Unity Linux 20.1060e / 20.1070e Security Update: kernel (UTSA-2026-004494)

high Nessus Plugin ID 290242

Synopsis

The Unity Linux host is missing one or more security updates.

Description

The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-004494 advisory.

In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.

Tenable has extracted the preceding description block directly from the Unity Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

http://www.nessus.org/u?2ae39eb1

http://www.nessus.org/u?322d4a03

http://www.nessus.org/u?2a74e42a

https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522

https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2

http://www.nessus.org/u?f5073026

http://www.nessus.org/u?f4dafb41

https://security-tracker.debian.org/tracker/CVE-2020-7053

https://security.netapp.com/advisory/ntap-20200204-0002/

https://usn.ubuntu.com/4255-1/

https://usn.ubuntu.com/4255-2/

https://usn.ubuntu.com/4285-1/

https://usn.ubuntu.com/4287-1/

https://usn.ubuntu.com/4287-2/

Plugin Details

Severity: High

ID: 290242

File Name: unity_linux_UTSA-2026-004494.nasl

Version: 1.1

Type: local

Published: 1/16/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-7053

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/16/2026

Vulnerability Publication Date: 1/14/2020

Reference Information

CVE: CVE-2020-7053