========================================================================== Ubuntu Security Notice USN-3300-1 May 26, 2017 juju-core vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 17.04 - Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: The system could be made to run programs as an administrator. Software Description: - juju-core: next generation service orchestration system Details: Ryan Beisner discovered juju did not set permissions on a Unix domain socket. A local attacker could use this flaw to gain administrative privileges. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 17.04: juju 2.0.2-0ubuntu2.1 juju-2.0 2.0.2-0ubuntu2.1 Ubuntu 16.10: juju 2.0.2-0ubuntu0.16.10.2 juju-2.0 2.0.2-0ubuntu0.16.10.2 Ubuntu 16.04 LTS: juju 2.0.2-0ubuntu0.16.04.2 juju-2.0 2.0.2-0ubuntu0.16.04.2 Ubuntu 14.04 LTS: juju 1.25.6-0ubuntu1.14.04.2 juju-core 1.25.6-0ubuntu1.14.04.2 juju-local 1.25.6-0ubuntu1.14.04.2 juju-local-kvm 1.25.6-0ubuntu1.14.04.2 After a standard system update you need to restart juju-core to make all the necessary changes. References: https://www.ubuntu.com/usn/usn-3300-1 CVE-2017-9232 Package Information: https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu2.1 https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu0.16.10.2 https://launchpad.net/ubuntu/+source/juju-core/2.0.2-0ubuntu0.16.04.2 https://launchpad.net/ubuntu/+source/juju-core/1.25.6-0ubuntu1.14.04.2