OESA-2025-1786

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1786
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1786.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1786
Upstream
Published
2025-07-11T12:21:26Z
Modified
2025-08-12T05:41:06.538941Z
Summary
cloud-init security update
Details

Cloud-init is the defacto multi-distribution package that handles early initialization of a cloud instance.

Security Fix(es):

cloud-init is an industry-standard multi-distribution method for cross-platform cloud instance initialization by Canonical. There is a security vulnerability in cloud-init 25.1.2 and previous versions. The vulnerability originates from cloud-init-hotplugd.socket's default SocketMode permission is 0666, which may cause unauthorized users to trigger commands.(CVE-2024-11584)

cloud-init is an industry-standard multi-distribution method for cross-platform cloud instance initialization by Canonical. There is a security vulnerability in cloud-init, which originates from granting root access to hardcoded URLs during detection by non-x86 platforms.(CVE-2024-6174)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS / cloud-init

Package

Name
cloud-init
Purl
pkg:rpm/openEuler/cloud-init&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.4.1-15.oe2403

Ecosystem specific

{
    "noarch": [
        "cloud-init-23.4.1-15.oe2403.noarch.rpm",
        "cloud-init-help-23.4.1-15.oe2403.noarch.rpm"
    ],
    "src": [
        "cloud-init-23.4.1-15.oe2403.src.rpm"
    ]
}