https://access.redhat.com/errata/RHSA-2018:3586
https://access.redhat.com/errata/RHSA-2018:3590
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
http://www.nessus.org/u?fbfb7b03
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://security-tracker.debian.org/tracker/CVE-2018-5391
https://security.netapp.com/advisory/ntap-20181003-0002/
http://www.nessus.org/u?a295566b
https://usn.ubuntu.com/3740-1/
https://usn.ubuntu.com/3740-2/
https://usn.ubuntu.com/3741-1/
https://usn.ubuntu.com/3741-2/
https://usn.ubuntu.com/3742-1/
https://usn.ubuntu.com/3742-2/
https://www.debian.org/security/2018/dsa-4272
https://www.kb.cert.org/vuls/id/641765
http://www.nessus.org/u?45301c00
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
http://www.nessus.org/u?13522391
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.securityfocus.com/bid/105108
http://www.securitytracker.com/id/1041476
http://www.securitytracker.com/id/1041637
https://access.redhat.com/errata/RHSA-2018:2785
https://access.redhat.com/errata/RHSA-2018:2791
https://access.redhat.com/errata/RHSA-2018:2846
https://access.redhat.com/errata/RHSA-2018:2924
https://access.redhat.com/errata/RHSA-2018:2925
https://access.redhat.com/errata/RHSA-2018:2933
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
Severity: High
ID: 286324
File Name: unity_linux_UTSA-2026-003508.nasl
Version: 1.2
Type: local
Published: 1/15/2026
Updated: 1/16/2026
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.1
Risk Factor: High
Base Score: 7.8
Temporal Score: 5.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2018-5391
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 1/15/2026
Vulnerability Publication Date: 8/6/2018
CVE: CVE-2018-5391