if (deb_check(prefix: 'kernel-doc-2.2.20', release: '3.0', reference: '2.2.20-5woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-doc-2.2.20 is vulnerable in Debian 3.0.\nUpgrade to kernel-doc-2.2.20_2.2.20-5woody2\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.20', release: '3.0', reference: '2.2.20-5woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.20 is vulnerable in Debian 3.0.\nUpgrade to kernel-headers-2.2.20_2.2.20-5woody3\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.20-compact', release: '3.0', reference: '2.2.20-5woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.20-compact is vulnerable in Debian 3.0.\nUpgrade to kernel-headers-2.2.20-compact_2.2.20-5woody3\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.20-idepci', release: '3.0', reference: '2.2.20-5woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.20-idepci is vulnerable in Debian 3.0.\nUpgrade to kernel-headers-2.2.20-idepci_2.2.20-5woody3\n');
}
if (deb_check(prefix: 'kernel-image-2.2.20', release: '3.0', reference: '2.2.20-5woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.20 is vulnerable in Debian 3.0.\nUpgrade to kernel-image-2.2.20_2.2.20-5woody3\n');
}
if (deb_check(prefix: 'kernel-image-2.2.20-compact', release: '3.0', reference: '2.2.20-5woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.20-compact is vulnerable in Debian 3.0.\nUpgrade to kernel-image-2.2.20-compact_2.2.20-5woody3\n');
}
if (deb_check(prefix: 'kernel-image-2.2.20-idepci', release: '3.0', reference: '2.2.20-5woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.20-idepci is vulnerable in Debian 3.0.\nUpgrade to kernel-image-2.2.20-idepci_2.2.20-5woody3\n');
}
if (deb_check(prefix: 'kernel-source-2.2.20', release: '3.0', reference: '2.2.20-5woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-source-2.2.20 is vulnerable in Debian 3.0.\nUpgrade to kernel-source-2.2.20_2.2.20-5woody2\n');
}
if (deb_check(prefix: 'kernel-source-2.2.20', release: '3.0', reference: '2.2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-source-2.2.20 is vulnerable in Debian woody.\nUpgrade to kernel-source-2.2.20_2.2\n');