Unity Linux 20.1060a / 20.1070a Security Update: kernel (UTSA-2026-003767)

medium Nessus Plugin ID 288133

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-003767 advisory.

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

https://seclists.org/bugtraq/2019/Nov/11

https://security-tracker.debian.org/tracker/CVE-2019-10638

https://security.netapp.com/advisory/ntap-20190806-0001/

https://usn.ubuntu.com/4114-1/

https://usn.ubuntu.com/4115-1/

https://usn.ubuntu.com/4116-1/

https://usn.ubuntu.com/4117-1/

https://usn.ubuntu.com/4118-1/

https://www.debian.org/security/2019/dsa-4495

https://www.debian.org/security/2019/dsa-4497

https://www.oracle.com/security-alerts/cpuApr2021.html

http://www.nessus.org/u?1b11c9ad

http://www.nessus.org/u?2305893a

http://www.nessus.org/u?390095f8

http://www.nessus.org/u?70bd9b7a

http://www.securityfocus.com/bid/109092

https://access.redhat.com/errata/RHSA-2019:3309

https://access.redhat.com/errata/RHSA-2019:3517

https://arxiv.org/pdf/1906.10478.pdf

https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8

https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7

http://www.nessus.org/u?9aa85c51

http://www.nessus.org/u?8e69e3b0

http://www.nessus.org/u?ae2230f9

http://www.nessus.org/u?b230f9d9

http://www.nessus.org/u?78c48776

https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html

https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html

https://seclists.org/bugtraq/2019/Aug/13

https://seclists.org/bugtraq/2019/Aug/18

Plugin Details

Severity: Medium

ID: 288133

File Name: unity_linux_UTSA-2026-003767.nasl

Version: 1.2

Type: local

Published: 1/16/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2019-10638

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/16/2026

Vulnerability Publication Date: 7/5/2019

Reference Information

CVE: CVE-2019-10638