http://www.securitytracker.com/id/1033187
http://www.ubuntu.com/usn/USN-2631-1
http://www.ubuntu.com/usn/USN-2632-1
https://bugzilla.redhat.com/show_bug.cgi?id=1228204
http://www.nessus.org/u?22eeeb83
https://security-tracker.debian.org/tracker/CVE-2015-4167
http://www.nessus.org/u?a0bae911
http://www.nessus.org/u?f3778297
http://www.nessus.org/u?9f0aa268
http://www.nessus.org/u?2da45085
http://www.nessus.org/u?cd669aeb
http://www.nessus.org/u?2acbcc41
http://www.debian.org/security/2015/dsa-3290
http://www.debian.org/security/2015/dsa-3313
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1
Severity: Medium
ID: 283866
File Name: unity_linux_UTSA-2026-000712.nasl
Version: 1.2
Type: local
Published: 1/14/2026
Updated: 1/15/2026
Supported Sensors: Nessus
Risk Factor: Low
Score: 3.6
Risk Factor: Medium
Base Score: 4.7
Temporal Score: 3.5
Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2015-4167
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 4.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 1/14/2026
Vulnerability Publication Date: 6/2/2015
CVE: CVE-2015-4167