First published: Wed Apr 26 2023(Updated: )
James Golovich discovered that sensitive data could be exposed in logs. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/cloud-init | <23.1.2-0ubuntu0~23.04.1 | 23.1.2-0ubuntu0~23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/cloud-init | <23.1.2-0ubuntu0~22.10.1 | 23.1.2-0ubuntu0~22.10.1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/cloud-init | <23.1.2-0ubuntu0~22.04.1 | 23.1.2-0ubuntu0~22.04.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/cloud-init | <23.1.2-0ubuntu0~20.04.1 | 23.1.2-0ubuntu0~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/cloud-init | <23.1.2-0ubuntu0~18.04.1 | 23.1.2-0ubuntu0~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/cloud-init | <21.1-19-gbad84ad4-0ubuntu1~16.04.4 | 21.1-19-gbad84ad4-0ubuntu1~16.04.4 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this cloud-init vulnerability is USN-6042-1.
The cloud-init vulnerability allows sensitive data to be exposed in logs, which could potentially be used to find hashed passwords and escalate privileges.
The cloud-init vulnerability affects versions 23.1.2-0ubuntu0~23.04.1, 23.1.2-0ubuntu0~22.10.1, 23.1.2-0ubuntu0~22.04.1, 23.1.2-0ubuntu0~20.04.1, 23.1.2-0ubuntu0~18.04.1, and 21.1-19-gbad84ad4-0ubuntu1~16.04.4 of cloud-init on Ubuntu.
An attacker can exploit this cloud-init vulnerability by using the exposed sensitive data in the logs to find hashed passwords and potentially escalate their privilege.
To fix the cloud-init vulnerability, update to version 23.1.2-0ubuntu0~23.04.1 or later using the provided remedy.