Unity Linux 20.1060a / 20.1070a Security Update: kernel (UTSA-2026-003524)

medium Nessus Plugin ID 286291

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-003524 advisory.

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?728e1256

http://support.lenovo.com/us/en/solutions/LEN-24163

http://www.nessus.org/u?92a0747d

http://www.securityfocus.com/bid/105080

http://www.securitytracker.com/id/1041451

http://www.securitytracker.com/id/1042004

http://www.vmware.com/security/advisories/VMSA-2018-0020.html

http://xenbits.xen.org/xsa/advisory-273.html

https://access.redhat.com/errata/RHSA-2018:2384

https://access.redhat.com/errata/RHSA-2018:2387

https://access.redhat.com/errata/RHSA-2018:2388

https://access.redhat.com/errata/RHSA-2018:2389

https://access.redhat.com/errata/RHSA-2018:2390

https://access.redhat.com/errata/RHSA-2018:2391

https://access.redhat.com/errata/RHSA-2018:2392

https://access.redhat.com/errata/RHSA-2018:2393

https://access.redhat.com/errata/RHSA-2018:2394

https://access.redhat.com/errata/RHSA-2018:2395

https://access.redhat.com/errata/RHSA-2018:2396

https://access.redhat.com/errata/RHSA-2018:2402

https://access.redhat.com/errata/RHSA-2018:2403

https://access.redhat.com/errata/RHSA-2018:2404

https://access.redhat.com/errata/RHSA-2018:2602

https://access.redhat.com/errata/RHSA-2018:2603

https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

https://foreshadowattack.eu/

http://www.nessus.org/u?148b2157

https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html

https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

http://www.nessus.org/u?a2fd8502

http://www.nessus.org/u?f146c97c

http://www.nessus.org/u?c7d5133c

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010

https://security-tracker.debian.org/tracker/CVE-2018-3646

https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc

https://security.gentoo.org/glsa/201810-06

https://security.netapp.com/advisory/ntap-20180815-0001/

http://www.nessus.org/u?2539a111

https://support.f5.com/csp/article/K31300402

http://www.nessus.org/u?a20a8b49

http://www.nessus.org/u?1eb58fca

https://usn.ubuntu.com/3740-1/

https://usn.ubuntu.com/3740-2/

https://usn.ubuntu.com/3741-1/

https://usn.ubuntu.com/3741-2/

https://usn.ubuntu.com/3742-1/

https://usn.ubuntu.com/3742-2/

https://usn.ubuntu.com/3756-1/

https://usn.ubuntu.com/3823-1/

https://www.debian.org/security/2018/dsa-4274

https://www.debian.org/security/2018/dsa-4279

http://www.nessus.org/u?c90ac5be

https://www.kb.cert.org/vuls/id/982149

https://www.oracle.com/security-alerts/cpujul2020.html

http://www.nessus.org/u?9166970d

http://www.nessus.org/u?799b2d05

https://www.synology.com/support/security/Synology_SA_18_45

Plugin Details

Severity: Medium

ID: 286291

File Name: unity_linux_UTSA-2026-003524.nasl

Version: 1.2

Type: local

Published: 1/15/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 3.5

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2018-3646

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2026

Vulnerability Publication Date: 8/10/2018

Reference Information

CVE: CVE-2018-3646