July 1st, 2024
OpenSSH could be made to bypass authentication and remotely access systems without proper credentials.
Package(s) : openssh-client,
openssh-server,
qlustar-module-core-jammy-amd64-13.2
Qlustar releases : 13
Affected versions: All versions prior to this update
Vulnerability : Remotely exploitable privilege escalation
Problem type : network
Qlustar-specific : no
CVE Id(s) : See list mentioned below.
It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials (CVE-2024-6387). More details can be found here.
The problem can be corrected by updating your system to the following or more recent package versions:
openssh-client 1:8.9p1-3ubuntu0.10
openssh-server 1:8.9p1-3ubuntu0.10
qlustar-module-core-jammy-amd64-13.2 13.2.0.0-b569f1531
In addition to the steps described in the general Qlustar Update Instructions these updates require the following: