=========================================================================Ubuntu Security Notice USN-3300-1
May 26, 2017

juju-core vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

The system could be made to run programs as an administrator.

Software Description:
- juju-core: next generation service orchestration system

Details:

Ryan Beisner discovered juju did not set permissions on a Unix domain
socket. A local attacker could use this flaw to gain administrative
privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  juju                            2.0.2-0ubuntu2.1
  juju-2.0                        2.0.2-0ubuntu2.1

Ubuntu 16.10:
  juju                            2.0.2-0ubuntu0.16.10.2
  juju-2.0                        2.0.2-0ubuntu0.16.10.2

Ubuntu 16.04 LTS:
  juju                            2.0.2-0ubuntu0.16.04.2
  juju-2.0                        2.0.2-0ubuntu0.16.04.2

Ubuntu 14.04 LTS:
  juju                            1.25.6-0ubuntu1.14.04.2
  juju-core                       1.25.6-0ubuntu1.14.04.2
  juju-local                      1.25.6-0ubuntu1.14.04.2
  juju-local-kvm                  1.25.6-0ubuntu1.14.04.2

After a standard system update you need to restart juju-core to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-3300-1
  CVE-2017-9232

Package Information:
  https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu2.1
  https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu0.16.10.2
  https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu0.16.04.2
  https://launchpad.net/ubuntu/+source/juju-core/1.25.6-0ubuntu1.14.04.2

Ubuntu 3300-1: juju-core vulnerability

May 26, 2017
The system could be made to run programs as an administrator.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 17.04: juju 2.0.2-0ubuntu2.1 juju-2.0 2.0.2-0ubuntu2.1 Ubuntu 16.10: juju 2.0.2-0ubuntu0.16.10.2 juju-2.0 2.0.2-0ubuntu0.16.10.2 Ubuntu 16.04 LTS: juju 2.0.2-0ubuntu0.16.04.2 juju-2.0 2.0.2-0ubuntu0.16.04.2 Ubuntu 14.04 LTS: juju 1.25.6-0ubuntu1.14.04.2 juju-core 1.25.6-0ubuntu1.14.04.2 juju-local 1.25.6-0ubuntu1.14.04.2 juju-local-kvm 1.25.6-0ubuntu1.14.04.2 After a standard system update you need to restart juju-core to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-3300-1

CVE-2017-9232

Severity
May 26, 2017

Package Information

https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu2.1 https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu0.16.10.2 https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu0.16.04.2 https://launchpad.net/ubuntu/+source/juju-core/1.25.6-0ubuntu1.14.04.2

Related News