Untriaged
Juju: Read All Controller Logs From Compromised Workload
Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, it is possible that a compromised workload machine under a Juju controller can read any log file for any entity in any model at any level. This issue has been patched in versions 2.9.56 and 3.6.19.
References
-
https://github.com/juju/juju/security/advisories/GHSA-j6f6-jp3p-53mw x_refsource_CONFIRM
Affected products
juju
- ==>= 2.9, < 2.9.56
- ==>= 3.6, < 3.6.19
Package maintainers
-
@RealityAnomaly Alex Zero <alex@arctarus.co.uk>
-
@0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev>
-
@emilazy Emily <nixpkgs@emily.moe>
-
@bbigras Bruno Bigras <bigras.bruno@gmail.com>
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>