Unity Linux 20.1070e Security Update: kernel (UTSA-2026-003453)

medium Nessus Plugin ID 287874

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-003453 advisory.

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?09932a46

http://www.nessus.org/u?6b559eed

http://www.nessus.org/u?de58c590

http://www.nessus.org/u?851713fe

http://www.nessus.org/u?cd8ae14e

http://www.nessus.org/u?28c4c0a0

http://nvidia.custhelp.com/app/answers/detail/a_id/4609

http://nvidia.custhelp.com/app/answers/detail/a_id/4611

http://nvidia.custhelp.com/app/answers/detail/a_id/4613

http://nvidia.custhelp.com/app/answers/detail/a_id/4614

http://www.nessus.org/u?a875b3c1

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt

http://www.kb.cert.org/vuls/id/584653

http://www.nessus.org/u?76507bf8

http://www.securityfocus.com/bid/102371

http://www.securitytracker.com/id/1040071

http://xenbits.xen.org/xsa/advisory-254.html

https://access.redhat.com/errata/RHSA-2018:0292

http://www.nessus.org/u?892ef523

https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/

http://www.nessus.org/u?1eae8cc9

https://cdrdv2.intel.com/v1/dl/getContent/685359

https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

https://cert.vde.com/en-us/advisories/vde-2018-002

https://cert.vde.com/en-us/advisories/vde-2018-003

http://www.nessus.org/u?c89c164f

http://www.nessus.org/u?f6e3da0d

http://www.nessus.org/u?2dc887f0

https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

http://www.nessus.org/u?573cb1ef

https://seclists.org/bugtraq/2019/Jun/36

https://security-tracker.debian.org/tracker/CVE-2017-5753

https://security.gentoo.org/glsa/201810-06

http://www.nessus.org/u?7c4ad7b8

https://security.netapp.com/advisory/ntap-20180104-0001/

https://spectreattack.com/

https://support.citrix.com/article/CTX231399

https://support.f5.com/csp/article/K91229003

http://www.nessus.org/u?576ccd7b

http://www.nessus.org/u?2ec2d10c

https://support.lenovo.com/us/en/solutions/LEN-18282

http://www.nessus.org/u?1bb35f47

https://usn.ubuntu.com/3540-1/

https://usn.ubuntu.com/3540-2/

https://usn.ubuntu.com/3541-1/

https://usn.ubuntu.com/3541-2/

https://usn.ubuntu.com/3542-1/

https://usn.ubuntu.com/3542-2/

https://usn.ubuntu.com/3549-1/

https://usn.ubuntu.com/3580-1/

https://usn.ubuntu.com/3597-1/

https://usn.ubuntu.com/3597-2/

https://usn.ubuntu.com/usn/usn-3516-1/

https://www.debian.org/security/2018/dsa-4187

https://www.debian.org/security/2018/dsa-4188

https://www.exploit-db.com/exploits/43427/

https://www.kb.cert.org/vuls/id/180049

http://www.nessus.org/u?13a2a434

http://www.nessus.org/u?9166970d

http://www.nessus.org/u?f5691f33

https://www.synology.com/support/security/Synology_SA_18_01

https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html

Plugin Details

Severity: Medium

ID: 287874

File Name: unity_linux_UTSA-2026-003453.nasl

Version: 1.1

Type: local

Published: 1/15/2026

Updated: 1/15/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2017-5753

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.4

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/15/2026

Vulnerability Publication Date: 1/3/2018

Reference Information

CVE: CVE-2017-5753