http://www.nessus.org/u?3cbe8ab6
http://www.nessus.org/u?351ae8c2
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
http://www.nessus.org/u?7f897196
http://www.nessus.org/u?9f0aa268
http://www.nessus.org/u?2da45085
http://www.nessus.org/u?bf159f54
http://www.nessus.org/u?86f17557
http://www.nessus.org/u?30472a34
http://www.nessus.org/u?537c0f6e
http://www.nessus.org/u?de12f60a
http://www.nessus.org/u?7ada41c2
http://www.nessus.org/u?cd669aeb
http://www.nessus.org/u?2acbcc41
http://rhn.redhat.com/errata/RHSA-2015-1623.html
http://rhn.redhat.com/errata/RHSA-2015-1778.html
http://rhn.redhat.com/errata/RHSA-2015-1787.html
http://rhn.redhat.com/errata/RHSA-2016-0045.html
http://rhn.redhat.com/errata/RHSA-2016-1096.html
http://rhn.redhat.com/errata/RHSA-2016-1100.html
http://www.debian.org/security/2015/dsa-3313
http://www.debian.org/security/2015/dsa-3329
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6
http://www.openwall.com/lists/oss-security/2015/06/30/13
http://www.nessus.org/u?7704c22a
http://www.nessus.org/u?62b02229
http://www.securityfocus.com/bid/75510
http://www.securitytracker.com/id/1032794
http://www.ubuntu.com/usn/USN-2680-1
http://www.ubuntu.com/usn/USN-2681-1
http://www.ubuntu.com/usn/USN-2682-1
http://www.ubuntu.com/usn/USN-2683-1
http://www.ubuntu.com/usn/USN-2684-1
http://www.ubuntu.com/usn/USN-2713-1
http://www.ubuntu.com/usn/USN-2714-1
https://access.redhat.com/errata/RHSA-2016:1225
https://bugzilla.redhat.com/show_bug.cgi?id=1239029
http://www.nessus.org/u?9efe6f23
Severity: Critical
ID: 284936
File Name: unity_linux_UTSA-2026-002424.nasl
Version: 1.1
Type: local
Published: 1/15/2026
Updated: 1/15/2026
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.8
Temporal Score: 5.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2015-5364
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/UOS-Server/release, Host/UOS-Server/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 1/15/2026
Vulnerability Publication Date: 6/30/2015
CVE: CVE-2015-5364