First published: Mon Nov 25 2019(Updated: )
An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical cloud-init | <0.7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
debian/cloud-init | 20.4.1-2+deb11u1 22.4.2-1+deb12u1 24.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6639 is a privilege elevation vulnerability in Cloud-init before version 0.7.0.
The severity of CVE-2012-6639 is critical with a CVSS score of 8.8.
CVE-2012-6639 affects Cloud-init versions before 0.7.0 and allows for privilege elevation when making requests to an untrusted system for EC2 instance data.
Cloud-init packages from Debian, Canonical Cloud-init, and various versions of Debian Linux and SUSE Linux Enterprise Server are affected by CVE-2012-6639.
You can find more information about CVE-2012-6639 at the following references: http://article.gmane.org/gmane.comp.security.oss.general/12299, https://security-tracker.debian.org/tracker/CVE-2012-6639, and http://www.openwall.com/lists/oss-security/2014/03/06/7