Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.853087
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for cloud-init (openSUSE-SU-2020:0400-1)
Summary:The remote host is missing an update for the 'cloud-init'; package(s) announced via the openSUSE-SU-2020:0400-1 advisory.
Description:Summary:
The remote host is missing an update for the 'cloud-init'
package(s) announced via the openSUSE-SU-2020:0400-1 advisory.

Vulnerability Insight:
This update for cloud-init fixes the following security issues:

- CVE-2020-8631: Replaced the theoretically predictable deterministic RNG
with the system RNG (bsc#1162937).

- CVE-2020-8632: Increased the default random password length from 9 to 20
(bsc#1162936).

This update was imported from the SUSE:SLE-15-SP1:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-400=1

Affected Software/OS:
'cloud-init' package(s) on openSUSE Leap 15.1.

Solution:
Please install the updated package(s).

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-8631
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795
https://github.com/canonical/cloud-init/pull/204
https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html
SuSE Security Announcement: openSUSE-SU-2020:0400 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-8632
https://github.com/canonical/cloud-init/pull/189
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.