Source: cloud-init Version: 19.4-1 Severity: important Tags: security upstream Forwarded: https://github.com/canonical/cloud-init/pull/204
Hi, The following vulnerability was published for cloud-init. CVE-2020-8631[0]: | cloud-init through 19.4 relies on Mersenne Twister for a random | password, which makes it easier for attackers to predict passwords, | because rand_str in cloudinit/util.py calls the random.choice | function. AFAIU not yet fixed upstream. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-8631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8631 [1] https://github.com/canonical/cloud-init/pull/204 Please adjust the affected versions in the BTS as needed. Regards, Salvatore
