Debian Security Advisory
DLA-2601-1 cloud-init -- LTS security update
- Date Reported:
- 20 Mar 2021
- Affected Packages:
- cloud-init
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 985540.
In Mitre's CVE dictionary: CVE-2021-3429. - More information:
-
cloud-init has the ability to generate and set a randomized password for system users. This functionality is enabled at runtime by passing cloud-config data such as:
chpasswd: list: | user1:RANDOM
When used this way, cloud-init logs the raw, unhashed password to a world-readable local file.
For Debian 9 stretch, this problem has been fixed in version 0.7.9-2+deb9u1.
We recommend that you upgrade your cloud-init packages.
For the detailed security status of cloud-init please refer to its security tracker page at: https://security-tracker.debian.org/tracker/cloud-init
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS