Unity Linux 20.1060e / 20.1070e Security Update: kernel (UTSA-2026-001819)

high Nessus Plugin ID 286447

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-001819 advisory.

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?37ed3363

http://www.nessus.org/u?07c8b5e6

http://secunia.com/advisories/59790

http://secunia.com/advisories/60351

http://www.debian.org/security/2014/dsa-2992

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8

http://www.osvdb.org/109546

http://www.securityfocus.com/bid/68940

http://www.securitytracker.com/id/1030683

https://bugzilla.redhat.com/show_bug.cgi?id=1114089

https://exchange.xforce.ibmcloud.com/vulnerabilities/95069

http://www.nessus.org/u?f1abc4b6

https://security-tracker.debian.org/tracker/CVE-2014-3534

Plugin Details

Severity: High

ID: 286447

File Name: unity_linux_UTSA-2026-001819.nasl

Version: 1.1

Type: local

Published: 1/15/2026

Updated: 1/15/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-3534

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2026

Vulnerability Publication Date: 6/23/2014

Reference Information

CVE: CVE-2014-3534