Mageia alert MGASA-2020-0295 (cloud-init)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2020-0295: Updated cloud-init packages fix security vulnerability | |
Date: | Sat, 1 Aug 2020 01:26:53 +0200 | |
Message-ID: | <20200731232653.A50BD9F6EB@duvel.mageia.org> |
MGASA-2020-0295 - Updated cloud-init packages fix security vulnerability Publication date: 31 Jul 2020 URL: https://advisories.mageia.org/MGASA-2020-0295.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-8631, CVE-2020-8632 Description: In cloud-init, relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function (CVE-2020-8631). In cloud-init, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords (CVE-2020-8632). References: - https://bugs.mageia.org/show_bug.cgi?id=26236 - https://www.debian.org/lts/security/2020/dla-2113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8631 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8632 SRPMS: - 7/core/cloud-init-0.7.5-7.1.mga7