http://www.nessus.org/u?b3fb9e04
http://www.nessus.org/u?04f2d412
http://www.nessus.org/u?4e81d80c
http://www.securityfocus.com/bid/104680
https://bugzilla.kernel.org/show_bug.cgi?id=200179
http://www.nessus.org/u?a2a8ef77
http://www.nessus.org/u?b95ebf02
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://seclists.org/bugtraq/2018/Oct/4
https://seclists.org/bugtraq/2019/Jan/52
https://security-tracker.debian.org/tracker/CVE-2018-13099
https://sourceforge.net/p/linux-f2fs/mailman/message/36356878/
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/4094-1/
Severity: Medium
ID: 284868
File Name: unity_linux_UTSA-2026-003198.nasl
Version: 1.2
Type: local
Published: 1/15/2026
Updated: 1/16/2026
Supported Sensors: Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2018-13099
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/UOS-Server/release, Host/UOS-Server/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/15/2026
Vulnerability Publication Date: 6/22/2018
CVE: CVE-2018-13099