script_family(english: "Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/Debian/dpkg-l");
script_summary(english: "DSA-047-1 kernel");
exit(0);
}
include("debian_package.inc");
w = 0;
if (deb_check(prefix: 'kernel-doc-2.2.19', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-doc-2.2.19 is vulnerable in Debian 2.2.\nUpgrade to kernel-doc-2.2.19_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.19', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.19 is vulnerable in Debian 2.2.\nUpgrade to kernel-headers-2.2.19_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.19-compact', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.19-compact is vulnerable in Debian 2.2.\nUpgrade to kernel-headers-2.2.19-compact_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.19-ide', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.19-ide is vulnerable in Debian 2.2.\nUpgrade to kernel-headers-2.2.19-ide_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.19-idepci', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.19-idepci is vulnerable in Debian 2.2.\nUpgrade to kernel-headers-2.2.19-idepci_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.19-sparc', release: '2.2', reference: '6')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.19-sparc is vulnerable in Debian 2.2.\nUpgrade to kernel-headers-2.2.19-sparc_6\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19 is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-amiga', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-amiga is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-amiga_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-atari', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-atari is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-atari_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-bvme6000', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-bvme6000 is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-bvme6000_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-chrp', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-chrp is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-chrp_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-compact', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-compact is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-compact_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-generic', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-generic is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-generic_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-ide', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-ide is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-ide_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-idepci', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-idepci is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-idepci_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-jensen', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-jensen is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-jensen_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-mac', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-mac is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-mac_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-mvme147', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-mvme147 is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-mvme147_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-mvme16x', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-mvme16x is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-mvme16x_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-nautilus', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-nautilus is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-nautilus_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-pmac', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-pmac is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-pmac_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-prep', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-prep is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-prep_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-riscpc', release: '2.2', reference: '20010414')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-riscpc is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-riscpc_20010414\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-smp', release: '2.2', reference: '2.2.19-1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-smp is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-smp_2.2.19-1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-sun4cdm', release: '2.2', reference: '6')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-sun4cdm is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-sun4cdm_6\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-sun4dm-pci', release: '2.2', reference: '6')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-sun4dm-pci is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-sun4dm-pci_6\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-sun4dm-smp', release: '2.2', reference: '6')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-sun4dm-smp is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-sun4dm-smp_6\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-sun4u', release: '2.2', reference: '6')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-sun4u is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-sun4u_6\n');
}
if (deb_check(prefix: 'kernel-image-2.2.19-sun4u-smp', release: '2.2', reference: '6')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.19-sun4u-smp is vulnerable in Debian 2.2.\nUpgrade to kernel-image-2.2.19-sun4u-smp_6\n');
}
if (deb_check(prefix: 'kernel-patch-2.2.19-arm', release: '2.2', reference: '20010414')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-patch-2.2.19-arm is vulnerable in Debian 2.2.\nUpgrade to kernel-patch-2.2.19-arm_20010414\n');
}
if (deb_check(prefix: 'kernel-patch-2.2.19-m68k', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-patch-2.2.19-m68k is vulnerable in Debian 2.2.\nUpgrade to kernel-patch-2.2.19-m68k_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-patch-2.2.19-powerpc', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-patch-2.2.19-powerpc is vulnerable in Debian 2.2.\nUpgrade to kernel-patch-2.2.19-powerpc_2.2.19-2\n');
}
if (deb_check(prefix: 'kernel-source-2.2.19', release: '2.2', reference: '2.2.19-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-source-2.2.19 is vulnerable in Debian 2.2.\nUpgrade to kernel-source-2.2.19_2.2.19-2\n');