Unity Linux 20.1060e / 20.1070e Security Update: kernel (UTSA-2026-004524)

medium Nessus Plugin ID 290184

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-004524 advisory.

An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9.
Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?3f6a41fc

http://www.openwall.com/lists/oss-security/2020/11/19/5

http://www.nessus.org/u?62556024

http://www.nessus.org/u?0d44af22

http://www.nessus.org/u?9f5335e3

https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html

http://www.nessus.org/u?9c24f1b5

http://www.nessus.org/u?a40c4288

https://security-tracker.debian.org/tracker/CVE-2020-28941

https://www.openwall.com/lists/oss-security/2020/11/19/3

Plugin Details

Severity: Medium

ID: 290184

File Name: unity_linux_UTSA-2026-004524.nasl

Version: 1.1

Type: local

Published: 1/16/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2020-28941

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/16/2026

Vulnerability Publication Date: 11/19/2020

Reference Information

CVE: CVE-2020-28941