First published: Thu Aug 08 2024(Updated: )
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.4.0-1042-iot | <5.4.0-1042.43 | 5.4.0-1042.43 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1049-xilinx-zynqmp | <5.4.0-1049.53 | 5.4.0-1049.53 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1077-ibm | <5.4.0-1077.82 | 5.4.0-1077.82 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1097-gkeop | <5.4.0-1097.101 | 5.4.0-1097.101 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1114-raspi | <5.4.0-1114.126 | 5.4.0-1114.126 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1118-kvm | <5.4.0-1118.125 | 5.4.0-1118.125 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1130-aws | <5.4.0-1130.140 | 5.4.0-1130.140 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1134-gcp | <5.4.0-1134.143 | 5.4.0-1134.143 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-192-generic | <5.4.0-192.212 | 5.4.0-192.212 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-192-generic-lpae | <5.4.0-192.212 | 5.4.0-192.212 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-192-lowlatency | <5.4.0-192.212 | 5.4.0-192.212 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-aws-lts-20.04 | <5.4.0.1130.127 | 5.4.0.1130.127 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-gcp-lts-20.04 | <5.4.0.1134.136 | 5.4.0.1134.136 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic | <5.4.0.192.190 | 5.4.0.192.190 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic-lpae | <5.4.0.192.190 | 5.4.0.192.190 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-gkeop | <5.4.0.1097.95 | 5.4.0.1097.95 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1097.95 | 5.4.0.1097.95 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-ibm-lts-20.04 | <5.4.0.1077.106 | 5.4.0.1077.106 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-kvm | <5.4.0.1118.114 | 5.4.0.1118.114 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <5.4.0.192.190 | 5.4.0.192.190 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem | <5.4.0.192.190 | 5.4.0.192.190 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-osp1 | <5.4.0.192.190 | 5.4.0.192.190 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-raspi | <5.4.0.1114.144 | 5.4.0.1114.144 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-raspi2 | <5.4.0.1114.144 | 5.4.0.1114.144 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-virtual | <5.4.0.192.190 | 5.4.0.192.190 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-xilinx-zynqmp | <5.4.0.1049.49 | 5.4.0.1049.49 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1077-ibm | <5.4.0-1077.82~18.04.1 | 5.4.0-1077.82~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1130-aws | <5.4.0-1130.140~18.04.1 | 5.4.0-1130.140~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1134-gcp | <5.4.0-1134.143~18.04.1 | 5.4.0-1134.143~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-5.4.0-192-generic | <5.4.0-192.212~18.04.1 | 5.4.0-192.212~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-5.4.0-192-lowlatency | <5.4.0-192.212~18.04.1 | 5.4.0-192.212~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-aws | <5.4.0.1130.140~18.04.1 | 5.4.0.1130.140~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-gcp | <5.4.0.1134.143~18.04.1 | 5.4.0.1134.143~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-generic-hwe-18.04 | <5.4.0.192.212~18.04.1 | 5.4.0.192.212~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-ibm | <5.4.0.1077.82~18.04.1 | 5.4.0.1077.82~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-lowlatency-hwe-18.04 | <5.4.0.192.212~18.04.1 | 5.4.0.192.212~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-oem | <5.4.0.192.212~18.04.1 | 5.4.0.192.212~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-oem-osp1 | <5.4.0.192.212~18.04.1 | 5.4.0.192.212~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-snapdragon-hwe-18.04 | <5.4.0.192.212~18.04.1 | 5.4.0.192.212~18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-virtual-hwe-18.04 | <5.4.0.192.212~18.04.1 | 5.4.0.192.212~18.04.1 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6951-1 is high due to multiple security vulnerabilities found in the Linux kernel.
To fix USN-6951-1, you should update the affected packages to the latest versions provided by Ubuntu.
The affected systems for USN-6951-1 include Ubuntu 20.04 with specific versions of the Linux kernel packages.
USN-6951-1 addresses several vulnerabilities that could allow an attacker to compromise the system.
You can verify if your system is affected by USN-6951-1 by checking the installed Linux kernel package versions against the advisory's list of affected packages.