First published: Mon Jul 01 2024(Updated: )
It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6859-1 is considered a high severity vulnerability due to the potential for bypassing authentication.
To fix USN-6859-1, update OpenSSH to the patched versions specified: 1:9.6p1-3ubuntu13.3 for Ubuntu 24.04, 1:9.3p1-1ubuntu3.6 for Ubuntu 23.10, or 1:8.9p1-3ubuntu0.10 for Ubuntu 22.04.
Users of OpenSSH on Ubuntu 24.04, 23.10, and 22.04 are affected by USN-6859-1.
Yes, a remote attacker could exploit USN-6859-1 to gain unauthorized access to systems.
USN-6859-1 involves improper handling of signal management in OpenSSH, leading to authentication bypass.