First published: Wed Apr 19 2023(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical cloud-init | <22.3 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =21.10 | |
Canonical Ubuntu Linux | =22.04 | |
debian/cloud-init | 20.4.1-2+deb11u1 22.4.2-1+deb12u1 24.3.1-2 |
The Ubuntu update to address this attempted to redact information contained in /var/log/cloud-init.log. Additional logs may require the removal of sensitive information; such information would be preceded by the following text: Invalid cloud-config provided:
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2084 is a vulnerability that could expose sensitive data in world-readable logs of cloud-init before version 22.3 when schema failures are reported.
The severity of CVE-2022-2084 is medium with a severity value of 5.5.
The vulnerability affects cloud-init versions before 22.3 and Canonical Ubuntu Linux 18.04, 20.04, 21.10, and 22.04.
To fix CVE-2022-2084, update your cloud-init software to version 22.3 or above.
You can find more information about CVE-2022-2084 at the following references: [reference 1](https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c), [reference 2](https://ubuntu.com/security/notices/USN-5496-1), [reference 3](https://launchpad.net/bugs/cve/CVE-2022-2084).