Canonical

Cloud-init

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 26.06.2025 09:25:20
  • Zuletzt bearbeitet 05.09.2025 15:20:25

cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user c...

  • EPSS 0.04%
  • Veröffentlicht 26.06.2025 09:15:25
  • Zuletzt bearbeitet 26.08.2025 20:48:56

When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.

  • EPSS 0.02%
  • Veröffentlicht 26.04.2023 23:15:08
  • Zuletzt bearbeitet 21.11.2024 07:39:54

Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.

  • EPSS 0.05%
  • Veröffentlicht 19.04.2023 22:15:10
  • Zuletzt bearbeitet 05.02.2025 15:15:13

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

  • EPSS 0.03%
  • Veröffentlicht 19.04.2023 22:15:10
  • Zuletzt bearbeitet 05.02.2025 15:15:15

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

  • EPSS 0.12%
  • Veröffentlicht 05.02.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:09

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.

  • EPSS 0.14%
  • Veröffentlicht 05.02.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:09

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.

  • EPSS 1.2%
  • Veröffentlicht 25.11.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 01:46:35

An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.

  • EPSS 0.04%
  • Veröffentlicht 01.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:14

The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template sys...