CVE-2024-8038
Linux openSUSE vulnerability analysis and mitigation

Overview

CVE-2024-8038 affects the juju introspection system, specifically involving an abstract UNIX domain socket vulnerability. The vulnerability was discovered and disclosed on October 2, 2024, affecting juju versions <= 3.5.3, <= 3.4.5, <= 3.3.6, <= 3.2.4, <= 3.1.9, and <= 2.9.50. The issue exists in the introspection socket which is available without proper authentication to network namespace users (GitHub Advisory).

Technical details

The vulnerability involves an abstract UNIX domain socket responsible for introspection that is accessible without authentication locally to any user with access to the network namespace where the local juju agent is running. The vulnerability has been assigned a CVSS v3.1 base score of 7.9 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H. The weakness has been categorized as CWE-420 (Unprotected Alternate Channel) (GitHub Advisory, NVD).

Impact

The vulnerability has two main impact vectors: On a juju controller agent, attackers can perform denial of service by exploiting the /leases/revoke endpoint, which can cause availability issues. On a juju machine agent hosting units, attackers can disable the unit component using the /units endpoint with a 'stop' action (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 3.5.4, 3.4.6, 3.3.7, 3.1.10, and 2.9.51. The fix was implemented through patch 43f0fc5. No workarounds are available for unpatched systems (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management