if (deb_check(prefix: 'kernel-doc-2.2.10', release: '3.0', reference: '2.2.10-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-doc-2.2.10 is vulnerable in Debian 3.0.\nUpgrade to kernel-doc-2.2.10_2.2.10-2\n');
}
if (deb_check(prefix: 'kernel-headers-2.2.10-apus', release: '3.0', reference: '2.2.10-13woody1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.2.10-apus is vulnerable in Debian 3.0.\nUpgrade to kernel-headers-2.2.10-apus_2.2.10-13woody1\n');
}
if (deb_check(prefix: 'kernel-image-2.2.10-apus', release: '3.0', reference: '2.2.10-13woody1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.2.10-apus is vulnerable in Debian 3.0.\nUpgrade to kernel-image-2.2.10-apus_2.2.10-13woody1\n');
}
if (deb_check(prefix: 'kernel-source-2.2.10', release: '3.0', reference: '2.2.10-2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-source-2.2.10 is vulnerable in Debian 3.0.\nUpgrade to kernel-source-2.2.10_2.2.10-2\n');
}
if (deb_check(prefix: 'kernel-source-2.2.10,', release: '3.0', reference: '2.2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-source-2.2.10, is vulnerable in Debian woody.\nUpgrade to kernel-source-2.2.10,_2.2\n');