Untriaged
Juju: Resource poisoning
Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, any authenticated user, machine or controller under a Juju controller can modify the resources of an application within the entire controller. This issue has been patched in versions 2.9.56 and 3.6.19.
References
-
https://github.com/juju/juju/security/advisories/GHSA-245v-p8fj-vwm2 x_refsource_CONFIRM
Affected products
juju
- ==>= 2.9, < 2.9.56
- ==>= 3.6, < 3.6.19
Package maintainers
-
@RealityAnomaly Alex Zero <alex@arctarus.co.uk>
-
@0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev>
-
@emilazy Emily <nixpkgs@emily.moe>
-
@bbigras Bruno Bigras <bigras.bruno@gmail.com>
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>