Advisory Published

USN-6951-1: Linux kernel vulnerabilities

First published: Thu Aug 08 2024(Updated: )

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/linux-image-5.4.0-1042-iot<5.4.0-1042.43
5.4.0-1042.43
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1049-xilinx-zynqmp<5.4.0-1049.53
5.4.0-1049.53
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1077-ibm<5.4.0-1077.82
5.4.0-1077.82
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1097-gkeop<5.4.0-1097.101
5.4.0-1097.101
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1114-raspi<5.4.0-1114.126
5.4.0-1114.126
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1118-kvm<5.4.0-1118.125
5.4.0-1118.125
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1130-aws<5.4.0-1130.140
5.4.0-1130.140
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1134-gcp<5.4.0-1134.143
5.4.0-1134.143
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-192-generic<5.4.0-192.212
5.4.0-192.212
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-192-generic-lpae<5.4.0-192.212
5.4.0-192.212
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-192-lowlatency<5.4.0-192.212
5.4.0-192.212
Ubuntu=20.04
All of
ubuntu/linux-image-aws-lts-20.04<5.4.0.1130.127
5.4.0.1130.127
Ubuntu=20.04
All of
ubuntu/linux-image-gcp-lts-20.04<5.4.0.1134.136
5.4.0.1134.136
Ubuntu=20.04
All of
ubuntu/linux-image-generic<5.4.0.192.190
5.4.0.192.190
Ubuntu=20.04
All of
ubuntu/linux-image-generic-lpae<5.4.0.192.190
5.4.0.192.190
Ubuntu=20.04
All of
ubuntu/linux-image-gkeop<5.4.0.1097.95
5.4.0.1097.95
Ubuntu=20.04
All of
ubuntu/linux-image-gkeop-5.4<5.4.0.1097.95
5.4.0.1097.95
Ubuntu=20.04
All of
ubuntu/linux-image-ibm-lts-20.04<5.4.0.1077.106
5.4.0.1077.106
Ubuntu=20.04
All of
ubuntu/linux-image-kvm<5.4.0.1118.114
5.4.0.1118.114
Ubuntu=20.04
All of
ubuntu/linux-image-lowlatency<5.4.0.192.190
5.4.0.192.190
Ubuntu=20.04
All of
ubuntu/linux-image-oem<5.4.0.192.190
5.4.0.192.190
Ubuntu=20.04
All of
ubuntu/linux-image-oem-osp1<5.4.0.192.190
5.4.0.192.190
Ubuntu=20.04
All of
ubuntu/linux-image-raspi<5.4.0.1114.144
5.4.0.1114.144
Ubuntu=20.04
All of
ubuntu/linux-image-raspi2<5.4.0.1114.144
5.4.0.1114.144
Ubuntu=20.04
All of
ubuntu/linux-image-virtual<5.4.0.192.190
5.4.0.192.190
Ubuntu=20.04
All of
ubuntu/linux-image-xilinx-zynqmp<5.4.0.1049.49
5.4.0.1049.49
Ubuntu=20.04
All of
ubuntu/linux-image-5.4.0-1077-ibm<5.4.0-1077.82~18.04.1
5.4.0-1077.82~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-5.4.0-1130-aws<5.4.0-1130.140~18.04.1
5.4.0-1130.140~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-5.4.0-1134-gcp<5.4.0-1134.143~18.04.1
5.4.0-1134.143~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-5.4.0-192-generic<5.4.0-192.212~18.04.1
5.4.0-192.212~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-5.4.0-192-lowlatency<5.4.0-192.212~18.04.1
5.4.0-192.212~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-aws<5.4.0.1130.140~18.04.1
5.4.0.1130.140~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-gcp<5.4.0.1134.143~18.04.1
5.4.0.1134.143~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-generic-hwe-18.04<5.4.0.192.212~18.04.1
5.4.0.192.212~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-ibm<5.4.0.1077.82~18.04.1
5.4.0.1077.82~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-lowlatency-hwe-18.04<5.4.0.192.212~18.04.1
5.4.0.192.212~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-oem<5.4.0.192.212~18.04.1
5.4.0.192.212~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-oem-osp1<5.4.0.192.212~18.04.1
5.4.0.192.212~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-snapdragon-hwe-18.04<5.4.0.192.212~18.04.1
5.4.0.192.212~18.04.1
Ubuntu=18.04
All of
ubuntu/linux-image-virtual-hwe-18.04<5.4.0.192.212~18.04.1
5.4.0.192.212~18.04.1
Ubuntu=18.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of USN-6951-1?

    The severity of USN-6951-1 is high due to multiple security vulnerabilities found in the Linux kernel.

  • How do I fix USN-6951-1?

    To fix USN-6951-1, you should update the affected packages to the latest versions provided by Ubuntu.

  • What are the affected systems for USN-6951-1?

    The affected systems for USN-6951-1 include Ubuntu 20.04 with specific versions of the Linux kernel packages.

  • What types of vulnerabilities are addressed in USN-6951-1?

    USN-6951-1 addresses several vulnerabilities that could allow an attacker to compromise the system.

  • How can I verify if my system is affected by USN-6951-1?

    You can verify if your system is affected by USN-6951-1 by checking the installed Linux kernel package versions against the advisory's list of affected packages.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203