February 20th, 2026
The system could crash or be made to run programs as an administrator.
Package(s) : linux-image-ql-generic,
qlustar-module-core-jammy-amd64-13.4,
qlustar-module-core-noble-amd64-14.1
Qlustar releases : 13, 14
Affected versions: All versions prior to this update
Vulnerability : privilege escalation/denial of service
Problem type : local
Qlustar-specific : no
CVE Id(s) : Not documented
A number of vulnerabilities and bugs have been discovered in the 6.12.x Linux kernel series since the last Qlustar 14 release based on 6.12.63. They may lead to a denial of service or privilege escalation. Please check the following web pages that contain details of the fixes in each release after 6.12.63 up to the current Qlustar kernel 6.12.73:
Linux kernel 6.12.73 Linux kernel 6.12.72 Linux kernel 6.12.71 Linux kernel 6.12.70 Linux kernel 6.12.69 Linux kernel 6.12.68 Linux kernel 6.12.67 Linux kernel 6.12.66 Linux kernel 6.12.65 Linux kernel 6.12.64
A number of vulnerabilities and bugs have been discovered in the 5.15.x Linux kernel series since the last Qlustar 13.0 release based on 5.15.197. They may lead to a denial of service or privilege escalation. Please check the following web pages that contain details of the fixes in each release after 5.15.197 up to the current Qlustar kernel 5.15.200:
Linux kernel 5.15.200 Linux kernel 5.15.199 Linux kernel 5.15.198
The problem can be corrected by updating your system to the following or more recent package versions:
linux-image-ql-generic 6.12.73-ql-generic-14-7
qlustar-module-core-noble-amd64-14.1 14.1.0-b589f1616
linux-image-ql-generic 5.15.200-ql-generic-13.0-25
qlustar-module-core-jammy-amd64-13.4 13.4.0-b588f1617
In addition to the steps described in the general Qlustar Update Instructions these updates require the following:
# spack reindex
Note that after this, older Spack versions will no longer be able to read the database. However, a backup is created in case a revert is needed.