First published: Sun May 28 2017(Updated: )
Juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a UNIX domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Juju | <=1.25.12 | |
Canonical Juju | =2.0.0 | |
Canonical Juju | =2.0.0-alpha1 | |
Canonical Juju | =2.0.0-alpha2 | |
Canonical Juju | =2.0.0-beta1 | |
Canonical Juju | =2.0.0-beta10 | |
Canonical Juju | =2.0.0-beta11 | |
Canonical Juju | =2.0.0-beta12 | |
Canonical Juju | =2.0.0-beta13 | |
Canonical Juju | =2.0.0-beta14 | |
Canonical Juju | =2.0.0-beta15 | |
Canonical Juju | =2.0.0-beta16 | |
Canonical Juju | =2.0.0-beta17 | |
Canonical Juju | =2.0.0-beta18 | |
Canonical Juju | =2.0.0-beta2 | |
Canonical Juju | =2.0.0-beta3 | |
Canonical Juju | =2.0.0-beta4 | |
Canonical Juju | =2.0.0-beta5 | |
Canonical Juju | =2.0.0-beta6 | |
Canonical Juju | =2.0.0-beta7 | |
Canonical Juju | =2.0.0-beta8 | |
Canonical Juju | =2.0.0-beta9 | |
Canonical Juju | =2.0.0-rc1 | |
Canonical Juju | =2.0.0-rc2 | |
Canonical Juju | =2.0.0-rc3 | |
Canonical Juju | =2.0.1 | |
Canonical Juju | =2.0.2 | |
Canonical Juju | =2.0.3 | |
Canonical Juju | =2.1.0 | |
Canonical Juju | =2.1.0-beta1 | |
Canonical Juju | =2.1.0-beta2 | |
Canonical Juju | =2.1.0-beta3 | |
Canonical Juju | =2.1.0-beta4 | |
Canonical Juju | =2.1.0-beta5 | |
Canonical Juju | =2.1.0-rc1 | |
Canonical Juju | =2.1.0-rc2 | |
Canonical Juju | =2.1.1 | |
Canonical Juju | =2.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.