OESA-2025-1785

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1785
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1785.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1785
Upstream
Published
2025-07-11T12:21:24Z
Modified
2025-08-12T05:41:06.062753Z
Summary
cloud-init security update
Details

Cloud-init is the defacto multi-distribution package that handles early initialization of a cloud instance.

Security Fix(es):

cloud-init is an industry-standard multi-distribution method for cross-platform cloud instance initialization by Canonical. There is a security vulnerability in cloud-init 25.1.2 and previous versions. The vulnerability originates from cloud-init-hotplugd.socket's default SocketMode permission is 0666, which may cause unauthorized users to trigger commands.(CVE-2024-11584)

cloud-init is an industry-standard multi-distribution method for cross-platform cloud instance initialization by Canonical. There is a security vulnerability in cloud-init, which originates from granting root access to hardcoded URLs during detection by non-x86 platforms.(CVE-2024-6174)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP4 / cloud-init

Package

Name
cloud-init
Purl
pkg:rpm/openEuler/cloud-init&distro=openEuler-22.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.4-36.oe2203sp4

Ecosystem specific

{
    "src": [
        "cloud-init-21.4-36.oe2203sp4.src.rpm"
    ],
    "noarch": [
        "cloud-init-21.4-36.oe2203sp4.noarch.rpm",
        "cloud-init-help-21.4-36.oe2203sp4.noarch.rpm"
    ]
}