http://www.nessus.org/u?57d6626d
http://www.nessus.org/u?14f098fa
http://www.nessus.org/u?c7a9d88d
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
http://www.openwall.com/lists/oss-security/2017/06/12/2
http://www.securityfocus.com/bid/99121
https://access.redhat.com/errata/RHSA-2017:3295
https://access.redhat.com/errata/RHSA-2017:3315
https://access.redhat.com/errata/RHSA-2017:3322
http://www.nessus.org/u?d3aae0de
http://www.nessus.org/u?b7a50e38
https://security-tracker.debian.org/tracker/CVE-2017-1000380
https://source.android.com/security/bulletin/pixel/2017-12-01
Severity: Medium
ID: 284979
File Name: unity_linux_UTSA-2026-002594.nasl
Version: 1.1
Type: local
Published: 1/15/2026
Updated: 1/15/2026
Supported Sensors: Nessus
Risk Factor: Low
Score: 3.6
Risk Factor: Low
Base Score: 2.1
Temporal Score: 1.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS Score Source: CVE-2017-1000380
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 4.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/UOS-Server/release, Host/UOS-Server/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 1/15/2026
Vulnerability Publication Date: 6/17/2017
CVE: CVE-2017-1000380