Unity Linux 20.1060a / 20.1070a Security Update: kernel (UTSA-2026-002480)

high Nessus Plugin ID 286892

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-002480 advisory.

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?180f2ad9

http://www.nessus.org/u?5bab7e41

http://linux.oracle.com/errata/ELSA-2014-0924.html

http://linux.oracle.com/errata/ELSA-2014-3047.html

http://linux.oracle.com/errata/ELSA-2014-3048.html

http://openwall.com/lists/oss-security/2014/07/05/4

http://openwall.com/lists/oss-security/2014/07/08/16

http://openwall.com/lists/oss-security/2014/07/08/5

http://www.nessus.org/u?becc63e7

http://secunia.com/advisories/59633

http://secunia.com/advisories/59639

http://secunia.com/advisories/59654

http://secunia.com/advisories/60220

http://secunia.com/advisories/60380

http://secunia.com/advisories/60393

http://www.debian.org/security/2014/dsa-2972

http://www.exploit-db.com/exploits/34134

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4

http://www.openwall.com/lists/oss-security/2014/07/04/4

http://www.osvdb.org/108754

http://www.ubuntu.com/usn/USN-2266-1

http://www.ubuntu.com/usn/USN-2267-1

http://www.ubuntu.com/usn/USN-2268-1

http://www.ubuntu.com/usn/USN-2269-1

http://www.ubuntu.com/usn/USN-2270-1

http://www.ubuntu.com/usn/USN-2271-1

http://www.ubuntu.com/usn/USN-2272-1

http://www.ubuntu.com/usn/USN-2273-1

http://www.ubuntu.com/usn/USN-2274-1

https://bugzilla.redhat.com/show_bug.cgi?id=1115927

http://www.nessus.org/u?b071166e

https://security-tracker.debian.org/tracker/CVE-2014-4699

https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47

https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11

https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97

Plugin Details

Severity: High

ID: 286892

File Name: unity_linux_UTSA-2026-002480.nasl

Version: 1.1

Type: local

Published: 1/15/2026

Updated: 1/15/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-4699

CVSS v3

Risk Factor: High

Base Score: 7

Temporal Score: 6.5

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/15/2026

Vulnerability Publication Date: 7/9/2014

Reference Information

CVE: CVE-2014-4699