Debian Security Advisory

DLA-2601-1 cloud-init -- LTS security update

Date Reported:
20 Mar 2021
Affected Packages:
cloud-init
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 985540.
In Mitre's CVE dictionary: CVE-2021-3429.
More information:

cloud-init has the ability to generate and set a randomized password for system users. This functionality is enabled at runtime by passing cloud-config data such as:

chpasswd: list: | user1:RANDOM

When used this way, cloud-init logs the raw, unhashed password to a world-readable local file.

For Debian 9 stretch, this problem has been fixed in version 0.7.9-2+deb9u1.

We recommend that you upgrade your cloud-init packages.

For the detailed security status of cloud-init please refer to its security tracker page at: https://security-tracker.debian.org/tracker/cloud-init

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS