First published: Thu Apr 24 2025(Updated: )
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.4.0-1118-fips | <5.4.0-1118.128 | 5.4.0-1118.128 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1147-gcp-fips | <5.4.0-1147.156+fips1 | 5.4.0-1147.156+fips1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.4.0-1149-azure-fips | <5.4.0-1149.157+fips1 | 5.4.0-1149.157+fips1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-azure-fips | <5.4.0.1149.87 | 5.4.0.1149.87 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-fips | <5.4.0.1118.115 | 5.4.0.1118.115 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-gcp-fips | <5.4.0.1147.89 | 5.4.0.1147.89 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7461-2 is considered high due to multiple vulnerabilities discovered in the Linux kernel.
To fix USN-7461-2, you should update the affected Linux kernel packages to the recommended versions provided in the advisory.
USN-7461-2 affects Ubuntu 20.04 with specific affected Linux kernel package versions.
USN-7461-2 addresses several security issues in the Linux kernel that could allow an attacker to compromise the system.
Yes, it is necessary to reboot the system after applying the fix for USN-7461-2 to ensure that the updated kernel is loaded.