Unity Linux 20.1060e / 20.1070e Security Update: kernel (UTSA-2026-003167)

high Nessus Plugin ID 287626

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-003167 advisory.

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka Dirty COW.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?544c89fa

http://fortiguard.com/advisory/FG-IR-16-063

http://www.nessus.org/u?bd05552c

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807

http://www.nessus.org/u?a0aae471

http://www.nessus.org/u?50febdfb

http://www.nessus.org/u?77e04fbc

http://www.nessus.org/u?ce9793b2

http://www.nessus.org/u?feadc27d

http://www.nessus.org/u?776f0595

http://www.nessus.org/u?5a6e0264

http://www.nessus.org/u?cf1a526a

http://www.nessus.org/u?9c89817e

http://www.nessus.org/u?9c0357e8

http://www.nessus.org/u?a52081cf

http://www.nessus.org/u?d6163e63

http://www.nessus.org/u?98ea2a72

http://www.nessus.org/u?42d50f27

http://www.nessus.org/u?4da9436a

http://www.nessus.org/u?4d24b544

http://www.nessus.org/u?1b96b0b7

http://www.nessus.org/u?e9e5e4bc

http://www.nessus.org/u?dd457a84

http://www.nessus.org/u?5aa0ec0e

http://www.nessus.org/u?b4ab4f07

http://www.nessus.org/u?3f2c5316

http://www.nessus.org/u?5496f2a6

http://www.nessus.org/u?f581eb69

http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3

http://www.openwall.com/lists/oss-security/2016/10/21/1

http://www.openwall.com/lists/oss-security/2016/10/26/7

http://www.openwall.com/lists/oss-security/2016/10/27/13

http://www.openwall.com/lists/oss-security/2016/10/30/1

http://www.openwall.com/lists/oss-security/2016/11/03/7

http://www.openwall.com/lists/oss-security/2022/03/07/1

http://www.openwall.com/lists/oss-security/2022/08/08/1

http://www.openwall.com/lists/oss-security/2022/08/08/2

http://www.openwall.com/lists/oss-security/2022/08/08/7

http://www.openwall.com/lists/oss-security/2022/08/08/8

http://www.openwall.com/lists/oss-security/2022/08/09/4

http://www.openwall.com/lists/oss-security/2022/08/15/1

http://www.nessus.org/u?50f36723

http://www.securityfocus.com/archive/1/539611/100/0/threaded

http://www.securityfocus.com/archive/1/540252/100/0/threaded

http://www.securityfocus.com/archive/1/540344/100/0/threaded

http://www.securityfocus.com/archive/1/540736/100/0/threaded

http://www.nessus.org/u?226ed3cb

http://www.nessus.org/u?85502940

http://www.nessus.org/u?cddf6ab5

http://www.nessus.org/u?55a59e35

http://www.securityfocus.com/bid/93793

http://www.securitytracker.com/id/1037078

http://www.ubuntu.com/usn/USN-3104-1

http://www.ubuntu.com/usn/USN-3104-2

http://www.ubuntu.com/usn/USN-3105-1

http://www.ubuntu.com/usn/USN-3105-2

http://www.ubuntu.com/usn/USN-3106-1

http://www.ubuntu.com/usn/USN-3106-2

http://www.ubuntu.com/usn/USN-3106-3

http://www.ubuntu.com/usn/USN-3106-4

http://www.ubuntu.com/usn/USN-3107-1

http://www.ubuntu.com/usn/USN-3107-2

https://access.redhat.com/errata/RHSA-2017:0372

https://access.redhat.com/security/cve/cve-2016-5195

https://access.redhat.com/security/vulnerabilities/2706661

https://bto.bluecoat.com/security-advisory/sa134

http://www.nessus.org/u?4265e1a1

http://www.nessus.org/u?01bd0a30

http://www.nessus.org/u?8cf726f7

http://www.nessus.org/u?fc9432f9

http://www.nessus.org/u?cfd1ede2

http://www.nessus.org/u?21bd8f4b

http://www.nessus.org/u?5045b17f

http://www.nessus.org/u?a539d2d1

http://www.nessus.org/u?1ed00983

http://rhn.redhat.com/errata/RHSA-2016-2098.html

http://rhn.redhat.com/errata/RHSA-2016-2105.html

http://rhn.redhat.com/errata/RHSA-2016-2106.html

http://rhn.redhat.com/errata/RHSA-2016-2107.html

http://rhn.redhat.com/errata/RHSA-2016-2110.html

http://rhn.redhat.com/errata/RHSA-2016-2118.html

http://rhn.redhat.com/errata/RHSA-2016-2120.html

http://rhn.redhat.com/errata/RHSA-2016-2124.html

http://rhn.redhat.com/errata/RHSA-2016-2126.html

http://rhn.redhat.com/errata/RHSA-2016-2127.html

http://rhn.redhat.com/errata/RHSA-2016-2128.html

http://rhn.redhat.com/errata/RHSA-2016-2132.html

http://rhn.redhat.com/errata/RHSA-2016-2133.html

http://seclists.org/fulldisclosure/2024/Aug/35

http://www.nessus.org/u?f6ae7306

http://www.debian.org/security/2016/dsa-3696

http://www.nessus.org/u?5f46d16d

https://security-tracker.debian.org/tracker/CVE-2016-5195

https://security.netapp.com/advisory/ntap-20161025-0001/

https://security.paloaltonetworks.com/CVE-2016-5195

https://source.android.com/security/bulletin/2016-11-01.html

https://source.android.com/security/bulletin/2016-12-01.html

http://www.nessus.org/u?d6e1b798

http://www.nessus.org/u?a08fcb41

http://www.nessus.org/u?1ce94db8

https://www.exploit-db.com/exploits/40611/

https://www.exploit-db.com/exploits/40616/

https://www.exploit-db.com/exploits/40839/

https://www.exploit-db.com/exploits/40847/

https://www.kb.cert.org/vuls/id/243144

https://bugzilla.redhat.com/show_bug.cgi?id=1384344

https://bugzilla.suse.com/show_bug.cgi?id=1004418

https://dirtycow.ninja

https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs

http://www.nessus.org/u?4095d1ea

http://www.nessus.org/u?00bcfc2d

http://www.nessus.org/u?d32c65a6

http://www.nessus.org/u?4bc94ebf

http://www.nessus.org/u?fccde761

http://www.nessus.org/u?8aecdd58

http://www.nessus.org/u?165777f5

http://www.nessus.org/u?ba4d49d2

http://www.nessus.org/u?6cf219f0

http://www.nessus.org/u?bd6275df

http://www.nessus.org/u?2dc887f0

https://kc.mcafee.com/corporate/index?page=content&id=SB10176

https://kc.mcafee.com/corporate/index?page=content&id=SB10177

https://kc.mcafee.com/corporate/index?page=content&id=SB10222

http://www.nessus.org/u?b26f0a5e

http://www.nessus.org/u?7001b773

http://www.nessus.org/u?9d6372d1

http://www.nessus.org/u?f3e19068

Plugin Details

Severity: High

ID: 287626

File Name: unity_linux_UTSA-2026-003167.nasl

Version: 1.2

Type: local

Published: 1/15/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-5195

CVSS v3

Risk Factor: High

Base Score: 7

Temporal Score: 6.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/15/2026

Vulnerability Publication Date: 10/19/2016

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Reference Information

CVE: CVE-2016-5195