http://www.nessus.org/u?84b5e5a8
http://www.nessus.org/u?6b559eed
http://www.nessus.org/u?de58c590
http://www.nessus.org/u?851713fe
http://www.nessus.org/u?cd8ae14e
http://www.nessus.org/u?28c4c0a0
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.kb.cert.org/vuls/id/584653
http://www.securityfocus.com/bid/102378
http://www.securityfocus.com/bid/106128
http://www.securitytracker.com/id/1040071
http://xenbits.xen.org/xsa/advisory-254.html
https://access.redhat.com/errata/RHSA-2018:0292
http://www.nessus.org/u?892ef523
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
http://www.nessus.org/u?1eae8cc9
https://cdrdv2.intel.com/v1/dl/getContent/685358
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert.vde.com/en-us/advisories/vde-2018-003
http://www.nessus.org/u?c89c164f
http://www.nessus.org/u?f6e3da0d
http://www.nessus.org/u?148b2157
http://www.nessus.org/u?2dc887f0
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
http://www.nessus.org/u?573cb1ef
https://security-tracker.debian.org/tracker/CVE-2017-5754
http://www.nessus.org/u?cd7fb364
https://security.gentoo.org/glsa/201810-06
http://www.nessus.org/u?7c4ad7b8
https://security.netapp.com/advisory/ntap-20180104-0001/
https://source.android.com/security/bulletin/2018-04-01
https://support.citrix.com/article/CTX231399
https://support.citrix.com/article/CTX234679
https://support.f5.com/csp/article/K91229003
http://www.nessus.org/u?576ccd7b
http://www.nessus.org/u?2ec2d10c
https://support.lenovo.com/us/en/solutions/LEN-18282
http://www.nessus.org/u?1bb35f47
https://usn.ubuntu.com/3522-3/
https://usn.ubuntu.com/3522-4/
https://usn.ubuntu.com/3523-1/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/usn/usn-3516-1/
https://usn.ubuntu.com/usn/usn-3522-2/
https://usn.ubuntu.com/usn/usn-3523-2/
https://usn.ubuntu.com/usn/usn-3524-2/
https://usn.ubuntu.com/usn/usn-3525-1/
http://www.nessus.org/u?9ad9a5ca
https://www.debian.org/security/2018/dsa-4078
https://www.debian.org/security/2018/dsa-4082
https://www.debian.org/security/2018/dsa-4120
https://www.kb.cert.org/vuls/id/180049
http://www.nessus.org/u?13a2a434
https://www.oracle.com/security-alerts/cpuapr2020.html
http://www.nessus.org/u?9166970d
Severity: Medium
ID: 284986
File Name: unity_linux_UTSA-2026-002605.nasl
Version: 1.1
Type: local
Published: 1/15/2026
Updated: 1/15/2026
Supported Sensors: Nessus
Risk Factor: High
Score: 7.9
Risk Factor: Medium
Base Score: 4.7
Temporal Score: 4.1
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS Score Source: CVE-2017-5754
Risk Factor: Medium
Base Score: 5.6
Temporal Score: 5.4
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/UOS-Server/release, Host/UOS-Server/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/15/2026
Vulnerability Publication Date: 1/3/2018
CVE: CVE-2017-5754