First published: Wed Apr 19 2023(Updated: )
When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical cloud-init | <21.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3429.
The severity of CVE-2021-3429 is medium with a CVSS score of 5.5.
CVE-2021-3429 affects versions before 21.2 of the Canonical Cloud-init software.
CVE-2021-3429 allows a local user to log in as another user by accessing the world-readable log file.
To fix CVE-2021-3429, you should upgrade to version 21.2 or newer of the Canonical Cloud-init software.