http://www.nessus.org/u?b5b72ec6
http://www.nessus.org/u?322d4a03
https://bugzilla.kernel.org/show_bug.cgi?id=205609
https://bugzilla.kernel.org/show_bug.cgi?id=205707
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2
http://www.nessus.org/u?34bfdfb5
http://www.nessus.org/u?871878ac
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://security-tracker.debian.org/tracker/CVE-2019-19767
https://security.netapp.com/advisory/ntap-20200103-0001/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
Severity: Medium
ID: 288596
File Name: unity_linux_UTSA-2026-004197.nasl
Version: 1.2
Type: local
Published: 1/16/2026
Updated: 1/17/2026
Supported Sensors: Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2019-19767
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/16/2026
Vulnerability Publication Date: 12/12/2019
CVE: CVE-2019-19767