Unity Linux 20.1060a / 20.1070a Security Update: kernel (UTSA-2026-003508)

high Nessus Plugin ID 286324

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-003508 advisory.

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

https://access.redhat.com/errata/RHSA-2018:3586

https://access.redhat.com/errata/RHSA-2018:3590

https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf

http://www.nessus.org/u?fbfb7b03

https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html

https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

https://security-tracker.debian.org/tracker/CVE-2018-5391

https://security.netapp.com/advisory/ntap-20181003-0002/

http://www.nessus.org/u?a295566b

https://usn.ubuntu.com/3740-1/

https://usn.ubuntu.com/3740-2/

https://usn.ubuntu.com/3741-1/

https://usn.ubuntu.com/3741-2/

https://usn.ubuntu.com/3742-1/

https://usn.ubuntu.com/3742-2/

https://www.debian.org/security/2018/dsa-4272

https://www.kb.cert.org/vuls/id/641765

http://www.nessus.org/u?45301c00

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt

http://www.nessus.org/u?13522391

http://www.openwall.com/lists/oss-security/2019/06/28/2

http://www.openwall.com/lists/oss-security/2019/07/06/3

http://www.openwall.com/lists/oss-security/2019/07/06/4

http://www.securityfocus.com/bid/105108

http://www.securitytracker.com/id/1041476

http://www.securitytracker.com/id/1041637

https://access.redhat.com/errata/RHSA-2018:2785

https://access.redhat.com/errata/RHSA-2018:2791

https://access.redhat.com/errata/RHSA-2018:2846

https://access.redhat.com/errata/RHSA-2018:2924

https://access.redhat.com/errata/RHSA-2018:2925

https://access.redhat.com/errata/RHSA-2018:2933

https://access.redhat.com/errata/RHSA-2018:2948

https://access.redhat.com/errata/RHSA-2018:3083

https://access.redhat.com/errata/RHSA-2018:3096

https://access.redhat.com/errata/RHSA-2018:3459

https://access.redhat.com/errata/RHSA-2018:3540

Plugin Details

Severity: High

ID: 286324

File Name: unity_linux_UTSA-2026-003508.nasl

Version: 1.2

Type: local

Published: 1/15/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2018-5391

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2026

Vulnerability Publication Date: 8/6/2018

Reference Information

CVE: CVE-2018-5391