Unprotected Alternate Channel Affecting github.com/juju/juju/cmd/jujud/agent package, versions <2.9.51 >=3.1.0 <3.1.10 >=3.3.0 <3.3.7 >=3.4.0 <3.4.6 >=3.5.0 <3.5.4
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMJUJUJUJUCMDJUJUDAGENT-8161195
- published 3 Oct 2024
- disclosed 2 Oct 2024
- credit Harry Pidcock
Introduced: 2 Oct 2024
CVE-2024-8038 Open this link in a new tabHow to fix?
Upgrade github.com/juju/juju/cmd/jujud/agent
to version 2.9.51, 3.1.10, 3.3.7, 3.4.6, 3.5.4 or higher.
Overview
Affected versions of this package are vulnerable to Unprotected Alternate Channel via the introspection abstract UNIX domain socket. An attacker can cause a denial of service by exploiting the socket's lack of authentication to disrupt services.