Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: jujuutils

Found 14 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-32693
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 days, 1 hour ago
Unauthorized access to Kubernetes secrets in Juju

In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool logs an error in an exploitation attempt, the secret is still updated contrary to expectations, and the new value is visible to both the owner and the grantee.

Affected products

juju
  • <3.6.19

Matching in nixpkgs

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

Untriaged
Permalink CVE-2026-32691
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 days, 1 hour ago
Timing ownership claim attack on new external back-end secrets

A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision.

Affected products

juju
  • <3.6.19

Matching in nixpkgs

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

Untriaged
Permalink CVE-2026-32694
6.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 days, 1 hour ago
Insecure Direct Object Reference attack via predictable secret ID in Juju

In Juju from version 3.0.0 through 3.6.18, when a secret owner grants permissions to a secret to a grantee, the secret owner relies exclusively on a predictable XID of the secret to verify ownership. This allows a malicious grantee which can request secrets to predict past secrets granted by the same secret owner to different grantees, allowing them to use the resources granted by those past secrets. Successful exploitation relies on a very specific configuration, specific data semantic, and the administrator having the need to deploy at least two different applications, one of them controlled by the attacker.

Affected products

juju
  • <3.6.19

Matching in nixpkgs

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

Untriaged
Permalink CVE-2026-32692
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 4 days, 1 hour ago
Unauthorized update of out-of-scope Vault secrets

An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end.

Affected products

juju
  • <3.6.19

Matching in nixpkgs

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

Untriaged
created 1 month ago
Juju Joyent provider uploads user's private ssh key by default

Juju Core's Joyent provider before version 1.25.5 uploads the user's private ssh key.

Affected products

Juju
  • <1.25.5

Matching in nixpkgs

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

Untriaged
created 1 month, 3 weeks ago
Vulnerable cross-model authorization in juju. If a charm's cross-model permissions …

Vulnerable cross-model authorization in juju. If a charm's cross-model permissions are revoked or expire, a malicious user who is able to update database records can mint an invalid macaroon that is incorrectly validated by the juju controller, enabling a charm to maintain otherwise revoked or expired permissions. This allows a charm to continue relating to another charm in a cross-model relation, and use their workload without their permission. No fix is available as of the time of writing.

Affected products

juju
  • ==0

Matching in nixpkgs

pkgs.juju

Open source modelling tool for operating software in the cloud

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

Untriaged
Permalink CVE-2025-0928
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Arbitrary executable upload via authenticated endpoint

In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.

Affected products

juju
  • <3.6.8
  • <2.9.52

Matching in nixpkgs

pkgs.juju

Open source modelling tool for operating software in the cloud

  • nixos-unstable -

pkgs.jujutsu

Git-compatible DVCS that is both simple and powerful

  • nixos-unstable -

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

  • nixos-unstable -
Untriaged
Permalink CVE-2025-53513
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Zip slip vulnerability in Juju

The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.

Affected products

juju
  • <3.6.8
  • <2.9.52

Matching in nixpkgs

pkgs.juju

Open source modelling tool for operating software in the cloud

  • nixos-unstable -

pkgs.jujutsu

Git-compatible DVCS that is both simple and powerful

  • nixos-unstable -

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

  • nixos-unstable -
Untriaged
Permalink CVE-2025-53512
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months ago
Sensitive log retrieval in Juju

The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.

Affected products

juju
  • <3.6.8
  • <2.9.52

Matching in nixpkgs

pkgs.juju

Open source modelling tool for operating software in the cloud

  • nixos-unstable -

pkgs.jujutsu

Git-compatible DVCS that is both simple and powerful

  • nixos-unstable -

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

  • nixos-unstable -
Untriaged
Permalink CVE-2023-0092
4.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months ago
An authenticated user who has read access to the juju …

An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem.

Affected products

juju
  • <2.9.38
  • <3.0.3

Matching in nixpkgs

pkgs.juju

Open source modelling tool for operating software in the cloud

  • nixos-unstable -

pkgs.jujutsu

Git-compatible DVCS that is both simple and powerful

  • nixos-unstable -

pkgs.jujuutils

Utilities around FireWire devices connected to a Linux computer

  • nixos-unstable -