CVE-2020-8631

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:cloud-init:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

22 Dec 2021, 18:18

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html - Mailing List, Third Party Advisory

Information

Published : 2020-02-05 14:15

Updated : 2023-12-10 13:13


NVD link : CVE-2020-8631

Mitre link : CVE-2020-8631

CVE.ORG link : CVE-2020-8631


JSON object : View

Products Affected

opensuse

  • leap

canonical

  • cloud-init

debian

  • debian_linux
CWE
CWE-330

Use of Insufficiently Random Values