Unity Linux 20.1060e / 20.1070e Security Update: kernel (UTSA-2026-004205)

high Nessus Plugin ID 288832

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-004205 advisory.

get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?a822c78f

http://www.openwall.com/lists/oss-security/2020/09/10/4

https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.7

https://git.kernel.org/linus/8891adc61dce2a8a41fc0c23262b681c3ec4b73a

https://git.kernel.org/linus/9fa2dd946743ae6f30dc4830da19147bf100a7f2

https://security-tracker.debian.org/tracker/CVE-2020-25221

https://security.netapp.com/advisory/ntap-20201001-0003/

https://www.openwall.com/lists/oss-security/2020/09/08/4

Plugin Details

Severity: High

ID: 288832

File Name: unity_linux_UTSA-2026-004205.nasl

Version: 1.2

Type: local

Published: 1/16/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-25221

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/16/2026

Vulnerability Publication Date: 9/10/2020

Reference Information

CVE: CVE-2020-25221