Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-32691

Опубликовано: 18 мар. 2026
Источник: debian
EPSS Низкий

Описание

A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jujuremovedpackage

EPSS

Процентиль: 2%
0.00012
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
11 дней назад

A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision.

CVSS3: 5.3
nvd
11 дней назад

A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision.

CVSS3: 5.3
github
10 дней назад

Juju affected by timing ownership claim attack on new external back-end secrets

EPSS

Процентиль: 2%
0.00012
Низкий