Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-3081

Опубликовано: 12 авг. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-3081: cloud-init security update (MODERATE)

[20.3-10.0.1]

  • Added missing services in rhel/systemd/cloud-init.service [Orabug: 32183938]
  • Added missing services in cloud-init.service.tmpl for sshd [Orabug: 32183938]
  • Forward port applicable cloud-init 18.4-2.0.3 changes to cloud-init-18-5 [Orabug: 30435672]
  • limit permissions [Orabug: 31352433]
  • Changes to ignore all enslaved interfaces [Orabug: 30092148]
  • Fix swap file size allocation logic to allocate maxsize [Orabug: 29952349]
  • Make Oracle datasource detect dracut based config files [Orabug: 29956753]
  • add modified version of enable-ec2_utils-to-stop-retrying-to-get-ec2-metadata.patch:
    1. Enable ec2_utils.py having a way to stop retrying to get ec2 metadata
    2. Apply stop retrying to get ec2 metadata to helper/openstack.py MetadataReader Resolves: Oracle-Bug:41660 (Bugzilla)
  • added OL to list of known distros

[20.3-10.el8_4.5]

  • ci-write-passwords-only-to-serial-console-lock-down-clo.patch [bz#1979252]
  • Resolves: bz#1979252 (CVE-2021-3429 cloud-init: randomly generated passwords logged in clear-text to world-readable file [rhel-8] [rhel-8.4.0.z])

[20.3-10.el8_4.4]

  • ci-rhel-cloud.cfg-remove-ssh_genkeytypes-in-settings.py.patch [bz#1963981]
  • ci-cloud-init.spec.template-update-systemd_postun-param.patch [bz#1967600]
  • Resolves: bz#1963981 ([cloud-init] From RHEL 82+ cloud-init no longer displays sshd keys fingerprints from instance launched from a backup image [rhel-8.4.0.z])
  • Resolves: bz#1967600 (cloud-init brew build fails on Fedora 33 [rhel-8.4.0.z])

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

cloud-init

20.3-10.0.1.el8_4.5

Oracle Linux x86_64

cloud-init

20.3-10.0.1.el8_4.5

Связанные CVE

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 2 лет назад

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

CVSS3: 5.5
redhat
больше 4 лет назад

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

CVSS3: 5.5
nvd
больше 2 лет назад

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

CVSS3: 5.5
debian
больше 2 лет назад

When instructing cloud-init to set a random password for a new user ac ...

rocky
почти 4 года назад

Moderate: cloud-init security update