-1)
debian
CVE-2022-2084MEDIUMCVSS 5.5fixed in cloud-init 22.2-2 (bookworm)2022
CVE-2022-2084 [MEDIUM] CVE-2022-2084: cloud-init - Sensitive data could be exposed in world readable logs of cloud-init before vers...
Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.
Scope: local
bookworm: resolved (fixed in 22.2-2)
bullseye: resolved
forky: resolved (fixed in 22.2-2)
sid: resolved (fixed in 22.2-2)
trixie: resolved (fixed in 22.2-2)
debian
CVE-2021-3429MEDIUMCVSS 5.5fixed in cloud-init 20.4.1-2 (bookworm)2021
CVE-2021-3429 [MEDIUM] CVE-2021-3429: cloud-init - When instructing cloud-init to set a random password for a new user account, ver...
When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.
Scope: local
bookworm: resolved (fixed in 20.4.1-2)
bullseye: resolved (fixed in 20.4.1-2)
forky: resolved (fixed in 20.4
debian
CVE-2020-8632MEDIUMCVSS 5.5fixed in cloud-init 19.4-2 (bookworm)2020
CVE-2020-8632 [MEDIUM] CVE-2020-8632: cloud-init - In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwo...
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
Scope: local
bookworm: resolved (fixed in 19.4-2)
bullseye: resolved (fixed in 19.4-2)
forky: resolved (fixed in 19.4-2)
sid: resolved (fixed in 19.4-2)
trixie: resolved (fixed in 19.4-2)
debian
CVE-2020-8631MEDIUMCVSS 5.5fixed in cloud-init 19.4-2 (bookworm)2020
CVE-2020-8631 [MEDIUM] CVE-2020-8631: cloud-init - cloud-init through 19.4 relies on Mersenne Twister for a random password, which ...
cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
Scope: local
bookworm: resolved (fixed in 19.4-2)
bullseye: resolved (fixed in 19.4-2)
forky: resolved (fixed in 19.4-2)
sid: resolved (fixed in 19.4-2)
trixie:
debian
CVE-2019-0816LOWCVSS 5.1fixed in cloud-init 18.3-6 (bookworm)2019
CVE-2019-0816 [MEDIUM] CVE-2019-0816: cloud-init - A security feature bypass exists in Azure SSH Keypairs, due to a change in the p...
A security feature bypass exists in Azure SSH Keypairs, due to a change in the provisioning logic for some Linux images that use cloud-init, aka 'Azure SSH Keypairs Security Feature Bypass Vulnerability'.
Scope: local
bookworm: resolved (fixed in 18.3-6)
bullseye: resolved (fixed in 18.3-6)
forky: resolved (fixed in 18.3-6)
sid: resolved (fixed in 18.3-6)
trixie:
debian
CVE-2012-6639HIGHCVSS 8.8fixed in cloud-init 0.7.1-1 (bookworm)2012
CVE-2012-6639 [HIGH] CVE-2012-6639: cloud-init - An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requ...
An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.
Scope: local
bookworm: resolved (fixed in 0.7.1-1)
bullseye: resolved (fixed in 0.7.1-1)
forky: resolved (fixed in 0.7.1-1)
sid: resolved (fixed in 0.7.1-1)
trixie: resolved (fixed in 0.7.1-1)
debian