First published: Wed Jun 29 2022(Updated: )
Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
<22.3 | ||
=18.04 | ||
=20.04 | ||
=21.10 | ||
=22.04 | ||
Canonical Cloud-init | <22.3 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =21.10 | |
Canonical Ubuntu Linux | =22.04 | |
debian/cloud-init | 20.2-2~deb10u2 20.4.1-2+deb11u1 22.4.2-1 23.3.1-1 | |
ubuntu/cloud-init | <22.2-0ubuntu1~18.04.3 | 22.2-0ubuntu1~18.04.3 |
ubuntu/cloud-init | <22.2-0ubuntu1~20.04.3 | 22.2-0ubuntu1~20.04.3 |
ubuntu/cloud-init | <22.2-0ubuntu1~21.10.3 | 22.2-0ubuntu1~21.10.3 |
ubuntu/cloud-init | <22.2-0ubuntu1~22.04.3 | 22.2-0ubuntu1~22.04.3 |
ubuntu/cloud-init | <22.2-64- | 22.2-64- |
ubuntu/cloud-init | <22.3 | 22.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2084 is a vulnerability that could expose sensitive data in world-readable logs of cloud-init before version 22.3 when schema failures are reported.
The severity of CVE-2022-2084 is medium with a severity value of 5.5.
The vulnerability affects cloud-init versions before 22.3 and Canonical Ubuntu Linux 18.04, 20.04, 21.10, and 22.04.
To fix CVE-2022-2084, update your cloud-init software to version 22.3 or above.
You can find more information about CVE-2022-2084 at the following references: [reference 1](https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c), [reference 2](https://ubuntu.com/security/notices/USN-5496-1), [reference 3](https://launchpad.net/bugs/cve/CVE-2022-2084).