Bug 1798731 (CVE-2020-8631)
Summary: | CVE-2020-8631 cloud-init: Use of random.choice when generating random password | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | adimania, apevec, dustymabe, eterrell, gholms, jgreguske, mhayden, rmccabe, rschiron, shardy, sisharma, s, virt-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | cloud-init 20.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in cloud-init, where it uses the random.choice function when creating sensitive random strings used for generating a random password in new instances. Depending on the instance configuration, a remote or local attacker may abuse this vulnerability to guess the password of the victim user.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-09-29 21:59:41 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1798732, 1798733, 1812173, 1812174 | ||
Bug Blocks: | 1798734 |
Description
Pedro Sampaio
2020-02-05 21:16:04 UTC
Created cloud-init tracking bugs for this issue: Affects: epel-6 [bug 1798733] Affects: fedora-all [bug 1798732] As cc_set_passwords module could be used to set ssh password authentication as well, the Attack Vector is set to Network. Confidentiality, Integrity and Availability set to High because the direct impact of the flaw is the control of the user in the instance configured by cloud-init. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3898 https://access.redhat.com/errata/RHSA-2020:3898 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8631 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4650 https://access.redhat.com/errata/RHSA-2020:4650 |