This bug was fixed in the package juju-core-1 - 1.25.6-0ubuntu2.16.10.2
---------------
juju-core-1 (1.25.6-0ubuntu2.16.10.2) yakkety-security; urgency=medium
* SECURITY UPDATE: Privilege escalation via juju-run (LP: #1682411)
- debian/patches/CVE-2017-9232.patch: create a unix domain socket with
restricted permissions to limit juju-run to only similarly privileged
processes.
- CVE-2017-9232
-- Seth Arnold <[email protected]> Fri, 26 May 2017 15:30:40
-0700
** Changed in: juju-core-1 (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: juju-core-1 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1682411
Title:
juju-run unit root escalation vulnerability
To manage notifications about this bug go to:
https://bugs.launchpad.net/juju/+bug/1682411/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs