Description
- ----------------------------------------------------------------------
Debian Security Advisory DSA-1862-1 security@debian.org
http://www.debian.org/security/ dann frazier
Aug 14, 2009 http://www.debian.org/security/faq
- ----------------------------------------------------------------------
Package : linux-2.6
Vulnerability : privilege escalation
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2009-2692
A vulnerability has been discovered in the Linux kernel that may lead
to privilege escalation. The Common Vulnerabilities and Exposures project
identifies the following problem:
CVE-2009-2692
Tavis Ormandy and Julien Tinnes discovered an issue with how the
sendpage function is initialized in the proto_ops structure.
Local users can exploit this vulnerability to gain elevated
privileges.
For the stable distribution (lenny), this problem has been fixed in
version 2.6.26-17lenny2.
For the oldstable distribution (etch), this problem will be fixed in
updates to linux-2.6 and linux-2.6.24.
We recommend that you upgrade your linux-2.6 and user-mode-linux
packages.
Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or "leap-frog" fashion.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:
Debian 5.0 (lenny)
user-mode-linux 2.6.26-1um-2+17lenny2
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are currently available for alpha, amd64, armel, hppa, i386, ia64, powerpc, and s390.
Updates for arm, mips, mipsel and sparc will be released as they become available.
Source archives:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.dsc
Size/MD5 checksum: 5777 778d506d29d58629169fb094440a670f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.diff.gz
Size/MD5 checksum: 7358563 38994c775f27acf823b0b95bf754db3b
Architecture independent packages:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-17lenny2_all.deb
Size/MD5 checksum: 48704700 b9db7b38d2e6b475c589bf0a06adbe12
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-17lenny2_all.deb
Size/MD5 checksum: 1763974 f11261edc6cdca9cca17867b8780c1a5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-17lenny2_all.deb
Size/MD5 checksum: 105480 bdcd78ed992cc7ee56e61fd172eab707
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-17lenny2_all.deb
Size/MD5 checksum: 4626246 b2ccc2b63627a18e639e6ea895bba516
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-17lenny2_all.deb
Size/MD5 checksum: 2306612 14fc083581d9b30ffdd57416f13463e6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-17lenny2_all.deb
Size/MD5 checksum: 120812 9c25118292fbc8ca8e0deef89b8ac7ee
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 29154078 226201e7b09d11de896b2d315f2e05a1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 370554 be4db289f1284b9ea320908964031771
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 28445388 2d3f4d92ce24404d507e07d4b3c7faed
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 752348 9abad746737d1a6c73c629d88556631b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 369148 e506e816e1abd27f0af800949406f379
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 369540 dcb8a9bc15a83f0ae417cde132b178f3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 28464658 0354c7852e965fb2d2a5e3a92e7cc4b6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 105016 cc2dba5215fc4ec7eafab96f9fdee85a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 104990 7779df5a92a7c82d8e9805c8478cadd3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_alpha.deb
Size/MD5 checksum: 3609292 578094d766f9c8715a63f988d546f5db
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 21075792 826272290d9a0a7ed9380cb293b74202
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 20898512 c144b49aa5303e64c26ffb9a8349299c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 105022 7c5bc39abcd5ea099dc2c68f29c7f61c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 3936720 98965d3a5a205009bf4176f31a7d5d9d
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 104974 efebe8d0fd9ed2f59b5ae6289baa0c82
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 395090 c1d3d9b5a855cc7d5f73c6822ad33273
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 763150 52377c994b460cd42e87b5199baa93bf
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 3796042 3506a4904b64dddfde5fd7e96056842a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 104992 ab1255eb1b76a2460a8c82c2bfd3e8cf
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 3831930 7cdf146e9bed49df55bf1a8ada76ea5e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 1801802 9bf447bb3b8217ff8374379d8d9e9e8e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 3853576 1b2e8c45d03a644f0f8e43af99600484
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 394178 38d3f0a7f8839560650c025d6d0c6b25
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 20916648 b30ae18c00908ba35838318f33a1a1f4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 391332 e6b8388fc1ad579a393ec8eb83d29c0e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 19287240 350f1b3087bae5b9a8869e4da87101b5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb
Size/MD5 checksum: 399972 04377bd1095a6439a84b9cd54721290f
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 11367566 f03bb0e9252092ee464ea5f5fcf928ae
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 104940 4137be5b72ea362ba69c73248fd4fba9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 11677718 b937f7e393f11683adf3903075fb607a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 104970 788eff6e57a62d156af1fde94e5f36c2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 4134282 b0c12f7af6f633058075e00ffcd29c3e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 12390568 ca4548bc381baca564fa3fdae12ce364
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 365084 f2365c4375c0d38d91991dd0e8dd9c40
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 9566630 7558ef282743dc80d89daa5b987e7341
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 358262 c55651c5078a29296e0b90511d103e88
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 362334 8395b9856cf5bff3d0dd955c719d2f97
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 746046 aeb4565b2c887046e8e8838bb28ada77
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb
Size/MD5 checksum: 333226 e8ea226b74e47c13bafa06904e204f88
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 295810 4c96d67831d9a678f72ba2aa4aa06f99
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 296614 2f5495d3f476641b50dff240686d932a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 15611774 ee96399d725a38e58a80dc8b200a5563
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 16939988 7b50b257380513da1add191e01694cc3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 105022 8cee7cda0d9464809e8cdee9e6a7b556
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 104998 3214091598a445c0e7a677b707711153
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 3591982 a623da1600d191c0a64ae5ec8d27ac39
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 295766 c09c8ec22f461a8a0cdb99cdc2ea27a9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 17482396 7c77995f3dbe9c767430aefbc8f59cfb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 297272 b1da5f2b42cff33e40b529e53beca72b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 757918 b7d4b035278adaf56e5a230288cfc4f7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb
Size/MD5 checksum: 16208922 c6a484280f6184e0b442a17ff83e95cd
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 20413976 04d51ce56e7028b2f91a3b5fe87286f6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 397326 45be7edbc919158eb59552019016e9fb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 402268 b385d0f4154014cc64bcfb323383bf44
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 398048 8d5a50e1079929102c3d803131033c1d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 385772 60d654387c6c37a60c8a75b822211442
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 20144006 719e7b27a6ea4264f637d9a96c4c5296
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 398742 655d8a3f14fb17b9114bc081042ae648
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 104986 9afd8d2bfbc7f6fa263e6ac53dcb2656
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 20238528 ce311c203021da955151881cb7d375b2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 3772394 f6e02fbc6710082f0bf73dfc75910af4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 3749446 e5d50c30de82e09f8d3b5d99436988ea
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 104998 b03c136b66b63157382dcd7aaef9d717
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 396772 17b48033e6ff6807a9dad27983eb2229
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 20083702 0f9da9631140a67c63efd51c9dbc7483
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 20767854 5dfaa68464e850bfcc133be3ece0658a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 3716762 bcf07113a999521a1f9b037f78ca26f2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 105044 251258ba61dcff1f9109491f568317f0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 3849260 d73aa1bf73053ba0bb923f548f295c57
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 382932 f530a883d2d83220a711bbb26da436ca
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 20262436 d186dc1633c391eac3244d60905f2db7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 747938 33c87613d7be0a774cda443b63f2960c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 397028 d16142bc4b5a647260a109a644610858
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 20118938 5639665095f98021e04e1483914ad582
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 1590672 f6a77786e8af305b37146f02e49bcc95
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
Size/MD5 checksum: 17947566 cded55faac16e46093f2dbc615cb8e31
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 353930 468fb9fb898c20a4495da5dddc5a3a10
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 34181220 4d819112382d44f42dda16782acc488d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 33924346 a457c9a9b75a355004af9b60eb866395
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 105028 d9f0a8520d6d3140b513989b0541aab8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 33991662 b4054df37c0eb3931bccd824a7f67551
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 353338 9c46923df7a43e6685a16d8eeb4b1293
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 3684826 921ddeb8796289e177964b78a33040f9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 3652662 d5a646c88e931cd9c9d5f921c9c61512
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 353962 4289a453c6d503c7037d799cd9b187e0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 746554 b9f732ad3e48eae272d84699ef84eae1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 104998 0616e4dba51187d20b81bb02a66655c2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 34101438 d731d8f6e00196bb9def763652095fe2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb
Size/MD5 checksum: 353318 eb313d2479e85040db2c8f7a8bc08538
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 3853594 3428d54581b3f72795f1ab658133ddb0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 23392862 2e62b3795a74736993143b0913ffad15
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 23515080 1dd10c4910886222208e97f037832179
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 365636 c3cc1dd7a5ba76e1370d6fac1263c7ec
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 3888340 48e1e28c6cfb34d0005e42c4364d97c4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 754258 3e2d23d42a85b673ee8c21b8ee87089c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 371508 c7df98e149454c08bb3439bf0e9eef82
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 364046 3d414da6ab19e93ca08a2b703b81db51
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 23113310 f8aade9ca0750376cb5ecf76baf5c727
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 365624 8db3f6054bf35932efdcc20986f51141
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 23549948 1fa039fc7e55587037885a22a1e1319f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 371960 490abdbc47f5655f0ba86cdace0bad3b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 105036 cbfbae53d87e834de1b69554f1a65b39
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 105000 fa3411e376757a793e420054e01430fd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb
Size/MD5 checksum: 23342334 ae886394987fc9a75a9e27ebd122cb31
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 3528026 a8d5eb791d93f3f9b73a8243b566f2fc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 228388 40091ee787b0f584256489344929511d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 229632 54187e8f9a0fd84382204936d0304370
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 227626 e96920c8bb8f6e355c7553642263b880
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 739850 c4180ab3de3a95e516a834c45cb8816b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 104988 d670e2db78c6cbc665df597d90e66670
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 3560468 e0495f5c3a10f05392ccf42562ac37e4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 7482778 6d560b4726290ecb91222ce93c1945b6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 7770286 d33e1e09211445b8eae53cf2b0336bd5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 1627186 bec53403751dfb0f4af5d25d19426a8f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 7830740 16b4b7cfa849e01bc9db5ee3f6140ea1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-17lenny2_s390.deb
Size/MD5 checksum: 105008 e9d1d2283d60611b5a1392fa4f599a59
These changes will probably be included in the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
Affected Package
Related
{"id": "DEBIAN:DSA-1862-1:C1869", "vendorId": null, "type": "debian", "bulletinFamily": "unix", "title": "[SECURITY] [DSA 1862-1] New Linux 2.6.26 packages fix privilege escalation", "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1862-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nAug 14, 2009 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : privilege escalation\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2009-2692\n\nA vulnerability has been discovered in the Linux kernel that may lead\nto privilege escalation. The Common Vulnerabilities and Exposures project\nidentifies the following problem:\n\nCVE-2009-2692\n\n Tavis Ormandy and Julien Tinnes discovered an issue with how the\n sendpage function is initialized in the proto_ops structure.\n Local users can exploit this vulnerability to gain elevated\n privileges.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-17lenny2.\n\nFor the oldstable distribution (etch), this problem will be fixed in\nupdates to linux-2.6 and linux-2.6.24.\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux\npackages.\n\nNote: Debian carefully tracks all known security issues across every\nlinux kernel package in all releases under active security support.\nHowever, given the high frequency at which low-severity security\nissues are discovered in the kernel and the resource requirements of\ndoing an update, updates for lower priority issues will normally not\nbe released for all kernels at the same time. Rather, they will be\nreleased in a staggered or "leap-frog" fashion.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n Debian 5.0 (lenny)\n user-mode-linux 2.6.26-1um-2+17lenny2\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are currently available for alpha, amd64, armel, hppa, i386, ia64, powerpc, and s390.\nUpdates for arm, mips, mipsel and sparc will be released as they become available.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.dsc\n Size/MD5 checksum: 5777 778d506d29d58629169fb094440a670f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz\n Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.diff.gz\n Size/MD5 checksum: 7358563 38994c775f27acf823b0b95bf754db3b\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-17lenny2_all.deb\n Size/MD5 checksum: 48704700 b9db7b38d2e6b475c589bf0a06adbe12\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-17lenny2_all.deb\n Size/MD5 checksum: 1763974 f11261edc6cdca9cca17867b8780c1a5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-17lenny2_all.deb\n Size/MD5 checksum: 105480 bdcd78ed992cc7ee56e61fd172eab707\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-17lenny2_all.deb\n Size/MD5 checksum: 4626246 b2ccc2b63627a18e639e6ea895bba516\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-17lenny2_all.deb\n Size/MD5 checksum: 2306612 14fc083581d9b30ffdd57416f13463e6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-17lenny2_all.deb\n Size/MD5 checksum: 120812 9c25118292fbc8ca8e0deef89b8ac7ee\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 29154078 226201e7b09d11de896b2d315f2e05a1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 370554 be4db289f1284b9ea320908964031771\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 28445388 2d3f4d92ce24404d507e07d4b3c7faed\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 752348 9abad746737d1a6c73c629d88556631b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 369148 e506e816e1abd27f0af800949406f379\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 369540 dcb8a9bc15a83f0ae417cde132b178f3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 28464658 0354c7852e965fb2d2a5e3a92e7cc4b6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 105016 cc2dba5215fc4ec7eafab96f9fdee85a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 104990 7779df5a92a7c82d8e9805c8478cadd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_alpha.deb\n Size/MD5 checksum: 3609292 578094d766f9c8715a63f988d546f5db\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 21075792 826272290d9a0a7ed9380cb293b74202\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 20898512 c144b49aa5303e64c26ffb9a8349299c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 105022 7c5bc39abcd5ea099dc2c68f29c7f61c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 3936720 98965d3a5a205009bf4176f31a7d5d9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 104974 efebe8d0fd9ed2f59b5ae6289baa0c82\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 395090 c1d3d9b5a855cc7d5f73c6822ad33273\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 763150 52377c994b460cd42e87b5199baa93bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 3796042 3506a4904b64dddfde5fd7e96056842a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 104992 ab1255eb1b76a2460a8c82c2bfd3e8cf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 3831930 7cdf146e9bed49df55bf1a8ada76ea5e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 1801802 9bf447bb3b8217ff8374379d8d9e9e8e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 3853576 1b2e8c45d03a644f0f8e43af99600484\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 394178 38d3f0a7f8839560650c025d6d0c6b25\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 20916648 b30ae18c00908ba35838318f33a1a1f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 391332 e6b8388fc1ad579a393ec8eb83d29c0e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 19287240 350f1b3087bae5b9a8869e4da87101b5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb\n Size/MD5 checksum: 399972 04377bd1095a6439a84b9cd54721290f\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 11367566 f03bb0e9252092ee464ea5f5fcf928ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 104940 4137be5b72ea362ba69c73248fd4fba9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 11677718 b937f7e393f11683adf3903075fb607a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 104970 788eff6e57a62d156af1fde94e5f36c2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 4134282 b0c12f7af6f633058075e00ffcd29c3e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 12390568 ca4548bc381baca564fa3fdae12ce364\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 365084 f2365c4375c0d38d91991dd0e8dd9c40\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 9566630 7558ef282743dc80d89daa5b987e7341\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 358262 c55651c5078a29296e0b90511d103e88\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 362334 8395b9856cf5bff3d0dd955c719d2f97\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 746046 aeb4565b2c887046e8e8838bb28ada77\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb\n Size/MD5 checksum: 333226 e8ea226b74e47c13bafa06904e204f88\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 295810 4c96d67831d9a678f72ba2aa4aa06f99\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 296614 2f5495d3f476641b50dff240686d932a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 15611774 ee96399d725a38e58a80dc8b200a5563\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 16939988 7b50b257380513da1add191e01694cc3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 105022 8cee7cda0d9464809e8cdee9e6a7b556\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 104998 3214091598a445c0e7a677b707711153\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 3591982 a623da1600d191c0a64ae5ec8d27ac39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 295766 c09c8ec22f461a8a0cdb99cdc2ea27a9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 17482396 7c77995f3dbe9c767430aefbc8f59cfb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 297272 b1da5f2b42cff33e40b529e53beca72b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 757918 b7d4b035278adaf56e5a230288cfc4f7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb\n Size/MD5 checksum: 16208922 c6a484280f6184e0b442a17ff83e95cd\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 20413976 04d51ce56e7028b2f91a3b5fe87286f6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 397326 45be7edbc919158eb59552019016e9fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 402268 b385d0f4154014cc64bcfb323383bf44\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 398048 8d5a50e1079929102c3d803131033c1d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 385772 60d654387c6c37a60c8a75b822211442\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 20144006 719e7b27a6ea4264f637d9a96c4c5296\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 398742 655d8a3f14fb17b9114bc081042ae648\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 104986 9afd8d2bfbc7f6fa263e6ac53dcb2656\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 20238528 ce311c203021da955151881cb7d375b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 3772394 f6e02fbc6710082f0bf73dfc75910af4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 3749446 e5d50c30de82e09f8d3b5d99436988ea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 104998 b03c136b66b63157382dcd7aaef9d717\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 396772 17b48033e6ff6807a9dad27983eb2229\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 20083702 0f9da9631140a67c63efd51c9dbc7483\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 20767854 5dfaa68464e850bfcc133be3ece0658a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 3716762 bcf07113a999521a1f9b037f78ca26f2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 105044 251258ba61dcff1f9109491f568317f0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 3849260 d73aa1bf73053ba0bb923f548f295c57\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 382932 f530a883d2d83220a711bbb26da436ca\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 20262436 d186dc1633c391eac3244d60905f2db7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 747938 33c87613d7be0a774cda443b63f2960c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 397028 d16142bc4b5a647260a109a644610858\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 20118938 5639665095f98021e04e1483914ad582\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 1590672 f6a77786e8af305b37146f02e49bcc95\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb\n Size/MD5 checksum: 17947566 cded55faac16e46093f2dbc615cb8e31\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 353930 468fb9fb898c20a4495da5dddc5a3a10\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 34181220 4d819112382d44f42dda16782acc488d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 33924346 a457c9a9b75a355004af9b60eb866395\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 105028 d9f0a8520d6d3140b513989b0541aab8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 33991662 b4054df37c0eb3931bccd824a7f67551\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 353338 9c46923df7a43e6685a16d8eeb4b1293\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 3684826 921ddeb8796289e177964b78a33040f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 3652662 d5a646c88e931cd9c9d5f921c9c61512\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 353962 4289a453c6d503c7037d799cd9b187e0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 746554 b9f732ad3e48eae272d84699ef84eae1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 104998 0616e4dba51187d20b81bb02a66655c2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 34101438 d731d8f6e00196bb9def763652095fe2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb\n Size/MD5 checksum: 353318 eb313d2479e85040db2c8f7a8bc08538\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 3853594 3428d54581b3f72795f1ab658133ddb0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 23392862 2e62b3795a74736993143b0913ffad15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 23515080 1dd10c4910886222208e97f037832179\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 365636 c3cc1dd7a5ba76e1370d6fac1263c7ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 3888340 48e1e28c6cfb34d0005e42c4364d97c4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 754258 3e2d23d42a85b673ee8c21b8ee87089c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 371508 c7df98e149454c08bb3439bf0e9eef82\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 364046 3d414da6ab19e93ca08a2b703b81db51\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 23113310 f8aade9ca0750376cb5ecf76baf5c727\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 365624 8db3f6054bf35932efdcc20986f51141\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 23549948 1fa039fc7e55587037885a22a1e1319f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 371960 490abdbc47f5655f0ba86cdace0bad3b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 105036 cbfbae53d87e834de1b69554f1a65b39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 105000 fa3411e376757a793e420054e01430fd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb\n Size/MD5 checksum: 23342334 ae886394987fc9a75a9e27ebd122cb31\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 3528026 a8d5eb791d93f3f9b73a8243b566f2fc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 228388 40091ee787b0f584256489344929511d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 229632 54187e8f9a0fd84382204936d0304370\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 227626 e96920c8bb8f6e355c7553642263b880\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 739850 c4180ab3de3a95e516a834c45cb8816b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 104988 d670e2db78c6cbc665df597d90e66670\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 3560468 e0495f5c3a10f05392ccf42562ac37e4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 7482778 6d560b4726290ecb91222ce93c1945b6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 7770286 d33e1e09211445b8eae53cf2b0336bd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 1627186 bec53403751dfb0f4af5d25d19426a8f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 7830740 16b4b7cfa849e01bc9db5ee3f6140ea1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-17lenny2_s390.deb\n Size/MD5 checksum: 105008 e9d1d2283d60611b5a1392fa4f599a59\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>", "published": "2009-08-14T19:31:10", "modified": "2009-08-14T19:31:10", "epss": [{"cve": "CVE-2009-2692", "epss": 0.00055, "percentile": 0.20664, "modified": "2023-05-01"}], "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2}, "severity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {}, "href": "https://lists.debian.org/debian-security-announce/2009/msg00179.html", "reporter": "Debian", "references": [], "cvelist": ["CVE-2009-2692"], "immutableFields": [], "lastseen": "2023-05-02T17:15:57", "viewCount": 12, "enchantments": {"dependencies": {"references": [{"type": "altlinux", "idList": ["903D2847056CBDDD87086410B4478F51"]}, {"type": "android", "idList": ["ANDROID:SOCK_SENDPAGE"]}, {"type": "canvas", "idList": ["PROTO_OPS_NULL"]}, {"type": "centos", "idList": ["CESA-2009:1222", "CESA-2009:1223", "CESA-2009:1233"]}, {"type": "checkpoint_security", "idList": ["CPS:SK42600"]}, {"type": "cve", "idList": ["CVE-2009-2692", "CVE-2009-2962"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1864-1:B2834", "DEBIAN:DSA-1865-1:34CE7"]}, {"type": "exploitdb", "idList": ["EDB-ID:9477", "EDB-ID:9479"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:EC59CF0D0A8C58A6BA88DD9DDE82A311", "EXPLOITPACK:FF3D313D03F8BCB90EE2F22064032248"]}, {"type": "f5", "idList": ["F5:K10772", "SOL10772"]}, {"type": "fedora", "idList": ["FEDORA:2CF2010F7EA", "FEDORA:43A4210F8C3", "FEDORA:52EFE10F85C", "FEDORA:5B2C610F862", "FEDORA:7B88D10F857", "FEDORA:921C610F878", "FEDORA:C80E110F85F", "FEDORA:F394810F8A0"]}, {"type": "kitploit", "idList": ["KITPLOIT:5310354020898253604"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2009-1222.NASL", "CENTOS_RHSA-2009-1223.NASL", "CENTOS_RHSA-2009-1233.NASL", "DEBIAN_DSA-1862.NASL", "DEBIAN_DSA-1864.NASL", "DEBIAN_DSA-1865.NASL", "FEDORA_2009-8647.NASL", "FEDORA_2009-8649.NASL", "MANDRIVA_MDVSA-2009-205.NASL", "MANDRIVA_MDVSA-2009-233.NASL", "ORACLELINUX_ELSA-2009-1222.NASL", "ORACLELINUX_ELSA-2009-1223.NASL", "ORACLELINUX_ELSA-2009-1233.NASL", "ORACLEVM_OVMSA-2009-0023.NASL", "ORACLEVM_OVMSA-2013-0039.NASL", "REDHAT-RHSA-2009-1222.NASL", "REDHAT-RHSA-2009-1223.NASL", "REDHAT-RHSA-2009-1233.NASL", "REDHAT-RHSA-2009-1457.NASL", "REDHAT-RHSA-2009-1469.NASL", "SLACKWARE_SSA_2009-230-01.NASL", "SL_20090824_KERNEL_ON_SL5_X.NASL", "SL_20090827_KERNEL_ON_SL3_X.NASL", "SUSE_11_0_KERNEL-090814.NASL", "SUSE_11_1_KERNEL-090816.NASL", "SUSE_11_KERNEL-090816.NASL", "SUSE_KERNEL-6437.NASL", "SUSE_KERNEL-6439.NASL", "SUSE_KERNEL-6440.NASL", "UBUNTU_USN-819-1.NASL", "VMWARE_VMSA-2009-0016.NASL", "VMWARE_VMSA-2009-0016_REMOTE.NASL", "VMWARE_VMSA-2010-0010.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310122454", "OPENVAS:136141256231064668", "OPENVAS:136141256231064669", "OPENVAS:136141256231064671", "OPENVAS:136141256231064677", "OPENVAS:136141256231064703", "OPENVAS:136141256231064704", "OPENVAS:136141256231064707", "OPENVAS:136141256231064736", "OPENVAS:136141256231064745", "OPENVAS:136141256231064747", "OPENVAS:136141256231064748", "OPENVAS:136141256231064761", "OPENVAS:136141256231064771", "OPENVAS:136141256231064791", "OPENVAS:136141256231064792", "OPENVAS:136141256231064794", "OPENVAS:136141256231064795", "OPENVAS:136141256231064906", "OPENVAS:136141256231064923", "OPENVAS:136141256231064943", "OPENVAS:136141256231064999", "OPENVAS:136141256231065354", "OPENVAS:136141256231065709", "OPENVAS:136141256231065814", "OPENVAS:136141256231066048", "OPENVAS:136141256231066202", "OPENVAS:136141256231066509", "OPENVAS:1361412562310880685", "OPENVAS:1361412562310880869", "OPENVAS:1361412562310880944", "OPENVAS:64668", "OPENVAS:64669", "OPENVAS:64671", "OPENVAS:64677", "OPENVAS:64703", "OPENVAS:64704", "OPENVAS:64707", "OPENVAS:64736", "OPENVAS:64745", "OPENVAS:64747", "OPENVAS:64748", "OPENVAS:64761", "OPENVAS:64771", "OPENVAS:64791", "OPENVAS:64792", "OPENVAS:64794", "OPENVAS:64795", "OPENVAS:64906", "OPENVAS:64923", "OPENVAS:64943", "OPENVAS:64999", "OPENVAS:65354", "OPENVAS:65709", "OPENVAS:65814", "OPENVAS:66048", "OPENVAS:66202", "OPENVAS:66509", "OPENVAS:880685", "OPENVAS:880869", "OPENVAS:880944"]}, {"type": "oraclelinux", "idList": ["ELSA-2009-1222", "ELSA-2009-1223", "ELSA-2009-1233", "ELSA-2009-1243"]}, {"type": "osv", "idList": ["OSV:DSA-1862-1", "OSV:DSA-1864-1", "OSV:DSA-1865-1"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:114856"]}, {"type": "redhat", "idList": ["RHSA-2009:1222", "RHSA-2009:1223", "RHSA-2009:1233", "RHSA-2009:1239", "RHSA-2009:1457", "RHSA-2009:1469"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:28783", "SECURITYVULNS:VULN:10150"]}, {"type": "seebug", "idList": ["SSV:12073", "SSV:12103", "SSV:66827", "SSV:66828"]}, {"type": "slackware", "idList": ["SSA-2009-230-01"]}, {"type": "suse", "idList": ["SUSE-SA:2009:045"]}, {"type": "ubuntu", "idList": ["USN-819-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2009-2692"]}, {"type": "veracode", "idList": ["VERACODE:23778"]}, {"type": "vmware", "idList": ["VMSA-2009-0016", "VMSA-2009-0016.6", "VMSA-2010-0010"]}]}, "score": {"value": 0.0, "vector": "NONE"}, "backreferences": {"references": [{"type": "android", "idList": ["ANDROID:SOCK_SENDPAGE"]}, {"type": "centos", "idList": ["CESA-2009:1222", "CESA-2009:1223", "CESA-2009:1233"]}, {"type": "checkpoint_security", "idList": ["CPS:SK42600"]}, {"type": "cve", "idList": ["CVE-2009-2692"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1864-1:B2834"]}, {"type": "exploitdb", "idList": ["EDB-ID:9477"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:FF3D313D03F8BCB90EE2F22064032248"]}, {"type": "f5", "idList": ["SOL10772"]}, {"type": "fedora", "idList": ["FEDORA:F394810F8A0"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT/LINUX/LOCAL/SOCK_SENDPAGE"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-1862.NASL", "DEBIAN_DSA-1865.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231064677", "OPENVAS:136141256231065354", "OPENVAS:136141256231065814", "OPENVAS:136141256231066202", "OPENVAS:1361412562310880685", "OPENVAS:1361412562310880944", "OPENVAS:64906"]}, {"type": "oraclelinux", "idList": ["ELSA-2009-1233"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:114856"]}, {"type": "redhat", "idList": ["RHSA-2009:1223"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:28783"]}, {"type": "seebug", "idList": ["SSV:66828"]}, {"type": "slackware", "idList": ["SSA-2009-230-01"]}, {"type": "suse", "idList": ["SUSE-SA:2009:045"]}, {"type": "ubuntu", "idList": ["USN-819-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2009-2692"]}, {"type": "vmware", "idList": ["VMSA-2010-0010"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2009-2692", "epss": 0.00055, "percentile": 0.20649, "modified": "2023-05-02"}], "vulnersScore": 0.0}, "_state": {"dependencies": 1683047940, "score": 1683995507, "epss": 1683054362}, "_internal": {"score_hash": "179afb3b186ec633b4ff3a794a7cca5a"}, "affectedPackage": [{"OSVersion": "4", "arch": "amd64", "OS": "Debian", "packageFilename": "xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "xen-linux-system-2.6.18-6-xen-amd64"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-image-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb", "packageName": "linux-image-2.6.26-2-powerpc-smp"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_sparc.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen-amd64"}, {"OSVersion": "4", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch3_alpha.deb", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-alpha-smp"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver-powerpc"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "packageFilename": "linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-4kc-malta"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-parisc-smp"}, {"OSVersion": "4", "arch": "mipsel", "packageFilename": "linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-24etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-qemu"}, {"arch": "armel", "packageFilename": "linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-ixp4xx"}, {"arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch3_i386.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-486"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_mipsel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch3_i386.deb", "packageName": "linux-image-2.6.24-etchnhalf.1-686-bigmem"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_i386.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-headers-2.6.26-2-alpha-legacy"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver"}, {"arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-686"}, {"packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_arm.deb", "packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-doc-2.6.26_2.6.26-17lenny2_all.deb", "OS": "Debian", "arch": "all", "OSVersion": "5", "operator": "lt", "packageName": "linux-doc-2.6.26"}, {"arch": "sparc", "packageFilename": "linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch3_sparc.deb", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-sparc32"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-24etch3_mips.deb", "arch": "mips", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-r5k-ip32"}, {"packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_arm.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_alpha.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-libc-dev"}, {"arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_i386.deb", "packageName": "linux-headers-2.6.18-6-amd64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-footbridge_2.6.26-17lenny2_arm.deb", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-footbridge"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-686_2.6.26-17lenny2_i386.deb", "packageName": "linux-headers-2.6.26-2-686"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-tree-2.6.26_2.6.26-17lenny2_all.deb", "OS": "Debian", "arch": "all", "OSVersion": "5", "operator": "lt", "packageName": "linux-tree-2.6.26"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-ixp4xx"}, {"OSVersion": "4", "packageFilename": "linux-manual-2.6.18_2.6.18.dfsg.1-24etch3_all.deb", "OS": "Debian", "arch": "all", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-manual-2.6.18"}, {"packageVersion": "2.6.26-17lenny2", "arch": "s390", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-image-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb", "packageName": "linux-image-2.6.26-2-vserver-s390x"}, {"packageFilename": "linux-headers-2.6.26-2-5kc-malta_2.6.26-17lenny2_mipsel.deb", "arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-5kc-malta"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-alpha-generic"}, {"packageFilename": "linux-2.6_2.6.18.dfsg.1-24etch3_all.deb", "OSVersion": "4", "OS": "Debian", "arch": "all", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-2.6"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-r4k-ip22_2.6.26-17lenny2_mips.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-r4k-ip22"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "packageFilename": "linux-image-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-amd64"}, {"OSVersion": "4", "arch": "s390", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_s390.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-source-2.6.24_2.6.24-6~etchnhalf.8etch3_all.deb", "OS": "Debian", "arch": "all", "operator": "lt", "packageName": "linux-source-2.6.24"}, {"packageVersion": "2.6.26-17lenny2", "arch": "s390", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb", "packageName": "linux-headers-2.6.26-2-s390x"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen-vserver"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-24etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-s390-tape"}, {"packageFilename": "linux-headers-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-headers-2.6.26-2-alpha-smp"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "arm", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch3_arm.deb", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-footbridge"}, {"OSVersion": "4", "arch": "mipsel", "OS": "Debian", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_mipsel.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "s390", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_s390.deb", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"OSVersion": "4", "arch": "ia64", "packageFilename": "linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch3_ia64.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-mckinley"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver-s390x"}, {"packageVersion": "2.6.26-17lenny2", "arch": "s390", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_s390.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-686_2.6.18.dfsg.1-24etch3_i386.deb", "packageName": "linux-headers-2.6.18-6-686"}, {"packageFilename": "linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch3_alpha.deb", "OSVersion": "4", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver-alpha"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_ia64.deb", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "s390", "packageFilename": "linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch3_s390.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-s390x"}, {"OSVersion": "4", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-24etch3_mipsel.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-r3k-kn02"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-r5k-cobalt_2.6.26-17lenny2_mipsel.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-r5k-cobalt"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_ia64.deb", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_amd64.deb", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-xen"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-powerpc"}, {"OSVersion": "4", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch3_hppa.deb", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-parisc64-smp"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-orion5x_2.6.26-17lenny2_arm.deb", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-orion5x"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-24etch3_mipsel.deb", "packageName": "linux-headers-2.6.18-6-all-mipsel"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-alpha-smp"}, {"arch": "powerpc", "packageFilename": "linux-image-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-vserver-powerpc64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_s390.deb", "arch": "s390", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"packageVersion": "2.6.26-17lenny2", "operator": "lt", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-image-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb", "packageName": "linux-image-2.6.26-2-vserver-mckinley"}, {"packageFilename": "linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch3_i386.deb", "arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-24etch3_mips.deb", "arch": "mips", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.18-6-r4k-ip22"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-tree-2.6.24_2.6.24-6~etchnhalf.8etch3_all.deb", "OS": "Debian", "arch": "all", "operator": "lt", "packageName": "linux-tree-2.6.24"}, {"arch": "i386", "OSVersion": "4", "operator": "lt", "packageFilename": "linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-vserver-k7"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"arch": "sparc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.8etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-sparc"}, {"arch": "i386", "packageFilename": "linux-image-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageName": "linux-image-2.6.26-2-vserver-686"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch3_hppa.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-parisc"}, {"OSVersion": "4", "packageFilename": "user-mode-linux_2.6.18-1um-2etch.24etch3_all.deb", "packageVersion": "2.6.18-1um-2etch.24etch3", "OS": "Debian", "arch": "all", "operator": "lt", "packageName": "user-mode-linux"}, {"packageFilename": "linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-24etch3_alpha.deb", "OSVersion": "4", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-alpha"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all-arm_2.6.26-17lenny2_arm.deb", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-arm"}, {"arch": "sparc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-sparc64-smp"}, {"arch": "i386", "packageFilename": "linux-image-2.6.26-2-686_2.6.26-17lenny2_i386.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-686"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-sparc64"}, {"packageFilename": "linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch3_mips.deb", "OSVersion": "4", "arch": "mips", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-sb1-bcm91250a"}, {"packageFilename": "linux-headers-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb", "arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-openvz-686"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch3_mips.deb", "arch": "mips", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a"}, {"packageFilename": "linux-libc-dev_2.6.26-17lenny2_hppa.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"OSVersion": "4", "arch": "mips", "packageFilename": "linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-24etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-r4k-ip22"}, {"OSVersion": "4", "operator": "lt", "OS": "Debian", "arch": "all", "packageFilename": "linux-doc-2.6.18_2.6.18.dfsg.1-24etch3_all.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-doc-2.6.18"}, {"arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch3_i386.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-686-bigmem"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "arm", "packageFilename": "linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch3_arm.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-iop32x"}, {"packageFilename": "linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-24etch3_i386.deb", "arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-i386"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch3_ia64.deb", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-itanium"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-image-2.6.18-6-parisc-smp"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-powerpc-smp"}, {"OSVersion": "4", "arch": "mips", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-5kc-malta_2.6.26-17lenny2_mips.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-5kc-malta"}, {"packageFilename": "linux-image-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-vserver-itanium"}, {"packageFilename": "linux-headers-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-itanium"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb", "packageName": "linux-headers-2.6.26-2-vserver-powerpc"}, {"OSVersion": "4", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-24etch3_arm.deb", "packageName": "linux-image-2.6.18-6-footbridge"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-4kc-malta"}, {"OSVersion": "4", "arch": "mips", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-powerpc"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch3_mipsel.deb", "packageName": "linux-image-2.6.18-6-sb1a-bcm91480b"}, {"OSVersion": "4", "arch": "mips", "OS": "Debian", "packageFilename": "linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch3_mips.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-sb1a-bcm91480b"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch3_i386.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-amd64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_ia64.deb", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-vserver"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-sparc64-smp_2.6.26-17lenny2_sparc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-sparc64-smp"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch3_ia64.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-mckinley"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_arm.deb", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "packageFilename": "linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny2_arm.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-ixp4xx"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-parisc-smp"}, {"packageFilename": "linux-image-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-image-2.6.26-2-alpha-smp"}, {"OSVersion": "4", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-24etch3_s390.deb", "packageName": "linux-headers-2.6.18-6-all-s390"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-r5k-ip32_2.6.26-17lenny2_mips.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-r5k-ip32"}, {"packageFilename": "linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch3_mips.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b"}, {"packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-image-2.6.26-2-orion5x_2.6.26-17lenny2_arm.deb", "packageName": "linux-image-2.6.26-2-orion5x"}, {"arch": "powerpc", "packageFilename": "linux-image-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-vserver-powerpc"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch3_ia64.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-mckinley"}, {"packageFilename": "linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny2_arm.deb", "packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-ixp4xx"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-parisc-smp"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-amd64"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"packageFilename": "linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-24etch3_arm.deb", "OSVersion": "4", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-rpc"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.8etch3_mips.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-mips"}, {"packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb", "packageName": "linux-headers-2.6.26-2-parisc64-smp"}, {"OSVersion": "4", "packageFilename": "linux-patch-debian-2.6.18_2.6.18.dfsg.1-24etch3_all.deb", "OS": "Debian", "arch": "all", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-patch-debian-2.6.18"}, {"packageFilename": "linux-image-2.6.26-2-s390-tape_2.6.26-17lenny2_s390.deb", "packageVersion": "2.6.26-17lenny2", "arch": "s390", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-s390-tape"}, {"packageFilename": "linux-image-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb", "packageVersion": "2.6.26-17lenny2", "arch": "s390", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-s390x"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-parisc-smp"}, {"arch": "powerpc", "packageFilename": "linux-headers-2.6.26-2-all-powerpc_2.6.26-17lenny2_powerpc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-powerpc"}, {"OSVersion": "4", "packageFilename": "linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-modules-2.6.18-6-xen-vserver-amd64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "all", "operator": "lt", "packageFilename": "linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.8etch3_all.deb", "packageName": "linux-support-2.6.24-etchnhalf.1"}, {"packageVersion": "2.6.26-17lenny2", "arch": "s390", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_s390.deb", "packageName": "linux-headers-2.6.26-2-all"}, {"packageFilename": "linux-headers-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb", "packageVersion": "2.6.26-17lenny2", "arch": "s390", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-s390x"}, {"packageFilename": "linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "OSVersion": "4", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-xen-vserver-amd64"}, {"arch": "powerpc", "packageFilename": "linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_powerpc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-vserver"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "packageFilename": "linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-r5k-cobalt"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "packageFilename": "linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-r5k-ip32"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-parisc64-smp"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-powerpc64"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-powerpc64"}, {"packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_hppa.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"packageFilename": "linux-headers-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-mckinley"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.8etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-alpha"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-modules-2.6.18-6-xen-vserver-686"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-24etch3_ia64.deb", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-ia64"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-powerpc"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-ixp4xx"}, {"arch": "sparc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-486"}, {"packageFilename": "fai-kernels_1.17+etch.24etch3_i386.deb", "arch": "i386", "OSVersion": "4", "packageVersion": "1.17+etch.24etch3", "OS": "Debian", "operator": "lt", "packageName": "fai-kernels"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb", "packageName": "linux-image-2.6.26-2-vserver-686-bigmem"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-686_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-686"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-versatile"}, {"OSVersion": "4", "arch": "mipsel", "packageFilename": "linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-24etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-r3k-kn02"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-xen-amd64"}, {"packageFilename": "linux-doc-2.6.24_2.6.24-6~etchnhalf.8etch3_all.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "all", "operator": "lt", "packageName": "linux-doc-2.6.24"}, {"arch": "powerpc", "packageFilename": "linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-24etch3_powerpc.deb", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-prep"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-powerpc64"}, {"packageFilename": "linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-24etch3_mips.deb", "OSVersion": "4", "arch": "mips", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-qemu"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-parisc64"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_powerpc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-s390x"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-image-2.6.26-2-4kc-malta_2.6.26-17lenny2_mips.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-4kc-malta"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_amd64.deb", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-image-2.6.26-2-5kc-malta_2.6.26-17lenny2_mips.deb", "packageName": "linux-image-2.6.26-2-5kc-malta"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_amd64.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "packageName": "linux-image-2.6.24-etchnhalf.1-r5k-cobalt"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_mips.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny2_mips.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-sb1a-bcm91480b"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-prep_2.6.18.dfsg.1-24etch3_powerpc.deb", "operator": "lt", "OS": "Debian", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-prep"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"packageFilename": "linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny2_mips.deb", "arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-sb1-bcm91250a"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-alpha-legacy"}, {"packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "all", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-source-2.6.26_2.6.26-17lenny2_all.deb", "packageName": "linux-source-2.6.26"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-manual-2.6.26_2.6.26-17lenny2_all.deb", "OS": "Debian", "arch": "all", "OSVersion": "5", "operator": "lt", "packageName": "linux-manual-2.6.26"}, {"arch": "i386", "OSVersion": "4", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-486_2.6.18.dfsg.1-24etch3_i386.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-486"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch3_alpha.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-alpha-generic"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-686-bigmem"}, {"arch": "armel", "packageFilename": "linux-image-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-versatile"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_amd64.deb", "packageName": "linux-headers-2.6.26-2-all"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_armel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"arch": "powerpc", "packageFilename": "linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-powerpc64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "s390", "OS": "Debian", "packageFilename": "linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch3_s390.deb", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-s390"}, {"arch": "powerpc", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_powerpc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"OSVersion": "4", "operator": "lt", "OS": "Debian", "arch": "hppa", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_hppa.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-powerpc"}, {"packageVersion": "2.6.26-17lenny2", "arch": "s390", "packageFilename": "linux-headers-2.6.26-2-s390_2.6.26-17lenny2_s390.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-s390"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "operator": "lt", "OS": "Debian", "arch": "alpha", "packageFilename": "linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch3_alpha.deb", "packageName": "linux-image-2.6.18-6-alpha-legacy"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-sparc32"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "arm", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch3_arm.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-ixp4xx"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.8etch3_ia64.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-ia64"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-alpha-legacy"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_ia64.deb", "packageName": "linux-headers-2.6.26-2-all"}, {"packageFilename": "linux-libc-dev_2.6.26-17lenny2_mips.deb", "arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-24etch3_powerpc.deb", "packageName": "linux-headers-2.6.18-6-powerpc-miboot"}, {"packageFilename": "linux-image-2.6.26-2-r4k-ip22_2.6.26-17lenny2_mips.deb", "arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-r4k-ip22"}, {"OSVersion": "4", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-24etch3_hppa.deb", "packageName": "linux-image-2.6.18-6-parisc"}, {"packageFilename": "linux-headers-2.6.26-2-all-mipsel_2.6.26-17lenny2_mipsel.deb", "arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-mipsel"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "packageFilename": "xen-linux-system-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "xen-linux-system-2.6.26-2-xen-amd64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "packageFilename": "linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-5kc-malta"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-s390"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all-hppa_2.6.26-17lenny2_hppa.deb", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-hppa"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny2_mipsel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-sb1a-bcm91480b"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-powerpc-smp"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-486_2.6.26-17lenny2_i386.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-486"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a"}, {"packageFilename": "linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-24etch3_mipsel.deb", "OSVersion": "4", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-r4k-kn04"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "operator": "lt", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch3_alpha.deb", "arch": "alpha", "packageName": "linux-headers-2.6.24-etchnhalf.1-alpha-smp"}, {"arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch3_i386.deb", "packageName": "linux-image-2.6.24-etchnhalf.1-amd64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_ia64.deb", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"OSVersion": "4", "arch": "mipsel", "OS": "Debian", "packageFilename": "linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch3_mipsel.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-sb1-bcm91250a"}, {"arch": "i386", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_i386.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all"}, {"arch": "powerpc", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-4kc-malta_2.6.26-17lenny2_mipsel.deb", "packageName": "linux-headers-2.6.26-2-4kc-malta"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-image-2.6.26-2-4kc-malta_2.6.26-17lenny2_mipsel.deb", "packageName": "linux-image-2.6.26-2-4kc-malta"}, {"packageFilename": "linux-image-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-image-2.6.26-2-alpha-generic"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-amd64"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-sparc64-smp_2.6.26-17lenny2_sparc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-sparc64-smp"}, {"packageFilename": "linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch3_mipsel.deb", "OSVersion": "4", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-sb1-bcm91250a"}, {"packageFilename": "xen-linux-system-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb", "arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "xen-linux-system-2.6.26-2-xen-686"}, {"packageFilename": "linux-image-2.6.26-2-iop32x_2.6.26-17lenny2_arm.deb", "packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-iop32x"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "ia64", "OS": "Debian", "packageFilename": "linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch3_ia64.deb", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-itanium"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_armel.deb", "packageName": "linux-headers-2.6.26-2-common"}, {"arch": "i386", "packageFilename": "linux-headers-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-686"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-sparc64-smp"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-powerpc-smp"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_i386.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-openvz"}, {"packageFilename": "linux-image-2.6.26-2-r5k-cobalt_2.6.26-17lenny2_mipsel.deb", "arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-r5k-cobalt"}, {"packageFilename": "linux-source-2.6.18_2.6.18.dfsg.1-24etch3_all.deb", "OSVersion": "4", "operator": "lt", "OS": "Debian", "arch": "all", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-source-2.6.18"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_armel.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-s390_2.6.18.dfsg.1-24etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-s390"}, {"packageVersion": "2.6.26-17lenny2", "arch": "s390", "packageFilename": "linux-image-2.6.26-2-s390_2.6.26-17lenny2_s390.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-s390"}, {"packageFilename": "linux-headers-2.6.26-2-iop32x_2.6.26-17lenny2_arm.deb", "packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-iop32x"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-24etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-hppa"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-5kc-malta"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-modules-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb", "packageName": "linux-modules-2.6.26-2-xen-686"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "hppa", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_hppa.deb", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"packageFilename": "linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-24etch3_arm.deb", "OSVersion": "4", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-s3c2410"}, {"arch": "sparc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch3_sparc.deb", "packageName": "linux-image-2.6.24-etchnhalf.1-sparc64"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-powerpc-smp"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver-sparc64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "packageFilename": "linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"arch": "sparc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch3_sparc.deb", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-sparc64"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver"}, {"packageFilename": "linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-amd64"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_powerpc.deb", "packageName": "linux-headers-2.6.26-2-common"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "operator": "lt", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch3_mips.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"arch": "powerpc", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-24etch3_powerpc.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-powerpc-miboot"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny2_mipsel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-sb1a-bcm91480b"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-24etch3_ia64.deb", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-itanium"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-mckinley"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-vserver-powerpc64"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch3_amd64.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-amd64"}, {"packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-image-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb", "packageName": "linux-image-2.6.26-2-parisc64"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-powerpc"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-alpha-legacy"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-24etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-rpc"}, {"packageVersion": "2.6.26-17lenny2", "arch": "alpha", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_alpha.deb", "packageName": "linux-headers-2.6.26-2-all"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_mips.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"packageFilename": "fai-kernels_1.17+etch.24etch3_amd64.deb", "OSVersion": "4", "arch": "amd64", "packageVersion": "1.17+etch.24etch3", "OS": "Debian", "operator": "lt", "packageName": "fai-kernels"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-modules-2.6.18-6-xen-686"}, {"OSVersion": "4", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_arm.deb", "packageName": "linux-headers-2.6.18-6-all"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-powerpc-smp"}, {"OSVersion": "4", "operator": "lt", "arch": "arm", "OS": "Debian", "packageFilename": "linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-24etch3_arm.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-arm"}, {"arch": "i386", "OSVersion": "4", "OS": "Debian", "packageFilename": "xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "xen-linux-system-2.6.18-6-xen-686"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.8etch3_s390.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "s390", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-s390"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-powerpc"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-24etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-ixp4xx"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "1.17+etch.24etch3", "OS": "Debian", "operator": "lt", "packageFilename": "fai-kernels_1.17+etch.24etch3_powerpc.deb", "packageName": "fai-kernels"}, {"packageFilename": "linux-image-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-image-2.6.26-2-alpha-legacy"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-24etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-ixp4xx"}, {"packageFilename": "linux-image-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-parisc-smp"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver"}, {"arch": "i386", "packageFilename": "linux-image-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-openvz-686"}, {"OSVersion": "4", "arch": "mips", "packageFilename": "linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-24etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-qemu"}, {"OSVersion": "4", "operator": "lt", "arch": "ia64", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch3_ia64.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-mckinley"}, {"packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_ia64.deb", "OSVersion": "4", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"packageFilename": "linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb", "arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-amd64"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny2_mipsel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-sb1-bcm91250a"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "arm", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_arm.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "all", "operator": "lt", "packageFilename": "linux-manual-2.6.24_2.6.24-6~etchnhalf.8etch3_all.deb", "packageName": "linux-manual-2.6.24"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-powerpc"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-image-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb", "packageName": "linux-image-2.6.26-2-xen-686"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-mipsel"}, {"packageFilename": "linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_amd64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-vserver"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-parisc"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.8etch3_hppa.deb", "arch": "hppa", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-hppa"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "arm", "packageFilename": "linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch3_arm.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-footbridge"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch3_arm.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "arm", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-iop32x"}, {"OSVersion": "4", "operator": "lt", "arch": "amd64", "OS": "Debian", "packageFilename": "linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen-vserver-amd64"}, {"OSVersion": "4", "arch": "s390", "packageFilename": "linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-24etch3_s390.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-s390x"}, {"arch": "powerpc", "OSVersion": "4", "operator": "lt", "OS": "Debian", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_powerpc.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"arch": "i386", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_i386.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-amd64"}, {"packageFilename": "linux-headers-2.6.26-2-all-alpha_2.6.26-17lenny2_alpha.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-headers-2.6.26-2-all-alpha"}, {"packageFilename": "linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb", "arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-686-bigmem"}, {"packageFilename": "linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "OSVersion": "4", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver-amd64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_amd64.deb", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch3_alpha.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-alpha-smp"}, {"arch": "powerpc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-powerpc-miboot"}, {"arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb", "packageName": "linux-headers-2.6.18-6-vserver-686"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen-vserver"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-powerpc"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-vserver-sparc64_2.6.26-17lenny2_sparc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-vserver-sparc64"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "user-mode-linux_2.6.18-1um-2etch.24etch3_i386.deb", "packageVersion": "2.6.18-1um-2etch.24etch3", "OS": "Debian", "operator": "lt", "packageName": "user-mode-linux"}, {"packageFilename": "linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch3_hppa.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-parisc64-smp"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all-sparc_2.6.26-17lenny2_sparc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-sparc"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-k7_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-k7"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"OSVersion": "4", "operator": "lt", "OS": "Debian", "arch": "alpha", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_alpha.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch3_alpha.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-alpha-generic"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen-vserver-686"}, {"packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "packageFilename": "linux-headers-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb", "packageName": "linux-headers-2.6.26-2-parisc64"}, {"packageFilename": "linux-headers-2.6.26-2-4kc-malta_2.6.26-17lenny2_mips.deb", "arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-4kc-malta"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-sparc64"}, {"packageFilename": "linux-headers-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-openvz-amd64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-patch-debian-2.6.26_2.6.26-17lenny2_all.deb", "OS": "Debian", "arch": "all", "OSVersion": "5", "operator": "lt", "packageName": "linux-patch-debian-2.6.26"}, {"OSVersion": "4", "arch": "arm", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_arm.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-image-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb", "packageName": "linux-image-2.6.26-2-orion5x"}, {"packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "packageFilename": "linux-image-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-itanium"}, {"packageFilename": "linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "OSVersion": "4", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-modules-2.6.18-6-xen-amd64"}, {"packageFilename": "fai-kernels_1.17+etch.24etch3_all.deb", "OSVersion": "4", "packageVersion": "1.17+etch.24etch3", "OS": "Debian", "arch": "all", "operator": "lt", "packageName": "fai-kernels"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch3_mips.deb", "packageName": "linux-image-2.6.24-etchnhalf.1-5kc-malta"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-vserver-alpha"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "packageFilename": "linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_i386.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-xen"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-image-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb", "packageName": "linux-image-2.6.26-2-686-bigmem"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "all", "operator": "lt", "packageFilename": "linux-2.6.24_2.6.24-6~etchnhalf.8etch3_all.deb", "packageName": "linux-2.6.24"}, {"arch": "powerpc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-powerpc64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch3_amd64.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-amd64"}, {"packageFilename": "linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "OSVersion": "4", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-amd64"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all-i386_2.6.26-17lenny2_i386.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-i386"}, {"arch": "powerpc", "packageFilename": "linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-powerpc-miboot"}, {"packageFilename": "linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_i386.deb", "arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-vserver"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-24etch3_mipsel.deb", "packageName": "linux-headers-2.6.18-6-qemu"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-modules-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb", "packageName": "linux-modules-2.6.26-2-xen-amd64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "s390", "OS": "Debian", "packageFilename": "linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.8etch3_s390.deb", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-s390-tape"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "packageFilename": "linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-r4k-ip22"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-24etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-s390"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-686-bigmem"}, {"OSVersion": "4", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_s390.deb", "packageName": "linux-headers-2.6.18-6-vserver"}, {"packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-image-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb", "packageName": "linux-image-2.6.26-2-mckinley"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-common_2.6.26-17lenny2_alpha.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-headers-2.6.26-2-common"}, {"OSVersion": "4", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-24etch3_mipsel.deb", "packageName": "linux-headers-2.6.18-6-r5k-cobalt"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-amd64"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-parisc64"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "packageFilename": "linux-image-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-openvz-amd64"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny2_mipsel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-sb1-bcm91250a"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch3_mips.deb", "arch": "mips", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-r5k-ip32"}, {"packageFilename": "linux-headers-2.6.26-2-all-s390_2.6.26-17lenny2_s390.deb", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "arch": "s390", "OS": "Debian", "OSVersion": "5", "packageName": "linux-headers-2.6.26-2-all-s390"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-parisc64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "packageFilename": "linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-4kc-malta"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny2_mips.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-sb1a-bcm91480b"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-k7"}, {"arch": "sparc", "OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-vserver-sparc64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "arch": "alpha", "packageName": "linux-headers-2.6.26-2-alpha-generic"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.8etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-arm"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch3_s390.deb", "arch": "s390", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-vserver-s390x"}, {"arch": "sparc", "packageFilename": "linux-image-2.6.26-2-sparc64_2.6.26-17lenny2_sparc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-sparc64"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen-686"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_mipsel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"arch": "i386", "OSVersion": "4", "operator": "lt", "packageFilename": "linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-xen-vserver-686"}, {"packageFilename": "linux-headers-2.6.26-2-all-ia64_2.6.26-17lenny2_ia64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-ia64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all-amd64_2.6.26-17lenny2_amd64.deb", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-amd64"}, {"packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-parisc"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_hppa.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"arch": "sparc", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-24etch3_sparc.deb", "packageName": "linux-headers-2.6.18-6-all-sparc"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-sparc64_2.6.26-17lenny2_sparc.deb", "packageName": "linux-headers-2.6.26-2-sparc64"}, {"OSVersion": "4", "arch": "s390", "packageFilename": "linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-24etch3_s390.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-s390x"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-5kc-malta"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-486_2.6.26-17lenny2_i386.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-486"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb", "packageName": "linux-headers-2.6.26-2-orion5x"}, {"arch": "sparc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_sparc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"packageFilename": "linux-support-2.6.26-2_2.6.26-17lenny2_all.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "all", "OSVersion": "5", "operator": "lt", "packageName": "linux-support-2.6.26-2"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-parisc"}, {"packageFilename": "linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch3_mips.deb", "OSVersion": "4", "arch": "mips", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-sb1-bcm91250a"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all-armel_2.6.26-17lenny2_armel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-armel"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch3_mips.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-r4k-ip22"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch3_powerpc.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-powerpc64"}, {"OSVersion": "4", "arch": "arm", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-24etch3_arm.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-footbridge"}, {"arch": "powerpc", "OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_powerpc.deb", "packageName": "linux-headers-2.6.18-6"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-24etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-iop32x"}, {"packageFilename": "linux-2.6_2.6.26-17lenny2_all.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "all", "OSVersion": "5", "operator": "lt", "packageName": "linux-2.6"}, {"arch": "mips", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-r5k-ip32_2.6.26-17lenny2_mips.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-r5k-ip32"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-vserver-sparc64_2.6.26-17lenny2_sparc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-vserver-sparc64"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-24etch3_arm.deb", "arch": "arm", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-s3c2410"}, {"OSVersion": "4", "packageFilename": "xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "xen-linux-system-2.6.18-6-xen-vserver-amd64"}, {"packageFilename": "linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.8etch3_all.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "all", "operator": "lt", "packageName": "linux-patch-debian-2.6.24"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_sparc.deb", "packageName": "linux-headers-2.6.26-2-all"}, {"packageFilename": "xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb", "arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "xen-linux-system-2.6.18-6-xen-vserver-686"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "operator": "lt", "OS": "Debian", "OSVersion": "5", "packageFilename": "linux-headers-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb", "packageName": "linux-headers-2.6.26-2-iop32x"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "packageFilename": "linux-image-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-xen-amd64"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch3_alpha.deb", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all"}, {"packageFilename": "linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-686-bigmem"}, {"OSVersion": "4", "arch": "amd64", "packageFilename": "linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch3_amd64.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-xen"}, {"arch": "sparc", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_sparc.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-libc-dev"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.8etch3_amd64.deb", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-amd64"}, {"OSVersion": "4", "arch": "mipsel", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"packageFilename": "linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_amd64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-openvz"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_i386.deb", "arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"packageFilename": "linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch3_alpha.deb", "OSVersion": "4", "OS": "Debian", "arch": "alpha", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-alpha-generic"}, {"OSVersion": "4", "arch": "mipsel", "packageFilename": "linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch3_mipsel.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-sb1a-bcm91480b"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_ia64.deb", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"arch": "i386", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "packageFilename": "linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-image-2.6.24-etchnhalf.1-686"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch3_hppa.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-parisc64"}, {"packageFilename": "linux-headers-2.6.26-2-footbridge_2.6.26-17lenny2_arm.deb", "packageVersion": "2.6.26-17lenny2", "arch": "arm", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-footbridge"}, {"packageFilename": "linux-headers-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb", "packageVersion": "2.6.26-17lenny2", "arch": "ia64", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-itanium"}, {"arch": "armel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-image-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-iop32x"}, {"arch": "powerpc", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb", "packageName": "linux-headers-2.6.18-6-vserver-powerpc64"}, {"packageFilename": "linux-headers-2.6.26-2-all-mips_2.6.26-17lenny2_mips.deb", "arch": "mips", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all-mips"}, {"OSVersion": "4", "arch": "amd64", "packageFilename": "linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-xen-amd64"}, {"packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_hppa.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "arch": "hppa", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-libc-dev_2.6.26-17lenny2_i386.deb", "packageName": "linux-libc-dev"}, {"OSVersion": "4", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch3_hppa.deb", "packageName": "linux-headers-2.6.18-6-parisc64-smp"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6"}, {"packageFilename": "linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb", "arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-xen-686"}, {"packageFilename": "linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch3_sparc.deb", "arch": "sparc", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "operator": "lt", "OS": "Debian", "packageName": "linux-image-2.6.24-etchnhalf.1-sparc64-smp"}, {"arch": "powerpc", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageFilename": "linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb", "packageName": "linux-image-2.6.18-6-vserver-powerpc"}, {"arch": "powerpc", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-powerpc64"}, {"arch": "sparc", "packageFilename": "linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_sparc.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-vserver"}, {"packageFilename": "linux-headers-2.6.18-6-486_2.6.18.dfsg.1-24etch3_i386.deb", "arch": "i386", "OSVersion": "4", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-486"}, {"arch": "i386", "OSVersion": "4", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-vserver-686"}, {"packageFilename": "linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "OSVersion": "4", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-vserver-amd64"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.8etch3_i386.deb", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-all-i386"}, {"OSVersion": "4", "packageFilename": "linux-tree-2.6.18_2.6.18.dfsg.1-24etch3_all.deb", "OS": "Debian", "arch": "all", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-tree-2.6.18"}, {"packageFilename": "linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-24etch3_mips.deb", "OSVersion": "4", "arch": "mips", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-all-mips"}, {"OSVersion": "4", "arch": "mips", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-24etch3_mips.deb", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-r5k-ip32"}, {"OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-24etch3_hppa.deb", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-parisc"}, {"arch": "i386", "OSVersion": "4", "packageFilename": "linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch3_i386.deb", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-vserver-k7"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageFilename": "linux-image-2.6.26-2-5kc-malta_2.6.26-17lenny2_mipsel.deb", "packageName": "linux-image-2.6.26-2-5kc-malta"}, {"packageFilename": "linux-support-2.6.18-6_2.6.18.dfsg.1-24etch3_all.deb", "OSVersion": "4", "OS": "Debian", "arch": "all", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-support-2.6.18-6"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch3_mips.deb", "OS": "Debian", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-common"}, {"packageFilename": "linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch3_hppa.deb", "OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "OS": "Debian", "arch": "hppa", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-parisc64-smp"}, {"arch": "mips", "packageFilename": "linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny2_mips.deb", "packageVersion": "2.6.26-17lenny2", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-sb1-bcm91250a"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "arch": "amd64", "OS": "Debian", "operator": "lt", "packageFilename": "linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_amd64.deb", "packageName": "linux-image-2.6.18-6-amd64"}, {"arch": "i386", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-xen-686"}, {"arch": "mipsel", "packageVersion": "2.6.26-17lenny2", "packageFilename": "linux-headers-2.6.26-2-all_2.6.26-17lenny2_mipsel.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-all"}, {"arch": "sparc", "OSVersion": "4", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch3_sparc.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-sparc64-smp"}, {"OSVersion": "4", "arch": "arm", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-24etch3_arm.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-iop32x"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mips", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch3_mips.deb", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-4kc-malta"}, {"packageVersion": "2.6.26-17lenny2", "arch": "amd64", "OS": "Debian", "packageFilename": "linux-image-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb", "OSVersion": "5", "operator": "lt", "packageName": "linux-image-2.6.26-2-vserver-amd64"}, {"OSVersion": "4", "packageVersion": "2.6.18.dfsg.1-24etch3", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageFilename": "linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_ia64.deb", "packageName": "linux-headers-2.6.18-6-all"}, {"OSVersion": "4", "packageFilename": "linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-24etch3_ia64.deb", "arch": "ia64", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-itanium"}, {"OSVersion": "4", "packageVersion": "2.6.24-6~etchnhalf.8etch3", "arch": "mipsel", "OS": "Debian", "packageFilename": "linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch3_mipsel.deb", "operator": "lt", "packageName": "linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b"}, {"packageVersion": "2.6.26-17lenny2", "arch": "s390", "packageFilename": "linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_s390.deb", "OS": "Debian", "OSVersion": "5", "operator": "lt", "packageName": "linux-headers-2.6.26-2-common-vserver"}, {"OSVersion": "4", "arch": "mipsel", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-24etch3_mipsel.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-r5k-cobalt"}, {"packageFilename": "linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-24etch3_mipsel.deb", "OSVersion": "4", "arch": "mipsel", "OS": "Debian", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-headers-2.6.18-6-r4k-kn04"}, {"OSVersion": "4", "arch": "mips", "OS": "Debian", "packageFilename": "linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch3_mips.deb", "operator": "lt", "packageVersion": "2.6.18.dfsg.1-24etch3", "packageName": "linux-image-2.6.18-6-sb1a-bcm91480b"}]}
{"slackware": [{"lastseen": "2019-05-30T07:37:30", "description": "New Linux kernel packages are available for Slackware 12.2 and -current\nto address a security issue. A kernel bug discovered by Tavis Ormandy\nand Julien Tinnes of the Google Security Team could allow a local user \nto fill memory page zero with arbitrary code and then use the kernel\nsendpage operation to trigger a NULL pointer dereference, executing the\ncode in the context of the kernel. If successfully exploited, this bug\ncan be used to gain root access.\n\nAt this time we have prepared fixed kernels for the stable version of\nSlackware (12.2), as well as for both 32-bit x86 and x86_64 -current\nversions. Additionally, we have added a package to the /patches\ndirectory for Slackware 12.1 and 12.2 that will set the minimum memory\npage that can be mmap()ed from userspace without additional privileges\nto 4096. The package will work with any kernel supporting the\nvm.mmap_min_addr tunable, and should significantly reduce the potential\nharm from this bug, as well as future similar bugs that might be found\nin the kernel. More updated kernels may follow.\n\nFor more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692\n\n\nHere are the details from the Slackware 12.2 ChangeLog:\n\npatches/packages/linux-2.6.27.31/:\n Added new kernels and kernel packages for Linux 2.6.27.31 to address\n a bug in proto_ops structures which could allow a user to use the\n kernel sendpage operation to execute arbitrary code in page zero.\n This could allow local users to gain escalated privileges.\n This flaw was discovered by Tavis Ormandy and Julien Tinnes of the\n Google Security Team.\n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692\n In addition, these kernels change CONFIG_DEFAULT_MMAP_MIN_ADDR kernel\n config option value to 4096, which should prevent the execution of\n arbitrary code by future NULL dereference bugs that might be found in\n the kernel. If you are compiling your own kernel, please check this\n option in your .config. If it is set to =0, you may wish to edit it\n to 4096 (or some other value > 0) and then reconfigure, or the kernel\n will not have default protection against zero page attacks from\n userspace.\n (* Security fix *)\npatches/packages/kernel-mmap_min_addr-4096-noarch-1.tgz:\n This package adds an init script to edit /etc/sysctl.conf, adding\n this config option:\n vm.mmap_min_addr = 4096\n This will configure the kernel to disallow mmap() to userspace of any\n page lower than 4096, preventing privilege escalation by CVE-2009-2692.\n This is a hot fix package and will take effect immediately upon\n installation on any system running a kernel that supports configurable\n /proc/sys/vm/mmap_min_addr (kernel 2.6.23 or newer).\n (* Security fix *)\n\nWhere to find the new packages:\n\nHINT: Getting slow download speeds from ftp.slackware.com?\nGive slackware.osuosl.org a try. This is another primary FTP site\nfor Slackware that can be considerably faster than downloading\ndirectly from ftp.slackware.com.\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating additional FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the "Get Slack" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated kernel packages for Slackware 12.2 may be found here:\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-firmware-2.6.27.31-noarch-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-generic-2.6.27.31-i486-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-generic-smp-2.6.27.31_smp-i686-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-headers-2.6.27.31_smp-x86-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-huge-2.6.27.31-i486-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-huge-smp-2.6.27.31_smp-i686-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-modules-2.6.27.31-i486-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-modules-smp-2.6.27.31_smp-i686-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/linux-2.6.27.31/kernel-source-2.6.27.31_smp-noarch-1.tgz\n\nUpdated kernel packages for Slackware -current may be found here:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-firmware-2.6.29.6-noarch-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-2.6.29.6-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-smp-2.6.29.6_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-2.6.29.6-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-smp-2.6.29.6_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-2.6.29.6-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-smp-2.6.29.6_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/kernel-headers-2.6.29.6_smp-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/k/kernel-source-2.6.29.6_smp-noarch-1.txz\n\nUpdated kernel packages for Slackware64 -current may be found here:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-firmware-2.6.29.6-noarch-2.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-generic-2.6.29.6-x86_64-2.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-huge-2.6.29.6-x86_64-2.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-modules-2.6.29.6-x86_64-2.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/kernel-headers-2.6.29.6-x86-2.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/k/kernel-source-2.6.29.6-noarch-2.txz\n\nHotfix/init script packages to increase mmap_min_addr to 4096:\nftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/kernel-mmap_min_addr-4096-noarch-1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/kernel-mmap_min_addr-4096-noarch-1.tgz\n\nThese packages are the same, and will work with any 2.6.23 or newer kernel.\n\n\nSignatures:\n\nAll packages are signed with the Slackware Security Team GPG signature for\nverification of authenticity. File may also be checked with the CHECKSUMS.md5\nfile provided in each Slackware directory tree, which is also signed with the\nSlackware GPG key.\n\n\nKernel patches for Linux 2.4.x and Linux 2.6.x:\n\nKernel patches for CVE-2009-2692 that should apply cleanly to most 2.4\nand 2.6 kernel source may be found here:\n\nftp://ftp.slackware.com/pub/slackware/unsupported/kernel-patches/linux-2.4.x-CVE-2009-2692.diff.gz\nftp://ftp.slackware.com/pub/slackware/unsupported/kernel-patches/linux-2.6.x-CVE-2009-2692.diff.gz\n\n\nInstallation instructions:\n\nUpgrade the kernel packages as root, rebuild the initrd with\nmkinitrd, and reinstall LILO. For details on the process of\nupdating the Slackware 12.2 kernels, see the README file in\n/patches/packages/linux-2.6.27.31/.\n\nTo activate the mmap_min_addr protection in your /etc/sysctl.conf\nfor 2.6.23 or newer kernels, simply install the package:\n\ninstallpkg kernel-mmap_min_addr-4096-noarch-1.tgz\n\nIf you are building your own kernel from unfixed vanilla sources,\nthe patch appropriate for your kernel may be applied to the source\nlike this:\n\ncd /usr/src/linux\nzcat linux-2.6.x-CVE-2009-2692.diff.gz | patch -p1 --verbose", "cvss3": {}, "published": "2009-08-18T20:47:47", "type": "slackware", "title": "kernel", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2009-08-18T20:47:47", "id": "SSA-2009-230-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.877234", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2017-07-24T12:57:12", "description": "The remote host is missing an update to linux-2.6\nannounced via advisory DSA 1862-1.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 1862-1 (linux-2.6)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:64745", "href": "http://plugins.openvas.org/nasl.php?oid=64745", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1862_1.nasl 6615 2017-07-07 12:09:52Z cfischer $\n# Description: Auto-generated from advisory DSA 1862-1 (linux-2.6)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been discovered in the Linux kernel that may lead\nto privilege escalation. The Common Vulnerabilities and Exposures project\nidentifies the following problem:\n\nCVE-2009-2692\n\nTavis Ormandy and Julien Tinnes discovered an issue with how the\nsendpage function is initialized in the proto_ops structure.\nLocal users can exploit this vulnerability to gain elevated\nprivileges.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-17lenny2.\n\nFor the oldstable distribution (etch), this problem will be fixed in\nupdates to linux-2.6 and linux-2.6.24.\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux\";\ntag_summary = \"The remote host is missing an update to linux-2.6\nannounced via advisory DSA 1862-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201862-1\";\n\n\nif(description)\n{\n script_id(64745);\n script_version(\"$Revision: 6615 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:09:52 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1862-1 (linux-2.6)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"linux-source-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-manual-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-tree-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-doc-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-patch-debian-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-support-2.6.26-2\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-alpha-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-alpha-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-alpha-legacy\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-alpha-generic\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-alpha-legacy\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-alpha-generic\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-alpha\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-openvz-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common-xen\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common-vserver\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common-openvz\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-openvz-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-orion5x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-ixp4xx\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-armel\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-iop32x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-iop32x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-versatile\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-orion5x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-ixp4xx\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-versatile\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-hppa\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc64-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc64-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-openvz-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-openvz-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-486\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-i386\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-486\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-ia64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-powerpc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-powerpc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-s390\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-s390\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-s390-tape\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-s390\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:34", "description": "The remote host is missing an update to linux-2.6\nannounced via advisory DSA 1862-1.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 1862-1 (linux-2.6)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064745", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064745", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1862_1.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory DSA 1862-1 (linux-2.6)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been discovered in the Linux kernel that may lead\nto privilege escalation. The Common Vulnerabilities and Exposures project\nidentifies the following problem:\n\nCVE-2009-2692\n\nTavis Ormandy and Julien Tinnes discovered an issue with how the\nsendpage function is initialized in the proto_ops structure.\nLocal users can exploit this vulnerability to gain elevated\nprivileges.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-17lenny2.\n\nFor the oldstable distribution (etch), this problem will be fixed in\nupdates to linux-2.6 and linux-2.6.24.\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux\";\ntag_summary = \"The remote host is missing an update to linux-2.6\nannounced via advisory DSA 1862-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201862-1\";\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64745\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1862-1 (linux-2.6)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"linux-source-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-manual-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-tree-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-doc-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-patch-debian-2.6.26\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-support-2.6.26-2\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-alpha-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-alpha-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-alpha-legacy\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-alpha-generic\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-alpha-legacy\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-alpha-generic\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-alpha\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-openvz-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common-xen\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common-vserver\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-common-openvz\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.26-2-xen-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-openvz-amd64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-orion5x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-ixp4xx\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-armel\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-iop32x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-iop32x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-versatile\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-orion5x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-ixp4xx\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-versatile\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-hppa\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc64-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-parisc64-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-parisc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-openvz-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-openvz-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-486\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-i386\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-686-bigmem\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-486\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.26-2-xen-686\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-ia64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-itanium\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-mckinley\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-powerpc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-powerpc-smp\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-powerpc\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-powerpc64\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-vserver-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-s390\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-s390\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-s390-tape\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.26-2-vserver-s390x\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.26-2-all-s390\", ver:\"2.6.26-17lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:58", "description": "The remote host is missing an update to linux-2.6.24\nannounced via advisory DSA 1864-1.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 1864-1 (linux-2.6.24)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064747", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064747", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1864_1.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory DSA 1864-1 (linux-2.6.24)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been discovered in the Linux kernel that may lead\nto privilege escalation. The Common Vulnerabilities and Exposures\nproject identifies the following problem:\n\nCVE-2009-2692\n\nTavis Ormandy and Julien Tinnes discovered an issue with how the\nsendpage function is initialized in the proto_ops structure.\nLocal users can exploit this vulnerability to gain elevated\nprivileges.\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 2.6.24-6~etchnhalf.8etch3.\n\nWe recommend that you upgrade your linux-2.6.24 packages.\";\ntag_summary = \"The remote host is missing an update to linux-2.6.24\nannounced via advisory DSA 1864-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201864-1\";\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64747\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1864-1 (linux-2.6.24)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"linux-support-2.6.24-etchnhalf.1\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-patch-debian-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-manual-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-source-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-tree-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-doc-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-alpha\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-alpha-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-alpha-generic\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-common\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-alpha-legacy\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-alpha-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-alpha-generic\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-alpha-legacy\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-amd64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-amd64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-amd64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-hppa\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-686\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-486\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-486\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-i386\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-686-bigmem\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-686-bigmem\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-686\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-mckinley\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-mckinley\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-itanium\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-itanium\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-ia64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-r4k-ip22\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-r4k-ip22\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-5kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-4kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-mips\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-r5k-ip32\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-4kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-r5k-ip32\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-5kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-r5k-cobalt\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-r5k-cobalt\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-mipsel\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-powerpc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc-miboot\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc-miboot\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-s390x\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-s390x\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-s390\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-s390\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-s390-tape\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-s390\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-sparc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sparc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sparc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sparc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sparc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:39", "description": "The remote host is missing an update as announced\nvia advisory SSA:2009-230-01.", "cvss3": {}, "published": "2012-09-11T00:00:00", "type": "openvas", "title": "Slackware Advisory SSA:2009-230-01 kernel", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:136141256231064771", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064771", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2009_230_01.nasl 14202 2019-03-15 09:16:15Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64771\");\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 10:16:15 +0100 (Fri, 15 Mar 2019) $\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 14202 $\");\n script_name(\"Slackware Advisory SSA:2009-230-01 kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\", re:\"ssh/login/release=SLK(12\\.2|12\\.1)\");\n\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2009-230-01\");\n\n script_tag(name:\"insight\", value:\"New Linux kernel packages are available for Slackware 12.2 and -current\nto address a security issue. A kernel bug discovered by Tavis Ormandy\nand Julien Tinnes of the Google Security Team could allow a local user\nto fill memory page zero with arbitrary code and then use the kernel\nsendpage operation to trigger a NULL pointer dereference, executing the\ncode in the context of the kernel. If successfully exploited, this bug\ncan be used to gain root access.\n\nAt this time we have prepared fixed kernels for the stable version of\nSlackware (12.2), as well as for both 32-bit x86 and x86_64 -current\nversions. Additionally, we have added a package to the /patches\ndirectory for Slackware 12.1 and 12.2 that will set the minimum memory\npage that can be mmap()ed from userspace without additional privileges\nto 4096. The package will work with any kernel supporting the\nvm.mmap_min_addr tunable, and should significantly reduce the potential\nharm from this bug, as well as future similar bugs that might be found\nin the kernel. More updated kernels may follow.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to the new package(s).\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update as announced\nvia advisory SSA:2009-230-01.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-slack.inc\");\n\nreport = \"\";\nres = \"\";\n\nif((res = isslkpkgvuln(pkg:\"kernel-firmware\", ver:\"2.6.27.31-noarch-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-generic\", ver:\"2.6.27.31-i486-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-generic-smp\", ver:\"2.6.27.31_smp-i686-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-headers\", ver:\"2.6.27.31_smp-x86-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-huge\", ver:\"2.6.27.31-i486-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-huge-smp\", ver:\"2.6.27.31_smp-i686-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-modules\", ver:\"2.6.27.31-i486-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-modules-smp\", ver:\"2.6.27.31_smp-i686-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-source\", ver:\"2.6.27.31_smp-noarch-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-mmap_min_addr\", ver:\"4096-noarch-1\", rls:\"SLK12.1\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"kernel-mmap_min_addr\", ver:\"4096-noarch-1\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-24T12:56:40", "description": "The remote host is missing an update to linux-2.6.24\nannounced via advisory DSA 1864-1.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 1864-1 (linux-2.6.24)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:64747", "href": "http://plugins.openvas.org/nasl.php?oid=64747", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1864_1.nasl 6615 2017-07-07 12:09:52Z cfischer $\n# Description: Auto-generated from advisory DSA 1864-1 (linux-2.6.24)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been discovered in the Linux kernel that may lead\nto privilege escalation. The Common Vulnerabilities and Exposures\nproject identifies the following problem:\n\nCVE-2009-2692\n\nTavis Ormandy and Julien Tinnes discovered an issue with how the\nsendpage function is initialized in the proto_ops structure.\nLocal users can exploit this vulnerability to gain elevated\nprivileges.\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 2.6.24-6~etchnhalf.8etch3.\n\nWe recommend that you upgrade your linux-2.6.24 packages.\";\ntag_summary = \"The remote host is missing an update to linux-2.6.24\nannounced via advisory DSA 1864-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201864-1\";\n\n\nif(description)\n{\n script_id(64747);\n script_version(\"$Revision: 6615 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:09:52 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1864-1 (linux-2.6.24)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"linux-support-2.6.24-etchnhalf.1\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-patch-debian-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-manual-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-source-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-tree-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-doc-2.6.24\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-alpha\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-alpha-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-alpha-generic\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-common\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-alpha-legacy\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-alpha-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-alpha-generic\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-alpha-legacy\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-amd64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-amd64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-amd64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-parisc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-hppa\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-parisc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-686\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-486\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-486\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-i386\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-686-bigmem\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-686-bigmem\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-686\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-mckinley\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-mckinley\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-itanium\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-itanium\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-ia64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-r4k-ip22\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-r4k-ip22\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-5kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-4kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-mips\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-r5k-ip32\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-4kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-r5k-ip32\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-5kc-malta\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-r5k-cobalt\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-r5k-cobalt\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-mipsel\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-powerpc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-powerpc-miboot\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-powerpc-miboot\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-s390x\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-s390x\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-s390\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-s390\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-s390-tape\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-s390\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-all-sparc\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sparc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-etchnhalf.1-sparc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sparc64\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-etchnhalf.1-sparc64-smp\", ver:\"2.6.24-6~etchnhalf.8etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:52", "description": "The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:233.", "cvss3": {}, "published": "2009-09-21T00:00:00", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:233 (kernel)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064906", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064906", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_233.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:233 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability was discovered and corrected in the Linux 2.6 kernel:\n\nThe Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4,\ndoes not initialize all function pointers for socket operations\nin proto_ops structures, which allows local users to trigger a NULL\npointer dereference and gain privileges by using mmap to map page zero,\nplacing arbitrary code on this page, and then invoking an unavailable\noperation, as demonstrated by the sendpage operation on a PF_PPPOX\nsocket. (CVE-2009-2692)\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate\n\nAffected: 2008.1, Corporate 3.0, Corporate 4.0,\n Multi Network Firewall 2.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:233\";\ntag_summary = \"The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:233.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64906\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-21 23:13:00 +0200 (Mon, 21 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:233 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-2.6.24.7-3mnb\", rpm:\"kernel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.24.7-3mnb\", rpm:\"kernel-desktop-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.24.7-3mnb\", rpm:\"kernel-desktop586-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.24.7-3mnb\", rpm:\"kernel-desktop586-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.24.7-3mnb\", rpm:\"kernel-desktop-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-2.6.24.7-3mnb\", rpm:\"kernel-laptop-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-devel-2.6.24.7-3mnb\", rpm:\"kernel-laptop-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-devel-latest\", rpm:\"kernel-laptop-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-latest\", rpm:\"kernel-laptop-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.24.7-3mnb\", rpm:\"kernel-server-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.24.7-3mnb\", rpm:\"kernel-server-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.24.7-3mnb\", rpm:\"kernel-source-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.3.41mdk\", rpm:\"kernel-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT-2.6.3.41mdk\", rpm:\"kernel-BOOT-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.3~41mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-enterprise-2.6.3.41mdk\", rpm:\"kernel-enterprise-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i686-up-4GB-2.6.3.41mdk\", rpm:\"kernel-i686-up-4GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-p3-smp-64GB-2.6.3.41mdk\", rpm:\"kernel-p3-smp-64GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-secure-2.6.3.41mdk\", rpm:\"kernel-secure-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-2.6.3.41mdk\", rpm:\"kernel-smp-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.3~41mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-stripped\", rpm:\"kernel-source-stripped~2.6.3~41mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.12.41mdk\", rpm:\"kernel-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT-2.6.12.41mdk\", rpm:\"kernel-BOOT-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc-2.6.12.41mdk\", rpm:\"kernel-doc-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i586-up-1GB-2.6.12.41mdk\", rpm:\"kernel-i586-up-1GB-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i686-up-4GB-2.6.12.41mdk\", rpm:\"kernel-i686-up-4GB-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-2.6.12.41mdk\", rpm:\"kernel-smp-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.12.41mdk\", rpm:\"kernel-source-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-stripped-2.6.12.41mdk\", rpm:\"kernel-source-stripped-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xbox-2.6.12.41mdk\", rpm:\"kernel-xbox-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen0-2.6.12.41mdk\", rpm:\"kernel-xen0-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenU-2.6.12.41mdk\", rpm:\"kernel-xenU-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.3.41mdk\", rpm:\"kernel-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT-2.6.3.41mdk\", rpm:\"kernel-BOOT-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.3~41mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-enterprise-2.6.3.41mdk\", rpm:\"kernel-enterprise-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i686-up-4GB-2.6.3.41mdk\", rpm:\"kernel-i686-up-4GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-p3-smp-64GB-2.6.3.41mdk\", rpm:\"kernel-p3-smp-64GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-secure-2.6.3.41mdk\", rpm:\"kernel-secure-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-2.6.3.41mdk\", rpm:\"kernel-smp-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.3~41mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-stripped\", rpm:\"kernel-source-stripped~2.6.3~41mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:38", "description": "The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:233.", "cvss3": {}, "published": "2009-09-21T00:00:00", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:233 (kernel)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:64906", "href": "http://plugins.openvas.org/nasl.php?oid=64906", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_233.nasl 6573 2017-07-06 13:10:50Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:233 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability was discovered and corrected in the Linux 2.6 kernel:\n\nThe Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4,\ndoes not initialize all function pointers for socket operations\nin proto_ops structures, which allows local users to trigger a NULL\npointer dereference and gain privileges by using mmap to map page zero,\nplacing arbitrary code on this page, and then invoking an unavailable\noperation, as demonstrated by the sendpage operation on a PF_PPPOX\nsocket. (CVE-2009-2692)\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate\n\nAffected: 2008.1, Corporate 3.0, Corporate 4.0,\n Multi Network Firewall 2.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:233\";\ntag_summary = \"The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:233.\";\n\n \n\nif(description)\n{\n script_id(64906);\n script_version(\"$Revision: 6573 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:10:50 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-21 23:13:00 +0200 (Mon, 21 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:233 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-2.6.24.7-3mnb\", rpm:\"kernel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.24.7-3mnb\", rpm:\"kernel-desktop-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.24.7-3mnb\", rpm:\"kernel-desktop586-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.24.7-3mnb\", rpm:\"kernel-desktop586-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.24.7-3mnb\", rpm:\"kernel-desktop-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-2.6.24.7-3mnb\", rpm:\"kernel-laptop-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-devel-2.6.24.7-3mnb\", rpm:\"kernel-laptop-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-devel-latest\", rpm:\"kernel-laptop-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-laptop-latest\", rpm:\"kernel-laptop-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.24.7-3mnb\", rpm:\"kernel-server-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.24.7-3mnb\", rpm:\"kernel-server-devel-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.24.7-3mnb\", rpm:\"kernel-source-2.6.24.7-3mnb~1~1mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.24.7~3mnb1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.3.41mdk\", rpm:\"kernel-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT-2.6.3.41mdk\", rpm:\"kernel-BOOT-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.3~41mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-enterprise-2.6.3.41mdk\", rpm:\"kernel-enterprise-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i686-up-4GB-2.6.3.41mdk\", rpm:\"kernel-i686-up-4GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-p3-smp-64GB-2.6.3.41mdk\", rpm:\"kernel-p3-smp-64GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-secure-2.6.3.41mdk\", rpm:\"kernel-secure-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-2.6.3.41mdk\", rpm:\"kernel-smp-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.3~41mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-stripped\", rpm:\"kernel-source-stripped~2.6.3~41mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.12.41mdk\", rpm:\"kernel-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT-2.6.12.41mdk\", rpm:\"kernel-BOOT-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc-2.6.12.41mdk\", rpm:\"kernel-doc-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i586-up-1GB-2.6.12.41mdk\", rpm:\"kernel-i586-up-1GB-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i686-up-4GB-2.6.12.41mdk\", rpm:\"kernel-i686-up-4GB-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-2.6.12.41mdk\", rpm:\"kernel-smp-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.12.41mdk\", rpm:\"kernel-source-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-stripped-2.6.12.41mdk\", rpm:\"kernel-source-stripped-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xbox-2.6.12.41mdk\", rpm:\"kernel-xbox-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen0-2.6.12.41mdk\", rpm:\"kernel-xen0-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenU-2.6.12.41mdk\", rpm:\"kernel-xenU-2.6.12.41mdk~1~1mdk\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.3.41mdk\", rpm:\"kernel-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT-2.6.3.41mdk\", rpm:\"kernel-BOOT-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.3~41mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-enterprise-2.6.3.41mdk\", rpm:\"kernel-enterprise-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-i686-up-4GB-2.6.3.41mdk\", rpm:\"kernel-i686-up-4GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-p3-smp-64GB-2.6.3.41mdk\", rpm:\"kernel-p3-smp-64GB-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-secure-2.6.3.41mdk\", rpm:\"kernel-secure-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-2.6.3.41mdk\", rpm:\"kernel-smp-2.6.3.41mdk~1~1mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.3~41mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-stripped\", rpm:\"kernel-source-stripped~2.6.3~41mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:29", "description": "The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:205.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:205 (kernel)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064677", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064677", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_205.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:205 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability was discovered and corrected in the Linux 2.6 kernel:\n\nThe Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4,\ndoes not initialize all function pointers for socket operations\nin proto_ops structures, which allows local users to trigger a NULL\npointer dereference and gain privileges by using mmap to map page zero,\nplacing arbitrary code on this page, and then invoking an unavailable\noperation, as demonstrated by the sendpage operation on a PF_PPPOX\nsocket. (CVE-2009-2692)\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate\n\nAffected: 2009.0, 2009.1, Enterprise Server 5.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:205\";\ntag_summary = \"The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:205.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64677\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:205 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.27.24-desktop-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.27.24-desktop-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.27.24-desktop586-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.27.24-server-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.27.24-server-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop586-latest\", rpm:\"alsa_raoppcm-kernel-desktop586-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop-latest\", rpm:\"alsa_raoppcm-kernel-desktop-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-server-latest\", rpm:\"alsa_raoppcm-kernel-server-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-2.6.27.24-desktop-2mnb\", rpm:\"drm-experimental-kernel-2.6.27.24-desktop-2mnb~2.3.0~2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"drm-experimental-kernel-2.6.27.24-desktop586-2mnb~2.3.0~2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-2.6.27.24-server-2mnb\", rpm:\"drm-experimental-kernel-2.6.27.24-server-2mnb~2.3.0~2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-desktop586-latest\", rpm:\"drm-experimental-kernel-desktop586-latest~2.3.0~1.20090817.2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-desktop-latest\", rpm:\"drm-experimental-kernel-desktop-latest~2.3.0~1.20090817.2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-server-latest\", rpm:\"drm-experimental-kernel-server-latest~2.3.0~1.20090817.2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-2.6.27.24-desktop-2mnb\", rpm:\"et131x-kernel-2.6.27.24-desktop-2mnb~1.2.3~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"et131x-kernel-2.6.27.24-desktop586-2mnb~1.2.3~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-2.6.27.24-server-2mnb\", rpm:\"et131x-kernel-2.6.27.24-server-2mnb~1.2.3~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-desktop586-latest\", rpm:\"et131x-kernel-desktop586-latest~1.2.3~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-desktop-latest\", rpm:\"et131x-kernel-desktop-latest~1.2.3~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-server-latest\", rpm:\"et131x-kernel-server-latest~1.2.3~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.27.24-desktop-2mnb\", rpm:\"fcpci-kernel-2.6.27.24-desktop-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"fcpci-kernel-2.6.27.24-desktop586-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.27.24-server-2mnb\", rpm:\"fcpci-kernel-2.6.27.24-server-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop586-latest\", rpm:\"fcpci-kernel-desktop586-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop-latest\", rpm:\"fcpci-kernel-desktop-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-server-latest\", rpm:\"fcpci-kernel-server-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-desktop-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-desktop586-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-server-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-server-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop586-latest\", rpm:\"fglrx-kernel-desktop586-latest~8.522~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.522~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.522~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-2.6.27.24-desktop-2mnb\", rpm:\"gnbd-kernel-2.6.27.24-desktop-2mnb~2.03.07~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"gnbd-kernel-2.6.27.24-desktop586-2mnb~2.03.07~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-2.6.27.24-server-2mnb\", rpm:\"gnbd-kernel-2.6.27.24-server-2mnb~2.03.07~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-desktop586-latest\", rpm:\"gnbd-kernel-desktop586-latest~2.03.07~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-desktop-latest\", rpm:\"gnbd-kernel-desktop-latest~2.03.07~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-server-latest\", rpm:\"gnbd-kernel-server-latest~2.03.07~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.27.24-desktop-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.27.24-desktop-2mnb~1.17~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.27.24-desktop586-2mnb~1.17~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.27.24-server-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.27.24-server-2mnb~1.17~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop586-latest\", rpm:\"hcfpcimodem-kernel-desktop586-latest~1.17~1.20090817.1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop-latest\", rpm:\"hcfpcimodem-kernel-desktop-latest~1.17~1.20090817.1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-server-latest\", rpm:\"hcfpcimodem-kernel-server-latest~1.17~1.20090817.1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.27.24-desktop-2mnb\", rpm:\"hsfmodem-kernel-2.6.27.24-desktop-2mnb~7.68.00.13~1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"hsfmodem-kernel-2.6.27.24-desktop586-2mnb~7.68.00.13~1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.27.24-server-2mnb\", rpm:\"hsfmodem-kernel-2.6.27.24-server-2mnb~7.68.00.13~1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop586-latest\", rpm:\"hsfmodem-kernel-desktop586-latest~7.68.00.13~1.20090817.1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop-latest\", rpm:\"hsfmodem-kernel-desktop-latest~7.68.00.13~1.20090817.1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-server-latest\", rpm:\"hsfmodem-kernel-server-latest~7.68.00.13~1.20090817.1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.27.24-desktop-2mnb\", rpm:\"hso-kernel-2.6.27.24-desktop-2mnb~1.2~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"hso-kernel-2.6.27.24-desktop586-2mnb~1.2~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.27.24-server-2mnb\", rpm:\"hso-kernel-2.6.27.24-server-2mnb~1.2~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop586-latest\", rpm:\"hso-kernel-desktop586-latest~1.2~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop-latest\", rpm:\"hso-kernel-desktop-latest~1.2~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-server-latest\", rpm:\"hso-kernel-server-latest~1.2~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-desktop586-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-server-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-server-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-desktop586-latest\", rpm:\"iscsitarget-kernel-desktop586-latest~0.4.16~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-desktop-latest\", rpm:\"iscsitarget-kernel-desktop-latest~0.4.16~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-server-latest\", rpm:\"iscsitarget-kernel-server-latest~0.4.16~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.27.24-2mnb\", rpm:\"kernel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.27.24-2mnb\", rpm:\"kernel-desktop-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.27.24-2mnb\", rpm:\"kernel-server-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.27.24-2mnb\", rpm:\"kernel-server-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.27.24-2mnb\", rpm:\"kernel-source-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-desktop-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-desktop-2mnb~1.4.0pre1~0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-desktop586-2mnb~1.4.0pre1~0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-server-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-server-2mnb~1.4.0pre1~0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop586-latest\", rpm:\"kqemu-kernel-desktop586-latest~1.4.0pre1~1.20090817.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop-latest\", rpm:\"kqemu-kernel-desktop-latest~1.4.0pre1~1.20090817.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-server-latest\", rpm:\"kqemu-kernel-server-latest~1.4.0pre1~1.20090817.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.27.24-desktop-2mnb\", rpm:\"lirc-kernel-2.6.27.24-desktop-2mnb~0.8.3~4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"lirc-kernel-2.6.27.24-desktop586-2mnb~0.8.3~4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.27.24-server-2mnb\", rpm:\"lirc-kernel-2.6.27.24-server-2mnb~0.8.3~4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop586-latest\", rpm:\"lirc-kernel-desktop586-latest~0.8.3~1.20090817.4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop-latest\", rpm:\"lirc-kernel-desktop-latest~0.8.3~1.20090817.4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-server-latest\", rpm:\"lirc-kernel-server-latest~0.8.3~1.20090817.4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.27.24-desktop-2mnb\", rpm:\"lzma-kernel-2.6.27.24-desktop-2mnb~4.43~24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"lzma-kernel-2.6.27.24-desktop586-2mnb~4.43~24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.27.24-server-2mnb\", rpm:\"lzma-kernel-2.6.27.24-server-2mnb~4.43~24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop586-latest\", rpm:\"lzma-kernel-desktop586-latest~4.43~1.20090817.24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop-latest\", rpm:\"lzma-kernel-desktop-latest~4.43~1.20090817.24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-server-latest\", rpm:\"lzma-kernel-server-latest~4.43~1.20090817.24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-desktop-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-desktop-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-desktop586-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-server-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-server-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop586-latest\", rpm:\"madwifi-kernel-desktop586-latest~0.9.4~1.20090817.3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20090817.3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20090817.3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia173-kernel-2.6.27.24-desktop-2mnb~173.14.12~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia173-kernel-2.6.27.24-desktop586-2mnb~173.14.12~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop586-latest\", rpm:\"nvidia173-kernel-desktop586-latest~173.14.12~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop-latest\", rpm:\"nvidia173-kernel-desktop-latest~173.14.12~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-desktop586-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-server-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-desktop586-latest\", rpm:\"nvidia71xx-kernel-desktop586-latest~71.86.06~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-desktop-latest\", rpm:\"nvidia71xx-kernel-desktop-latest~71.86.06~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-server-latest\", rpm:\"nvidia71xx-kernel-server-latest~71.86.06~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-desktop586-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-server-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop586-latest\", rpm:\"nvidia96xx-kernel-desktop586-latest~96.43.07~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.07~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.07~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-desktop586-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-server-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop586-latest\", rpm:\"nvidia-current-kernel-desktop586-latest~177.70~1.20090817.2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~177.70~1.20090817.2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~177.70~1.20090817.2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-2.6.27.24-desktop-2mnb\", rpm:\"omfs-kernel-2.6.27.24-desktop-2mnb~0.8.0~1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"omfs-kernel-2.6.27.24-desktop586-2mnb~0.8.0~1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-2.6.27.24-server-2mnb\", rpm:\"omfs-kernel-2.6.27.24-server-2mnb~0.8.0~1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-desktop586-latest\", rpm:\"omfs-kernel-desktop586-latest~0.8.0~1.20090817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-desktop-latest\", rpm:\"omfs-kernel-desktop-latest~0.8.0~1.20090817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-server-latest\", rpm:\"omfs-kernel-server-latest~0.8.0~1.20090817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-2.6.27.24-desktop-2mnb\", rpm:\"omnibook-kernel-2.6.27.24-desktop-2mnb~20080513~0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"omnibook-kernel-2.6.27.24-desktop586-2mnb~20080513~0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-2.6.27.24-server-2mnb\", rpm:\"omnibook-kernel-2.6.27.24-server-2mnb~20080513~0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-desktop586-latest\", rpm:\"omnibook-kernel-desktop586-latest~20080513~1.20090817.0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-desktop-latest\", rpm:\"omnibook-kernel-desktop-latest~20080513~1.20090817.0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-server-latest\", rpm:\"omnibook-kernel-server-latest~20080513~1.20090817.0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.27.24-desktop-2mnb\", rpm:\"opencbm-kernel-2.6.27.24-desktop-2mnb~0.4.2a~1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"opencbm-kernel-2.6.27.24-desktop586-2mnb~0.4.2a~1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.27.24-server-2mnb\", rpm:\"opencbm-kernel-2.6.27.24-server-2mnb~0.4.2a~1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop586-latest\", rpm:\"opencbm-kernel-desktop586-latest~0.4.2a~1.20090817.1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop-latest\", rpm:\"opencbm-kernel-desktop-latest~0.4.2a~1.20090817.1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-server-latest\", rpm:\"opencbm-kernel-server-latest~0.4.2a~1.20090817.1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-2.6.27.24-desktop-2mnb\", rpm:\"ov51x-jpeg-kernel-2.6.27.24-desktop-2mnb~1.5.9~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"ov51x-jpeg-kernel-2.6.27.24-desktop586-2mnb~1.5.9~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-2.6.27.24-server-2mnb\", rpm:\"ov51x-jpeg-kernel-2.6.27.24-server-2mnb~1.5.9~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-desktop586-latest\", rpm:\"ov51x-jpeg-kernel-desktop586-latest~1.5.9~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-desktop-latest\", rpm:\"ov51x-jpeg-kernel-desktop-latest~1.5.9~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-server-latest\", rpm:\"ov51x-jpeg-kernel-server-latest~1.5.9~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-2.6.27.24-desktop-2mnb\", rpm:\"qc-usb-kernel-2.6.27.24-desktop-2mnb~0.6.6~6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"qc-usb-kernel-2.6.27.24-desktop586-2mnb~0.6.6~6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-2.6.27.24-server-2mnb\", rpm:\"qc-usb-kernel-2.6.27.24-server-2mnb~0.6.6~6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-desktop586-latest\", rpm:\"qc-usb-kernel-desktop586-latest~0.6.6~1.20090817.6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-desktop-latest\", rpm:\"qc-usb-kernel-desktop-latest~0.6.6~1.20090817.6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-server-latest\", rpm:\"qc-usb-kernel-server-latest~0.6.6~1.20090817.6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-2.6.27.24-desktop-2mnb\", rpm:\"rt2860-kernel-2.6.27.24-desktop-2mnb~1.7.0.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"rt2860-kernel-2.6.27.24-desktop586-2mnb~1.7.0.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-2.6.27.24-server-2mnb\", rpm:\"rt2860-kernel-2.6.27.24-server-2mnb~1.7.0.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-desktop586-latest\", rpm:\"rt2860-kernel-desktop586-latest~1.7.0.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-desktop-latest\", rpm:\"rt2860-kernel-desktop-latest~1.7.0.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-server-latest\", rpm:\"rt2860-kernel-server-latest~1.7.0.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.27.24-desktop-2mnb\", rpm:\"rt2870-kernel-2.6.27.24-desktop-2mnb~1.3.1.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"rt2870-kernel-2.6.27.24-desktop586-2mnb~1.3.1.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.27.24-server-2mnb\", rpm:\"rt2870-kernel-2.6.27.24-server-2mnb~1.3.1.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop586-latest\", rpm:\"rt2870-kernel-desktop586-latest~1.3.1.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop-latest\", rpm:\"rt2870-kernel-desktop-latest~1.3.1.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-server-latest\", rpm:\"rt2870-kernel-server-latest~1.3.1.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-2.6.27.24-desktop-2mnb\", rpm:\"rtl8187se-kernel-2.6.27.24-desktop-2mnb~1016.20080716~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"rtl8187se-kernel-2.6.27.24-desktop586-2mnb~1016.20080716~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-2.6.27.24-server-2mnb\", rpm:\"rtl8187se-kernel-2.6.27.24-server-2mnb~1016.20080716~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-desktop586-latest\", rpm:\"rtl8187se-kernel-desktop586-latest~1016.20080716~1.20090817.1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-desktop-latest\", rpm:\"rtl8187se-kernel-desktop-latest~1016.20080716~1.20090817.1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-server-latest\", rpm:\"rtl8187se-kernel-server-latest~1016.20080716~1.20090817.1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.27.24-desktop-2mnb\", rpm:\"slmodem-kernel-2.6.27.24-desktop-2mnb~2.9.11~0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"slmodem-kernel-2.6.27.24-desktop586-2mnb~2.9.11~0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.27.24-server-2mnb\", rpm:\"slmodem-kernel-2.6.27.24-server-2mnb~2.9.11~0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop586-latest\", rpm:\"slmodem-kernel-desktop586-latest~2.9.11~1.20090817.0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop-latest\", rpm:\"slmodem-kernel-desktop-latest~2.9.11~1.20090817.0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-server-latest\", rpm:\"slmodem-kernel-server-latest~2.9.11~1.20090817.0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.27.24-desktop-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.27.24-desktop-2mnb~3.3~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.27.24-desktop586-2mnb~3.3~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.27.24-server-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.27.24-server-2mnb~3.3~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop586-latest\", rpm:\"squashfs-lzma-kernel-desktop586-latest~3.3~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop-latest\", rpm:\"squashfs-lzma-kernel-desktop-latest~3.3~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-server-latest\", rpm:\"squashfs-lzma-kernel-server-latest~3.3~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.27.24-desktop-2mnb\", rpm:\"tp_smapi-kernel-2.6.27.24-desktop-2mnb~0.37~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"tp_smapi-kernel-2.6.27.24-desktop586-2mnb~0.37~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.27.24-server-2mnb\", rpm:\"tp_smapi-kernel-2.6.27.24-server-2mnb~0.37~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop586-latest\", rpm:\"tp_smapi-kernel-desktop586-latest~0.37~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop-latest\", rpm:\"tp_smapi-kernel-desktop-latest~0.37~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-server-latest\", rpm:\"tp_smapi-kernel-server-latest~0.37~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vboxadd-kernel-2.6.27.24-desktop-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vboxadd-kernel-2.6.27.24-desktop586-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-2.6.27.24-server-2mnb\", rpm:\"vboxadd-kernel-2.6.27.24-server-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-desktop586-latest\", rpm:\"vboxadd-kernel-desktop586-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-desktop-latest\", rpm:\"vboxadd-kernel-desktop-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-server-latest\", rpm:\"vboxadd-kernel-server-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vboxvfs-kernel-2.6.27.24-desktop-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vboxvfs-kernel-2.6.27.24-desktop586-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-2.6.27.24-server-2mnb\", rpm:\"vboxvfs-kernel-2.6.27.24-server-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-desktop586-latest\", rpm:\"vboxvfs-kernel-desktop586-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-desktop-latest\", rpm:\"vboxvfs-kernel-desktop-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-server-latest\", rpm:\"vboxvfs-kernel-server-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vhba-kernel-2.6.27.24-desktop-2mnb~1.0.0~1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vhba-kernel-2.6.27.24-desktop586-2mnb~1.0.0~1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.27.24-server-2mnb\", rpm:\"vhba-kernel-2.6.27.24-server-2mnb~1.0.0~1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop586-latest\", rpm:\"vhba-kernel-desktop586-latest~1.0.0~1.20090817.1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop-latest\", rpm:\"vhba-kernel-desktop-latest~1.0.0~1.20090817.1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-server-latest\", rpm:\"vhba-kernel-server-latest~1.0.0~1.20090817.1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.27.24-desktop-2mnb\", rpm:\"virtualbox-kernel-2.6.27.24-desktop-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"virtualbox-kernel-2.6.27.24-desktop586-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.27.24-server-2mnb\", rpm:\"virtualbox-kernel-2.6.27.24-server-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop586-latest\", rpm:\"virtualbox-kernel-desktop586-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop-latest\", rpm:\"virtualbox-kernel-desktop-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-server-latest\", rpm:\"virtualbox-kernel-server-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-desktop-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-desktop586-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-server-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-server-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop586-latest\", rpm:\"vpnclient-kernel-desktop586-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia173-kernel-2.6.27.24-server-2mnb~173.14.12~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-server-latest\", rpm:\"nvidia173-kernel-server-latest~173.14.12~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.29.6-desktop-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.29.6-desktop-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.29.6-desktop586-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.29.6-server-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.29.6-server-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop586-latest\", rpm:\"alsa_raoppcm-kernel-desktop586-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop-latest\", rpm:\"alsa_raoppcm-kernel-desktop-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-server-latest\", rpm:\"alsa_raoppcm-kernel-server-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.29.6-desktop-2mnb\", rpm:\"broadcom-wl-kernel-2.6.29.6-desktop-2mnb~5.10.79.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"broadcom-wl-kernel-2.6.29.6-desktop586-2mnb~5.10.79.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.29.6-server-2mnb\", rpm:\"broadcom-wl-kernel-2.6.29.6-server-2mnb~5.10.79.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop586-latest\", rpm:\"broadcom-wl-kernel-desktop586-latest~5.10.79.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop-latest\", rpm:\"broadcom-wl-kernel-desktop-latest~5.10.79.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-server-latest\", rpm:\"broadcom-wl-kernel-server-latest~5.10.79.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.29.6-desktop-2mnb\", rpm:\"em8300-kernel-2.6.29.6-desktop-2mnb~0.17.2~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"em8300-kernel-2.6.29.6-desktop586-2mnb~0.17.2~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.29.6-server-2mnb\", rpm:\"em8300-kernel-2.6.29.6-server-2mnb~0.17.2~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-desktop586-latest\", rpm:\"em8300-kernel-desktop586-latest~0.17.2~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-desktop-latest\", rpm:\"em8300-kernel-desktop-latest~0.17.2~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-server-latest\", rpm:\"em8300-kernel-server-latest~0.17.2~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.29.6-desktop-2mnb\", rpm:\"fcpci-kernel-2.6.29.6-desktop-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"fcpci-kernel-2.6.29.6-desktop586-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.29.6-server-2mnb\", rpm:\"fcpci-kernel-2.6.29.6-server-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop586-latest\", rpm:\"fcpci-kernel-desktop586-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop-latest\", rpm:\"fcpci-kernel-desktop-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-server-latest\", rpm:\"fcpci-kernel-server-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.29.6-desktop-2mnb\", rpm:\"fglrx-kernel-2.6.29.6-desktop-2mnb~8.600~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"fglrx-kernel-2.6.29.6-desktop586-2mnb~8.600~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.29.6-server-2mnb\", rpm:\"fglrx-kernel-2.6.29.6-server-2mnb~8.600~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop586-latest\", rpm:\"fglrx-kernel-desktop586-latest~8.600~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.600~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.600~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.29.6-desktop-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.29.6-desktop-2mnb~1.18~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.29.6-desktop586-2mnb~1.18~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.29.6-server-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.29.6-server-2mnb~1.18~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop586-latest\", rpm:\"hcfpcimodem-kernel-desktop586-latest~1.18~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop-latest\", rpm:\"hcfpcimodem-kernel-desktop-latest~1.18~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-server-latest\", rpm:\"hcfpcimodem-kernel-server-latest~1.18~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.29.6-desktop-2mnb\", rpm:\"hsfmodem-kernel-2.6.29.6-desktop-2mnb~7.80.02.03~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"hsfmodem-kernel-2.6.29.6-desktop586-2mnb~7.80.02.03~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.29.6-server-2mnb\", rpm:\"hsfmodem-kernel-2.6.29.6-server-2mnb~7.80.02.03~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop586-latest\", rpm:\"hsfmodem-kernel-desktop586-latest~7.80.02.03~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop-latest\", rpm:\"hsfmodem-kernel-desktop-latest~7.80.02.03~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-server-latest\", rpm:\"hsfmodem-kernel-server-latest~7.80.02.03~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.29.6-desktop-2mnb\", rpm:\"hso-kernel-2.6.29.6-desktop-2mnb~1.2~3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"hso-kernel-2.6.29.6-desktop586-2mnb~1.2~3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.29.6-server-2mnb\", rpm:\"hso-kernel-2.6.29.6-server-2mnb~1.2~3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop586-latest\", rpm:\"hso-kernel-desktop586-latest~1.2~1.20090817.3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop-latest\", rpm:\"hso-kernel-desktop-latest~1.2~1.20090817.3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-server-latest\", rpm:\"hso-kernel-server-latest~1.2~1.20090817.3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.29.6-2mnb\", rpm:\"kernel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.29.6-2mnb\", rpm:\"kernel-desktop-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.29.6-2mnb\", rpm:\"kernel-desktop586-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.29.6-2mnb\", rpm:\"kernel-desktop586-devel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.29.6-2mnb\", rpm:\"kernel-desktop-devel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.29.6-2mnb\", rpm:\"kernel-server-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.29.6-2mnb\", rpm:\"kernel-server-devel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.29.6-2mnb\", rpm:\"kernel-source-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.29.6-desktop-2mnb\", rpm:\"kqemu-kernel-2.6.29.6-desktop-2mnb~1.4.0pre1~4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"kqemu-kernel-2.6.29.6-desktop586-2mnb~1.4.0pre1~4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.29.6-server-2mnb\", rpm:\"kqemu-kernel-2.6.29.6-server-2mnb~1.4.0pre1~4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop586-latest\", rpm:\"kqemu-kernel-desktop586-latest~1.4.0pre1~1.20090817.4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop-latest\", rpm:\"kqemu-kernel-desktop-latest~1.4.0pre1~1.20090817.4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-server-latest\", rpm:\"kqemu-kernel-server-latest~1.4.0pre1~1.20090817.4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.29.6-desktop-2mnb\", rpm:\"libafs-kernel-2.6.29.6-desktop-2mnb~1.4.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"libafs-kernel-2.6.29.6-desktop586-2mnb~1.4.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.29.6-server-2mnb\", rpm:\"libafs-kernel-2.6.29.6-server-2mnb~1.4.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-desktop586-latest\", rpm:\"libafs-kernel-desktop586-latest~1.4.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-desktop-latest\", rpm:\"libafs-kernel-desktop-latest~1.4.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-server-latest\", rpm:\"libafs-kernel-server-latest~1.4.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.29.6-desktop-2mnb\", rpm:\"lirc-kernel-2.6.29.6-desktop-2mnb~0.8.5~0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"lirc-kernel-2.6.29.6-desktop586-2mnb~0.8.5~0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.29.6-server-2mnb\", rpm:\"lirc-kernel-2.6.29.6-server-2mnb~0.8.5~0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop586-latest\", rpm:\"lirc-kernel-desktop586-latest~0.8.5~1.20090817.0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop-latest\", rpm:\"lirc-kernel-desktop-latest~0.8.5~1.20090817.0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-server-latest\", rpm:\"lirc-kernel-server-latest~0.8.5~1.20090817.0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.29.6-desktop-2mnb\", rpm:\"lzma-kernel-2.6.29.6-desktop-2mnb~4.43~27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"lzma-kernel-2.6.29.6-desktop586-2mnb~4.43~27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.29.6-server-2mnb\", rpm:\"lzma-kernel-2.6.29.6-server-2mnb~4.43~27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop586-latest\", rpm:\"lzma-kernel-desktop586-latest~4.43~1.20090817.27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop-latest\", rpm:\"lzma-kernel-desktop-latest~4.43~1.20090817.27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-server-latest\", rpm:\"lzma-kernel-server-latest~4.43~1.20090817.27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.29.6-desktop-2mnb\", rpm:\"madwifi-kernel-2.6.29.6-desktop-2mnb~0.9.4~4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"madwifi-kernel-2.6.29.6-desktop586-2mnb~0.9.4~4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.29.6-server-2mnb\", rpm:\"madwifi-kernel-2.6.29.6-server-2mnb~0.9.4~4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop586-latest\", rpm:\"madwifi-kernel-desktop586-latest~0.9.4~1.20090817.4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20090817.4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20090817.4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-2.6.29.6-desktop-2mnb\", rpm:\"netfilter-rtsp-kernel-2.6.29.6-desktop-2mnb~2.6.26~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"netfilter-rtsp-kernel-2.6.29.6-desktop586-2mnb~2.6.26~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-2.6.29.6-server-2mnb\", rpm:\"netfilter-rtsp-kernel-2.6.29.6-server-2mnb~2.6.26~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-desktop586-latest\", rpm:\"netfilter-rtsp-kernel-desktop586-latest~2.6.26~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-desktop-latest\", rpm:\"netfilter-rtsp-kernel-desktop-latest~2.6.26~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-server-latest\", rpm:\"netfilter-rtsp-kernel-server-latest~2.6.26~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nouveau-kernel-2.6.29.6-desktop-2mnb~0.0.12~0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nouveau-kernel-2.6.29.6-desktop586-2mnb~0.0.12~0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-2.6.29.6-server-2mnb\", rpm:\"nouveau-kernel-2.6.29.6-server-2mnb~0.0.12~0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-desktop586-latest\", rpm:\"nouveau-kernel-desktop586-latest~0.0.12~1.20090817.0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-desktop-latest\", rpm:\"nouveau-kernel-desktop-latest~0.0.12~1.20090817.0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-server-latest\", rpm:\"nouveau-kernel-server-latest~0.0.12~1.20090817.0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nvidia173-kernel-2.6.29.6-desktop-2mnb~173.14.18~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nvidia173-kernel-2.6.29.6-desktop586-2mnb~173.14.18~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.29.6-server-2mnb\", rpm:\"nvidia173-kernel-2.6.29.6-server-2mnb~173.14.18~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop586-latest\", rpm:\"nvidia173-kernel-desktop586-latest~173.14.18~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop-latest\", rpm:\"nvidia173-kernel-desktop-latest~173.14.18~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-server-latest\", rpm:\"nvidia173-kernel-server-latest~173.14.18~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nvidia96xx-kernel-2.6.29.6-desktop-2mnb~96.43.11~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nvidia96xx-kernel-2.6.29.6-desktop586-2mnb~96.43.11~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.29.6-server-2mnb\", rpm:\"nvidia96xx-kernel-2.6.29.6-server-2mnb~96.43.11~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop586-latest\", rpm:\"nvidia96xx-kernel-desktop586-latest~96.43.11~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.11~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.11~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nvidia-current-kernel-2.6.29.6-desktop-2mnb~180.51~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nvidia-current-kernel-2.6.29.6-desktop586-2mnb~180.51~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.29.6-server-2mnb\", rpm:\"nvidia-current-kernel-2.6.29.6-server-2mnb~180.51~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop586-latest\", rpm:\"nvidia-current-kernel-desktop586-latest~180.51~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~180.51~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~180.51~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.29.6-desktop-2mnb\", rpm:\"opencbm-kernel-2.6.29.6-desktop-2mnb~0.4.2a~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"opencbm-kernel-2.6.29.6-desktop586-2mnb~0.4.2a~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.29.6-server-2mnb\", rpm:\"opencbm-kernel-2.6.29.6-server-2mnb~0.4.2a~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop586-latest\", rpm:\"opencbm-kernel-desktop586-latest~0.4.2a~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop-latest\", rpm:\"opencbm-kernel-desktop-latest~0.4.2a~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-server-latest\", rpm:\"opencbm-kernel-server-latest~0.4.2a~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.29.6-desktop-2mnb\", rpm:\"rt2870-kernel-2.6.29.6-desktop-2mnb~1.4.0.0~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"rt2870-kernel-2.6.29.6-desktop586-2mnb~1.4.0.0~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.29.6-server-2mnb\", rpm:\"rt2870-kernel-2.6.29.6-server-2mnb~1.4.0.0~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop586-latest\", rpm:\"rt2870-kernel-desktop586-latest~1.4.0.0~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop-latest\", rpm:\"rt2870-kernel-desktop-latest~1.4.0.0~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-server-latest\", rpm:\"rt2870-kernel-server-latest~1.4.0.0~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.29.6-desktop-2mnb\", rpm:\"slmodem-kernel-2.6.29.6-desktop-2mnb~2.9.11~0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"slmodem-kernel-2.6.29.6-desktop586-2mnb~2.9.11~0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.29.6-server-2mnb\", rpm:\"slmodem-kernel-2.6.29.6-server-2mnb~2.9.11~0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop586-latest\", rpm:\"slmodem-kernel-desktop586-latest~2.9.11~1.20090817.0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop-latest\", rpm:\"slmodem-kernel-desktop-latest~2.9.11~1.20090817.0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-server-latest\", rpm:\"slmodem-kernel-server-latest~2.9.11~1.20090817.0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-2.6.29.6-desktop-2mnb\", rpm:\"squashfs-kernel-2.6.29.6-desktop-2mnb~3.4~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"squashfs-kernel-2.6.29.6-desktop586-2mnb~3.4~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-2.6.29.6-server-2mnb\", rpm:\"squashfs-kernel-2.6.29.6-server-2mnb~3.4~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-desktop586-latest\", rpm:\"squashfs-kernel-desktop586-latest~3.4~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-desktop-latest\", rpm:\"squashfs-kernel-desktop-latest~3.4~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-server-latest\", rpm:\"squashfs-kernel-server-latest~3.4~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.29.6-desktop-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.29.6-desktop-2mnb~3.3~10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.29.6-desktop586-2mnb~3.3~10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.29.6-server-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.29.6-server-2mnb~3.3~10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop586-latest\", rpm:\"squashfs-lzma-kernel-desktop586-latest~3.3~1.20090817.10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop-latest\", rpm:\"squashfs-lzma-kernel-desktop-latest~3.3~1.20090817.10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-server-latest\", rpm:\"squashfs-lzma-kernel-server-latest~3.3~1.20090817.10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-2.6.29.6-desktop-2mnb\", rpm:\"syntek-kernel-2.6.29.6-desktop-2mnb~1.3.1~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"syntek-kernel-2.6.29.6-desktop586-2mnb~1.3.1~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-2.6.29.6-server-2mnb\", rpm:\"syntek-kernel-2.6.29.6-server-2mnb~1.3.1~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-desktop586-latest\", rpm:\"syntek-kernel-desktop586-latest~1.3.1~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-desktop-latest\", rpm:\"syntek-kernel-desktop-latest~1.3.1~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-server-latest\", rpm:\"syntek-kernel-server-latest~1.3.1~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.29.6-desktop-2mnb\", rpm:\"tp_smapi-kernel-2.6.29.6-desktop-2mnb~0.40~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"tp_smapi-kernel-2.6.29.6-desktop586-2mnb~0.40~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.29.6-server-2mnb\", rpm:\"tp_smapi-kernel-2.6.29.6-server-2mnb~0.40~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop586-latest\", rpm:\"tp_smapi-kernel-desktop586-latest~0.40~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop-latest\", rpm:\"tp_smapi-kernel-desktop-latest~0.40~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-server-latest\", rpm:\"tp_smapi-kernel-server-latest~0.40~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.29.6-desktop-2mnb\", rpm:\"vboxadditions-kernel-2.6.29.6-desktop-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"vboxadditions-kernel-2.6.29.6-desktop586-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.29.6-server-2mnb\", rpm:\"vboxadditions-kernel-2.6.29.6-server-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop586-latest\", rpm:\"vboxadditions-kernel-desktop586-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop-latest\", rpm:\"vboxadditions-kernel-desktop-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-server-latest\", rpm:\"vboxadditions-kernel-server-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.29.6-desktop-2mnb\", rpm:\"vhba-kernel-2.6.29.6-desktop-2mnb~1.2.1~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"vhba-kernel-2.6.29.6-desktop586-2mnb~1.2.1~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.29.6-server-2mnb\", rpm:\"vhba-kernel-2.6.29.6-server-2mnb~1.2.1~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop586-latest\", rpm:\"vhba-kernel-desktop586-latest~1.2.1~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop-latest\", rpm:\"vhba-kernel-desktop-latest~1.2.1~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-server-latest\", rpm:\"vhba-kernel-server-latest~1.2.1~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.29.6-desktop-2mnb\", rpm:\"virtualbox-kernel-2.6.29.6-desktop-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"virtualbox-kernel-2.6.29.6-desktop586-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.29.6-server-2mnb\", rpm:\"virtualbox-kernel-2.6.29.6-server-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop586-latest\", rpm:\"virtualbox-kernel-desktop586-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop-latest\", rpm:\"virtualbox-kernel-desktop-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-server-latest\", rpm:\"virtualbox-kernel-server-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.29.6-desktop-2mnb\", rpm:\"vpnclient-kernel-2.6.29.6-desktop-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"vpnclient-kernel-2.6.29.6-desktop586-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.29.6-server-2mnb\", rpm:\"vpnclient-kernel-2.6.29.6-server-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop586-latest\", rpm:\"vpnclient-kernel-desktop586-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.27.24-2mnb\", rpm:\"kernel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.27.24-2mnb\", rpm:\"kernel-desktop-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.27.24-2mnb\", rpm:\"kernel-server-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.27.24-2mnb\", rpm:\"kernel-server-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.27.24-2mnb\", rpm:\"kernel-source-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-desktop-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-server-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-server-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.522~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.522~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-server-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-server-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-desktop-latest\", rpm:\"iscsitarget-kernel-desktop-latest~0.4.16~1.20090814.4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-server-latest\", rpm:\"iscsitarget-kernel-server-latest~0.4.16~1.20090814.4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-desktop-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-desktop-2mnb~1.4.0pre1~0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-server-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-server-2mnb~1.4.0pre1~0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop-latest\", rpm:\"kqemu-kernel-desktop-latest~1.4.0pre1~1.20090814.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-server-latest\", rpm:\"kqemu-kernel-server-latest~1.4.0pre1~1.20090814.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.27.24-desktop-2mnb\", rpm:\"libafs-kernel-2.6.27.24-desktop-2mnb~1.4.7~5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.27.24-server-2mnb\", rpm:\"libafs-kernel-2.6.27.24-server-2mnb~1.4.7~5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-desktop-latest\", rpm:\"libafs-kernel-desktop-latest~1.4.7~1.20090814.5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-server-latest\", rpm:\"libafs-kernel-server-latest~1.4.7~1.20090814.5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-desktop-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-desktop-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-server-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-server-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20090814.3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20090814.3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-server-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-desktop-latest\", rpm:\"nvidia71xx-kernel-desktop-latest~71.86.06~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-server-latest\", rpm:\"nvidia71xx-kernel-server-latest~71.86.06~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-server-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.07~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.07~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-server-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~177.70~1.20090814.2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~177.70~1.20090814.2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-desktop-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-server-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-server-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.01.0640~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.01.0640~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:30", "description": "The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:205.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:205 (kernel)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:64677", "href": "http://plugins.openvas.org/nasl.php?oid=64677", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_205.nasl 6573 2017-07-06 13:10:50Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:205 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability was discovered and corrected in the Linux 2.6 kernel:\n\nThe Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4,\ndoes not initialize all function pointers for socket operations\nin proto_ops structures, which allows local users to trigger a NULL\npointer dereference and gain privileges by using mmap to map page zero,\nplacing arbitrary code on this page, and then invoking an unavailable\noperation, as demonstrated by the sendpage operation on a PF_PPPOX\nsocket. (CVE-2009-2692)\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate\n\nAffected: 2009.0, 2009.1, Enterprise Server 5.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:205\";\ntag_summary = \"The remote host is missing an update to kernel\nannounced via advisory MDVSA-2009:205.\";\n\n \n\nif(description)\n{\n script_id(64677);\n script_version(\"$Revision: 6573 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:10:50 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:205 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.27.24-desktop-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.27.24-desktop-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.27.24-desktop586-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.27.24-server-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.27.24-server-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop586-latest\", rpm:\"alsa_raoppcm-kernel-desktop586-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop-latest\", rpm:\"alsa_raoppcm-kernel-desktop-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-server-latest\", rpm:\"alsa_raoppcm-kernel-server-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-2.6.27.24-desktop-2mnb\", rpm:\"drm-experimental-kernel-2.6.27.24-desktop-2mnb~2.3.0~2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"drm-experimental-kernel-2.6.27.24-desktop586-2mnb~2.3.0~2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-2.6.27.24-server-2mnb\", rpm:\"drm-experimental-kernel-2.6.27.24-server-2mnb~2.3.0~2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-desktop586-latest\", rpm:\"drm-experimental-kernel-desktop586-latest~2.3.0~1.20090817.2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-desktop-latest\", rpm:\"drm-experimental-kernel-desktop-latest~2.3.0~1.20090817.2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"drm-experimental-kernel-server-latest\", rpm:\"drm-experimental-kernel-server-latest~2.3.0~1.20090817.2.20080912.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-2.6.27.24-desktop-2mnb\", rpm:\"et131x-kernel-2.6.27.24-desktop-2mnb~1.2.3~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"et131x-kernel-2.6.27.24-desktop586-2mnb~1.2.3~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-2.6.27.24-server-2mnb\", rpm:\"et131x-kernel-2.6.27.24-server-2mnb~1.2.3~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-desktop586-latest\", rpm:\"et131x-kernel-desktop586-latest~1.2.3~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-desktop-latest\", rpm:\"et131x-kernel-desktop-latest~1.2.3~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"et131x-kernel-server-latest\", rpm:\"et131x-kernel-server-latest~1.2.3~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.27.24-desktop-2mnb\", rpm:\"fcpci-kernel-2.6.27.24-desktop-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"fcpci-kernel-2.6.27.24-desktop586-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.27.24-server-2mnb\", rpm:\"fcpci-kernel-2.6.27.24-server-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop586-latest\", rpm:\"fcpci-kernel-desktop586-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop-latest\", rpm:\"fcpci-kernel-desktop-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-server-latest\", rpm:\"fcpci-kernel-server-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-desktop-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-desktop586-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-server-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-server-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop586-latest\", rpm:\"fglrx-kernel-desktop586-latest~8.522~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.522~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.522~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-2.6.27.24-desktop-2mnb\", rpm:\"gnbd-kernel-2.6.27.24-desktop-2mnb~2.03.07~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"gnbd-kernel-2.6.27.24-desktop586-2mnb~2.03.07~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-2.6.27.24-server-2mnb\", rpm:\"gnbd-kernel-2.6.27.24-server-2mnb~2.03.07~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-desktop586-latest\", rpm:\"gnbd-kernel-desktop586-latest~2.03.07~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-desktop-latest\", rpm:\"gnbd-kernel-desktop-latest~2.03.07~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gnbd-kernel-server-latest\", rpm:\"gnbd-kernel-server-latest~2.03.07~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.27.24-desktop-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.27.24-desktop-2mnb~1.17~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.27.24-desktop586-2mnb~1.17~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.27.24-server-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.27.24-server-2mnb~1.17~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop586-latest\", rpm:\"hcfpcimodem-kernel-desktop586-latest~1.17~1.20090817.1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop-latest\", rpm:\"hcfpcimodem-kernel-desktop-latest~1.17~1.20090817.1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-server-latest\", rpm:\"hcfpcimodem-kernel-server-latest~1.17~1.20090817.1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.27.24-desktop-2mnb\", rpm:\"hsfmodem-kernel-2.6.27.24-desktop-2mnb~7.68.00.13~1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"hsfmodem-kernel-2.6.27.24-desktop586-2mnb~7.68.00.13~1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.27.24-server-2mnb\", rpm:\"hsfmodem-kernel-2.6.27.24-server-2mnb~7.68.00.13~1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop586-latest\", rpm:\"hsfmodem-kernel-desktop586-latest~7.68.00.13~1.20090817.1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop-latest\", rpm:\"hsfmodem-kernel-desktop-latest~7.68.00.13~1.20090817.1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-server-latest\", rpm:\"hsfmodem-kernel-server-latest~7.68.00.13~1.20090817.1.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.27.24-desktop-2mnb\", rpm:\"hso-kernel-2.6.27.24-desktop-2mnb~1.2~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"hso-kernel-2.6.27.24-desktop586-2mnb~1.2~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.27.24-server-2mnb\", rpm:\"hso-kernel-2.6.27.24-server-2mnb~1.2~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop586-latest\", rpm:\"hso-kernel-desktop586-latest~1.2~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop-latest\", rpm:\"hso-kernel-desktop-latest~1.2~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-server-latest\", rpm:\"hso-kernel-server-latest~1.2~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-desktop586-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-server-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-server-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-desktop586-latest\", rpm:\"iscsitarget-kernel-desktop586-latest~0.4.16~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-desktop-latest\", rpm:\"iscsitarget-kernel-desktop-latest~0.4.16~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-server-latest\", rpm:\"iscsitarget-kernel-server-latest~0.4.16~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.27.24-2mnb\", rpm:\"kernel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.27.24-2mnb\", rpm:\"kernel-desktop-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.27.24-2mnb\", rpm:\"kernel-server-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.27.24-2mnb\", rpm:\"kernel-server-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.27.24-2mnb\", rpm:\"kernel-source-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.27.24~2mnb2\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-desktop-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-desktop-2mnb~1.4.0pre1~0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-desktop586-2mnb~1.4.0pre1~0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-server-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-server-2mnb~1.4.0pre1~0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop586-latest\", rpm:\"kqemu-kernel-desktop586-latest~1.4.0pre1~1.20090817.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop-latest\", rpm:\"kqemu-kernel-desktop-latest~1.4.0pre1~1.20090817.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-server-latest\", rpm:\"kqemu-kernel-server-latest~1.4.0pre1~1.20090817.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.27.24-desktop-2mnb\", rpm:\"lirc-kernel-2.6.27.24-desktop-2mnb~0.8.3~4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"lirc-kernel-2.6.27.24-desktop586-2mnb~0.8.3~4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.27.24-server-2mnb\", rpm:\"lirc-kernel-2.6.27.24-server-2mnb~0.8.3~4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop586-latest\", rpm:\"lirc-kernel-desktop586-latest~0.8.3~1.20090817.4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop-latest\", rpm:\"lirc-kernel-desktop-latest~0.8.3~1.20090817.4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-server-latest\", rpm:\"lirc-kernel-server-latest~0.8.3~1.20090817.4.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.27.24-desktop-2mnb\", rpm:\"lzma-kernel-2.6.27.24-desktop-2mnb~4.43~24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"lzma-kernel-2.6.27.24-desktop586-2mnb~4.43~24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.27.24-server-2mnb\", rpm:\"lzma-kernel-2.6.27.24-server-2mnb~4.43~24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop586-latest\", rpm:\"lzma-kernel-desktop586-latest~4.43~1.20090817.24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop-latest\", rpm:\"lzma-kernel-desktop-latest~4.43~1.20090817.24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-server-latest\", rpm:\"lzma-kernel-server-latest~4.43~1.20090817.24mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-desktop-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-desktop-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-desktop586-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-server-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-server-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop586-latest\", rpm:\"madwifi-kernel-desktop586-latest~0.9.4~1.20090817.3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20090817.3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20090817.3.r3835mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia173-kernel-2.6.27.24-desktop-2mnb~173.14.12~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia173-kernel-2.6.27.24-desktop586-2mnb~173.14.12~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop586-latest\", rpm:\"nvidia173-kernel-desktop586-latest~173.14.12~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop-latest\", rpm:\"nvidia173-kernel-desktop-latest~173.14.12~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-desktop586-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-server-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-desktop586-latest\", rpm:\"nvidia71xx-kernel-desktop586-latest~71.86.06~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-desktop-latest\", rpm:\"nvidia71xx-kernel-desktop-latest~71.86.06~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-server-latest\", rpm:\"nvidia71xx-kernel-server-latest~71.86.06~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-desktop586-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-server-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop586-latest\", rpm:\"nvidia96xx-kernel-desktop586-latest~96.43.07~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.07~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.07~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-desktop586-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-server-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop586-latest\", rpm:\"nvidia-current-kernel-desktop586-latest~177.70~1.20090817.2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~177.70~1.20090817.2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~177.70~1.20090817.2.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-2.6.27.24-desktop-2mnb\", rpm:\"omfs-kernel-2.6.27.24-desktop-2mnb~0.8.0~1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"omfs-kernel-2.6.27.24-desktop586-2mnb~0.8.0~1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-2.6.27.24-server-2mnb\", rpm:\"omfs-kernel-2.6.27.24-server-2mnb~0.8.0~1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-desktop586-latest\", rpm:\"omfs-kernel-desktop586-latest~0.8.0~1.20090817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-desktop-latest\", rpm:\"omfs-kernel-desktop-latest~0.8.0~1.20090817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omfs-kernel-server-latest\", rpm:\"omfs-kernel-server-latest~0.8.0~1.20090817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-2.6.27.24-desktop-2mnb\", rpm:\"omnibook-kernel-2.6.27.24-desktop-2mnb~20080513~0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"omnibook-kernel-2.6.27.24-desktop586-2mnb~20080513~0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-2.6.27.24-server-2mnb\", rpm:\"omnibook-kernel-2.6.27.24-server-2mnb~20080513~0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-desktop586-latest\", rpm:\"omnibook-kernel-desktop586-latest~20080513~1.20090817.0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-desktop-latest\", rpm:\"omnibook-kernel-desktop-latest~20080513~1.20090817.0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"omnibook-kernel-server-latest\", rpm:\"omnibook-kernel-server-latest~20080513~1.20090817.0.274.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.27.24-desktop-2mnb\", rpm:\"opencbm-kernel-2.6.27.24-desktop-2mnb~0.4.2a~1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"opencbm-kernel-2.6.27.24-desktop586-2mnb~0.4.2a~1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.27.24-server-2mnb\", rpm:\"opencbm-kernel-2.6.27.24-server-2mnb~0.4.2a~1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop586-latest\", rpm:\"opencbm-kernel-desktop586-latest~0.4.2a~1.20090817.1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop-latest\", rpm:\"opencbm-kernel-desktop-latest~0.4.2a~1.20090817.1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-server-latest\", rpm:\"opencbm-kernel-server-latest~0.4.2a~1.20090817.1mdv2008.1\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-2.6.27.24-desktop-2mnb\", rpm:\"ov51x-jpeg-kernel-2.6.27.24-desktop-2mnb~1.5.9~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"ov51x-jpeg-kernel-2.6.27.24-desktop586-2mnb~1.5.9~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-2.6.27.24-server-2mnb\", rpm:\"ov51x-jpeg-kernel-2.6.27.24-server-2mnb~1.5.9~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-desktop586-latest\", rpm:\"ov51x-jpeg-kernel-desktop586-latest~1.5.9~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-desktop-latest\", rpm:\"ov51x-jpeg-kernel-desktop-latest~1.5.9~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ov51x-jpeg-kernel-server-latest\", rpm:\"ov51x-jpeg-kernel-server-latest~1.5.9~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-2.6.27.24-desktop-2mnb\", rpm:\"qc-usb-kernel-2.6.27.24-desktop-2mnb~0.6.6~6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"qc-usb-kernel-2.6.27.24-desktop586-2mnb~0.6.6~6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-2.6.27.24-server-2mnb\", rpm:\"qc-usb-kernel-2.6.27.24-server-2mnb~0.6.6~6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-desktop586-latest\", rpm:\"qc-usb-kernel-desktop586-latest~0.6.6~1.20090817.6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-desktop-latest\", rpm:\"qc-usb-kernel-desktop-latest~0.6.6~1.20090817.6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"qc-usb-kernel-server-latest\", rpm:\"qc-usb-kernel-server-latest~0.6.6~1.20090817.6mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-2.6.27.24-desktop-2mnb\", rpm:\"rt2860-kernel-2.6.27.24-desktop-2mnb~1.7.0.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"rt2860-kernel-2.6.27.24-desktop586-2mnb~1.7.0.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-2.6.27.24-server-2mnb\", rpm:\"rt2860-kernel-2.6.27.24-server-2mnb~1.7.0.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-desktop586-latest\", rpm:\"rt2860-kernel-desktop586-latest~1.7.0.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-desktop-latest\", rpm:\"rt2860-kernel-desktop-latest~1.7.0.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2860-kernel-server-latest\", rpm:\"rt2860-kernel-server-latest~1.7.0.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.27.24-desktop-2mnb\", rpm:\"rt2870-kernel-2.6.27.24-desktop-2mnb~1.3.1.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"rt2870-kernel-2.6.27.24-desktop586-2mnb~1.3.1.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.27.24-server-2mnb\", rpm:\"rt2870-kernel-2.6.27.24-server-2mnb~1.3.1.0~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop586-latest\", rpm:\"rt2870-kernel-desktop586-latest~1.3.1.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop-latest\", rpm:\"rt2870-kernel-desktop-latest~1.3.1.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-server-latest\", rpm:\"rt2870-kernel-server-latest~1.3.1.0~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-2.6.27.24-desktop-2mnb\", rpm:\"rtl8187se-kernel-2.6.27.24-desktop-2mnb~1016.20080716~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"rtl8187se-kernel-2.6.27.24-desktop586-2mnb~1016.20080716~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-2.6.27.24-server-2mnb\", rpm:\"rtl8187se-kernel-2.6.27.24-server-2mnb~1016.20080716~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-desktop586-latest\", rpm:\"rtl8187se-kernel-desktop586-latest~1016.20080716~1.20090817.1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-desktop-latest\", rpm:\"rtl8187se-kernel-desktop-latest~1016.20080716~1.20090817.1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rtl8187se-kernel-server-latest\", rpm:\"rtl8187se-kernel-server-latest~1016.20080716~1.20090817.1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.27.24-desktop-2mnb\", rpm:\"slmodem-kernel-2.6.27.24-desktop-2mnb~2.9.11~0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"slmodem-kernel-2.6.27.24-desktop586-2mnb~2.9.11~0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.27.24-server-2mnb\", rpm:\"slmodem-kernel-2.6.27.24-server-2mnb~2.9.11~0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop586-latest\", rpm:\"slmodem-kernel-desktop586-latest~2.9.11~1.20090817.0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop-latest\", rpm:\"slmodem-kernel-desktop-latest~2.9.11~1.20090817.0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-server-latest\", rpm:\"slmodem-kernel-server-latest~2.9.11~1.20090817.0.20080817.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.27.24-desktop-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.27.24-desktop-2mnb~3.3~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.27.24-desktop586-2mnb~3.3~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.27.24-server-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.27.24-server-2mnb~3.3~5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop586-latest\", rpm:\"squashfs-lzma-kernel-desktop586-latest~3.3~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop-latest\", rpm:\"squashfs-lzma-kernel-desktop-latest~3.3~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-server-latest\", rpm:\"squashfs-lzma-kernel-server-latest~3.3~1.20090817.5mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.27.24-desktop-2mnb\", rpm:\"tp_smapi-kernel-2.6.27.24-desktop-2mnb~0.37~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"tp_smapi-kernel-2.6.27.24-desktop586-2mnb~0.37~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.27.24-server-2mnb\", rpm:\"tp_smapi-kernel-2.6.27.24-server-2mnb~0.37~2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop586-latest\", rpm:\"tp_smapi-kernel-desktop586-latest~0.37~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop-latest\", rpm:\"tp_smapi-kernel-desktop-latest~0.37~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-server-latest\", rpm:\"tp_smapi-kernel-server-latest~0.37~1.20090817.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vboxadd-kernel-2.6.27.24-desktop-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vboxadd-kernel-2.6.27.24-desktop586-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-2.6.27.24-server-2mnb\", rpm:\"vboxadd-kernel-2.6.27.24-server-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-desktop586-latest\", rpm:\"vboxadd-kernel-desktop586-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-desktop-latest\", rpm:\"vboxadd-kernel-desktop-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadd-kernel-server-latest\", rpm:\"vboxadd-kernel-server-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vboxvfs-kernel-2.6.27.24-desktop-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vboxvfs-kernel-2.6.27.24-desktop586-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-2.6.27.24-server-2mnb\", rpm:\"vboxvfs-kernel-2.6.27.24-server-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-desktop586-latest\", rpm:\"vboxvfs-kernel-desktop586-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-desktop-latest\", rpm:\"vboxvfs-kernel-desktop-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxvfs-kernel-server-latest\", rpm:\"vboxvfs-kernel-server-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vhba-kernel-2.6.27.24-desktop-2mnb~1.0.0~1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vhba-kernel-2.6.27.24-desktop586-2mnb~1.0.0~1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.27.24-server-2mnb\", rpm:\"vhba-kernel-2.6.27.24-server-2mnb~1.0.0~1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop586-latest\", rpm:\"vhba-kernel-desktop586-latest~1.0.0~1.20090817.1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop-latest\", rpm:\"vhba-kernel-desktop-latest~1.0.0~1.20090817.1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-server-latest\", rpm:\"vhba-kernel-server-latest~1.0.0~1.20090817.1.svn304.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.27.24-desktop-2mnb\", rpm:\"virtualbox-kernel-2.6.27.24-desktop-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"virtualbox-kernel-2.6.27.24-desktop586-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.27.24-server-2mnb\", rpm:\"virtualbox-kernel-2.6.27.24-server-2mnb~2.0.2~2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop586-latest\", rpm:\"virtualbox-kernel-desktop586-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop-latest\", rpm:\"virtualbox-kernel-desktop-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-server-latest\", rpm:\"virtualbox-kernel-server-latest~2.0.2~1.20090817.2.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-desktop-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-desktop586-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-desktop586-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-server-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-server-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop586-latest\", rpm:\"vpnclient-kernel-desktop586-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia173-kernel-2.6.27.24-server-2mnb~173.14.12~4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-server-latest\", rpm:\"nvidia173-kernel-server-latest~173.14.12~1.20090817.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.29.6-desktop-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.29.6-desktop-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.29.6-desktop586-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-2.6.29.6-server-2mnb\", rpm:\"alsa_raoppcm-kernel-2.6.29.6-server-2mnb~0.5.1~2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop586-latest\", rpm:\"alsa_raoppcm-kernel-desktop586-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-desktop-latest\", rpm:\"alsa_raoppcm-kernel-desktop-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"alsa_raoppcm-kernel-server-latest\", rpm:\"alsa_raoppcm-kernel-server-latest~0.5.1~1.20090817.2mdv2008.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.29.6-desktop-2mnb\", rpm:\"broadcom-wl-kernel-2.6.29.6-desktop-2mnb~5.10.79.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"broadcom-wl-kernel-2.6.29.6-desktop586-2mnb~5.10.79.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.29.6-server-2mnb\", rpm:\"broadcom-wl-kernel-2.6.29.6-server-2mnb~5.10.79.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop586-latest\", rpm:\"broadcom-wl-kernel-desktop586-latest~5.10.79.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop-latest\", rpm:\"broadcom-wl-kernel-desktop-latest~5.10.79.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-server-latest\", rpm:\"broadcom-wl-kernel-server-latest~5.10.79.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.29.6-desktop-2mnb\", rpm:\"em8300-kernel-2.6.29.6-desktop-2mnb~0.17.2~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"em8300-kernel-2.6.29.6-desktop586-2mnb~0.17.2~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.29.6-server-2mnb\", rpm:\"em8300-kernel-2.6.29.6-server-2mnb~0.17.2~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-desktop586-latest\", rpm:\"em8300-kernel-desktop586-latest~0.17.2~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-desktop-latest\", rpm:\"em8300-kernel-desktop-latest~0.17.2~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"em8300-kernel-server-latest\", rpm:\"em8300-kernel-server-latest~0.17.2~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.29.6-desktop-2mnb\", rpm:\"fcpci-kernel-2.6.29.6-desktop-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"fcpci-kernel-2.6.29.6-desktop586-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-2.6.29.6-server-2mnb\", rpm:\"fcpci-kernel-2.6.29.6-server-2mnb~3.11.07~7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop586-latest\", rpm:\"fcpci-kernel-desktop586-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-desktop-latest\", rpm:\"fcpci-kernel-desktop-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fcpci-kernel-server-latest\", rpm:\"fcpci-kernel-server-latest~3.11.07~1.20090817.7mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.29.6-desktop-2mnb\", rpm:\"fglrx-kernel-2.6.29.6-desktop-2mnb~8.600~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"fglrx-kernel-2.6.29.6-desktop586-2mnb~8.600~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.29.6-server-2mnb\", rpm:\"fglrx-kernel-2.6.29.6-server-2mnb~8.600~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop586-latest\", rpm:\"fglrx-kernel-desktop586-latest~8.600~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.600~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.600~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.29.6-desktop-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.29.6-desktop-2mnb~1.18~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.29.6-desktop586-2mnb~1.18~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.29.6-server-2mnb\", rpm:\"hcfpcimodem-kernel-2.6.29.6-server-2mnb~1.18~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop586-latest\", rpm:\"hcfpcimodem-kernel-desktop586-latest~1.18~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop-latest\", rpm:\"hcfpcimodem-kernel-desktop-latest~1.18~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-server-latest\", rpm:\"hcfpcimodem-kernel-server-latest~1.18~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.29.6-desktop-2mnb\", rpm:\"hsfmodem-kernel-2.6.29.6-desktop-2mnb~7.80.02.03~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"hsfmodem-kernel-2.6.29.6-desktop586-2mnb~7.80.02.03~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.29.6-server-2mnb\", rpm:\"hsfmodem-kernel-2.6.29.6-server-2mnb~7.80.02.03~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop586-latest\", rpm:\"hsfmodem-kernel-desktop586-latest~7.80.02.03~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop-latest\", rpm:\"hsfmodem-kernel-desktop-latest~7.80.02.03~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hsfmodem-kernel-server-latest\", rpm:\"hsfmodem-kernel-server-latest~7.80.02.03~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.29.6-desktop-2mnb\", rpm:\"hso-kernel-2.6.29.6-desktop-2mnb~1.2~3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"hso-kernel-2.6.29.6-desktop586-2mnb~1.2~3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-2.6.29.6-server-2mnb\", rpm:\"hso-kernel-2.6.29.6-server-2mnb~1.2~3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop586-latest\", rpm:\"hso-kernel-desktop586-latest~1.2~1.20090817.3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-desktop-latest\", rpm:\"hso-kernel-desktop-latest~1.2~1.20090817.3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"hso-kernel-server-latest\", rpm:\"hso-kernel-server-latest~1.2~1.20090817.3mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.29.6-2mnb\", rpm:\"kernel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.29.6-2mnb\", rpm:\"kernel-desktop-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.29.6-2mnb\", rpm:\"kernel-desktop586-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.29.6-2mnb\", rpm:\"kernel-desktop586-devel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.29.6-2mnb\", rpm:\"kernel-desktop-devel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.29.6-2mnb\", rpm:\"kernel-server-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.29.6-2mnb\", rpm:\"kernel-server-devel-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.29.6-2mnb\", rpm:\"kernel-source-2.6.29.6-2mnb~1~1mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.29.6~2mnb2\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.29.6-desktop-2mnb\", rpm:\"kqemu-kernel-2.6.29.6-desktop-2mnb~1.4.0pre1~4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"kqemu-kernel-2.6.29.6-desktop586-2mnb~1.4.0pre1~4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.29.6-server-2mnb\", rpm:\"kqemu-kernel-2.6.29.6-server-2mnb~1.4.0pre1~4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop586-latest\", rpm:\"kqemu-kernel-desktop586-latest~1.4.0pre1~1.20090817.4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop-latest\", rpm:\"kqemu-kernel-desktop-latest~1.4.0pre1~1.20090817.4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-server-latest\", rpm:\"kqemu-kernel-server-latest~1.4.0pre1~1.20090817.4\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.29.6-desktop-2mnb\", rpm:\"libafs-kernel-2.6.29.6-desktop-2mnb~1.4.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"libafs-kernel-2.6.29.6-desktop586-2mnb~1.4.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.29.6-server-2mnb\", rpm:\"libafs-kernel-2.6.29.6-server-2mnb~1.4.10~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-desktop586-latest\", rpm:\"libafs-kernel-desktop586-latest~1.4.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-desktop-latest\", rpm:\"libafs-kernel-desktop-latest~1.4.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-server-latest\", rpm:\"libafs-kernel-server-latest~1.4.10~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.29.6-desktop-2mnb\", rpm:\"lirc-kernel-2.6.29.6-desktop-2mnb~0.8.5~0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"lirc-kernel-2.6.29.6-desktop586-2mnb~0.8.5~0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.29.6-server-2mnb\", rpm:\"lirc-kernel-2.6.29.6-server-2mnb~0.8.5~0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop586-latest\", rpm:\"lirc-kernel-desktop586-latest~0.8.5~1.20090817.0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-desktop-latest\", rpm:\"lirc-kernel-desktop-latest~0.8.5~1.20090817.0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lirc-kernel-server-latest\", rpm:\"lirc-kernel-server-latest~0.8.5~1.20090817.0.20090320.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.29.6-desktop-2mnb\", rpm:\"lzma-kernel-2.6.29.6-desktop-2mnb~4.43~27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"lzma-kernel-2.6.29.6-desktop586-2mnb~4.43~27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.29.6-server-2mnb\", rpm:\"lzma-kernel-2.6.29.6-server-2mnb~4.43~27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop586-latest\", rpm:\"lzma-kernel-desktop586-latest~4.43~1.20090817.27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-desktop-latest\", rpm:\"lzma-kernel-desktop-latest~4.43~1.20090817.27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lzma-kernel-server-latest\", rpm:\"lzma-kernel-server-latest~4.43~1.20090817.27.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.29.6-desktop-2mnb\", rpm:\"madwifi-kernel-2.6.29.6-desktop-2mnb~0.9.4~4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"madwifi-kernel-2.6.29.6-desktop586-2mnb~0.9.4~4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.29.6-server-2mnb\", rpm:\"madwifi-kernel-2.6.29.6-server-2mnb~0.9.4~4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop586-latest\", rpm:\"madwifi-kernel-desktop586-latest~0.9.4~1.20090817.4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20090817.4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20090817.4.r3998mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-2.6.29.6-desktop-2mnb\", rpm:\"netfilter-rtsp-kernel-2.6.29.6-desktop-2mnb~2.6.26~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"netfilter-rtsp-kernel-2.6.29.6-desktop586-2mnb~2.6.26~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-2.6.29.6-server-2mnb\", rpm:\"netfilter-rtsp-kernel-2.6.29.6-server-2mnb~2.6.26~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-desktop586-latest\", rpm:\"netfilter-rtsp-kernel-desktop586-latest~2.6.26~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-desktop-latest\", rpm:\"netfilter-rtsp-kernel-desktop-latest~2.6.26~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"netfilter-rtsp-kernel-server-latest\", rpm:\"netfilter-rtsp-kernel-server-latest~2.6.26~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nouveau-kernel-2.6.29.6-desktop-2mnb~0.0.12~0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nouveau-kernel-2.6.29.6-desktop586-2mnb~0.0.12~0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-2.6.29.6-server-2mnb\", rpm:\"nouveau-kernel-2.6.29.6-server-2mnb~0.0.12~0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-desktop586-latest\", rpm:\"nouveau-kernel-desktop586-latest~0.0.12~1.20090817.0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-desktop-latest\", rpm:\"nouveau-kernel-desktop-latest~0.0.12~1.20090817.0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nouveau-kernel-server-latest\", rpm:\"nouveau-kernel-server-latest~0.0.12~1.20090817.0.20090329.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nvidia173-kernel-2.6.29.6-desktop-2mnb~173.14.18~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nvidia173-kernel-2.6.29.6-desktop586-2mnb~173.14.18~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.29.6-server-2mnb\", rpm:\"nvidia173-kernel-2.6.29.6-server-2mnb~173.14.18~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop586-latest\", rpm:\"nvidia173-kernel-desktop586-latest~173.14.18~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop-latest\", rpm:\"nvidia173-kernel-desktop-latest~173.14.18~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia173-kernel-server-latest\", rpm:\"nvidia173-kernel-server-latest~173.14.18~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nvidia96xx-kernel-2.6.29.6-desktop-2mnb~96.43.11~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nvidia96xx-kernel-2.6.29.6-desktop586-2mnb~96.43.11~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.29.6-server-2mnb\", rpm:\"nvidia96xx-kernel-2.6.29.6-server-2mnb~96.43.11~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop586-latest\", rpm:\"nvidia96xx-kernel-desktop586-latest~96.43.11~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.11~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.11~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.29.6-desktop-2mnb\", rpm:\"nvidia-current-kernel-2.6.29.6-desktop-2mnb~180.51~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"nvidia-current-kernel-2.6.29.6-desktop586-2mnb~180.51~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.29.6-server-2mnb\", rpm:\"nvidia-current-kernel-2.6.29.6-server-2mnb~180.51~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop586-latest\", rpm:\"nvidia-current-kernel-desktop586-latest~180.51~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~180.51~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~180.51~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.29.6-desktop-2mnb\", rpm:\"opencbm-kernel-2.6.29.6-desktop-2mnb~0.4.2a~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"opencbm-kernel-2.6.29.6-desktop586-2mnb~0.4.2a~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-2.6.29.6-server-2mnb\", rpm:\"opencbm-kernel-2.6.29.6-server-2mnb~0.4.2a~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop586-latest\", rpm:\"opencbm-kernel-desktop586-latest~0.4.2a~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-desktop-latest\", rpm:\"opencbm-kernel-desktop-latest~0.4.2a~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"opencbm-kernel-server-latest\", rpm:\"opencbm-kernel-server-latest~0.4.2a~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.29.6-desktop-2mnb\", rpm:\"rt2870-kernel-2.6.29.6-desktop-2mnb~1.4.0.0~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"rt2870-kernel-2.6.29.6-desktop586-2mnb~1.4.0.0~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-2.6.29.6-server-2mnb\", rpm:\"rt2870-kernel-2.6.29.6-server-2mnb~1.4.0.0~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop586-latest\", rpm:\"rt2870-kernel-desktop586-latest~1.4.0.0~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-desktop-latest\", rpm:\"rt2870-kernel-desktop-latest~1.4.0.0~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"rt2870-kernel-server-latest\", rpm:\"rt2870-kernel-server-latest~1.4.0.0~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.29.6-desktop-2mnb\", rpm:\"slmodem-kernel-2.6.29.6-desktop-2mnb~2.9.11~0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"slmodem-kernel-2.6.29.6-desktop586-2mnb~2.9.11~0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.29.6-server-2mnb\", rpm:\"slmodem-kernel-2.6.29.6-server-2mnb~2.9.11~0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop586-latest\", rpm:\"slmodem-kernel-desktop586-latest~2.9.11~1.20090817.0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop-latest\", rpm:\"slmodem-kernel-desktop-latest~2.9.11~1.20090817.0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"slmodem-kernel-server-latest\", rpm:\"slmodem-kernel-server-latest~2.9.11~1.20090817.0.20080817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-2.6.29.6-desktop-2mnb\", rpm:\"squashfs-kernel-2.6.29.6-desktop-2mnb~3.4~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"squashfs-kernel-2.6.29.6-desktop586-2mnb~3.4~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-2.6.29.6-server-2mnb\", rpm:\"squashfs-kernel-2.6.29.6-server-2mnb~3.4~1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-desktop586-latest\", rpm:\"squashfs-kernel-desktop586-latest~3.4~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-desktop-latest\", rpm:\"squashfs-kernel-desktop-latest~3.4~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-kernel-server-latest\", rpm:\"squashfs-kernel-server-latest~3.4~1.20090817.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.29.6-desktop-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.29.6-desktop-2mnb~3.3~10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.29.6-desktop586-2mnb~3.3~10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.29.6-server-2mnb\", rpm:\"squashfs-lzma-kernel-2.6.29.6-server-2mnb~3.3~10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop586-latest\", rpm:\"squashfs-lzma-kernel-desktop586-latest~3.3~1.20090817.10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop-latest\", rpm:\"squashfs-lzma-kernel-desktop-latest~3.3~1.20090817.10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-server-latest\", rpm:\"squashfs-lzma-kernel-server-latest~3.3~1.20090817.10mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-2.6.29.6-desktop-2mnb\", rpm:\"syntek-kernel-2.6.29.6-desktop-2mnb~1.3.1~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"syntek-kernel-2.6.29.6-desktop586-2mnb~1.3.1~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-2.6.29.6-server-2mnb\", rpm:\"syntek-kernel-2.6.29.6-server-2mnb~1.3.1~5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-desktop586-latest\", rpm:\"syntek-kernel-desktop586-latest~1.3.1~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-desktop-latest\", rpm:\"syntek-kernel-desktop-latest~1.3.1~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"syntek-kernel-server-latest\", rpm:\"syntek-kernel-server-latest~1.3.1~1.20090817.5mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.29.6-desktop-2mnb\", rpm:\"tp_smapi-kernel-2.6.29.6-desktop-2mnb~0.40~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"tp_smapi-kernel-2.6.29.6-desktop586-2mnb~0.40~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-2.6.29.6-server-2mnb\", rpm:\"tp_smapi-kernel-2.6.29.6-server-2mnb~0.40~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop586-latest\", rpm:\"tp_smapi-kernel-desktop586-latest~0.40~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-desktop-latest\", rpm:\"tp_smapi-kernel-desktop-latest~0.40~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"tp_smapi-kernel-server-latest\", rpm:\"tp_smapi-kernel-server-latest~0.40~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.29.6-desktop-2mnb\", rpm:\"vboxadditions-kernel-2.6.29.6-desktop-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"vboxadditions-kernel-2.6.29.6-desktop586-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.29.6-server-2mnb\", rpm:\"vboxadditions-kernel-2.6.29.6-server-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop586-latest\", rpm:\"vboxadditions-kernel-desktop586-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop-latest\", rpm:\"vboxadditions-kernel-desktop-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vboxadditions-kernel-server-latest\", rpm:\"vboxadditions-kernel-server-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.29.6-desktop-2mnb\", rpm:\"vhba-kernel-2.6.29.6-desktop-2mnb~1.2.1~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"vhba-kernel-2.6.29.6-desktop586-2mnb~1.2.1~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-2.6.29.6-server-2mnb\", rpm:\"vhba-kernel-2.6.29.6-server-2mnb~1.2.1~2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop586-latest\", rpm:\"vhba-kernel-desktop586-latest~1.2.1~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-desktop-latest\", rpm:\"vhba-kernel-desktop-latest~1.2.1~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vhba-kernel-server-latest\", rpm:\"vhba-kernel-server-latest~1.2.1~1.20090817.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.29.6-desktop-2mnb\", rpm:\"virtualbox-kernel-2.6.29.6-desktop-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"virtualbox-kernel-2.6.29.6-desktop586-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.29.6-server-2mnb\", rpm:\"virtualbox-kernel-2.6.29.6-server-2mnb~2.2.0~4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop586-latest\", rpm:\"virtualbox-kernel-desktop586-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop-latest\", rpm:\"virtualbox-kernel-desktop-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"virtualbox-kernel-server-latest\", rpm:\"virtualbox-kernel-server-latest~2.2.0~1.20090817.4mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.29.6-desktop-2mnb\", rpm:\"vpnclient-kernel-2.6.29.6-desktop-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.29.6-desktop586-2mnb\", rpm:\"vpnclient-kernel-2.6.29.6-desktop586-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.29.6-server-2mnb\", rpm:\"vpnclient-kernel-2.6.29.6-server-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop586-latest\", rpm:\"vpnclient-kernel-desktop586-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.01.0640~1.20090817.3mdv2009.0\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-2.6.27.24-2mnb\", rpm:\"kernel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-2.6.27.24-2mnb\", rpm:\"kernel-desktop-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop586-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-2.6.27.24-2mnb\", rpm:\"kernel-desktop-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-2.6.27.24-2mnb\", rpm:\"kernel-server-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-2.6.27.24-2mnb\", rpm:\"kernel-server-devel-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-2.6.27.24-2mnb\", rpm:\"kernel-source-2.6.27.24-2mnb~1~1mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.27.24~2mnb2\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-desktop-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.27.24-server-2mnb\", rpm:\"fglrx-kernel-2.6.27.24-server-2mnb~8.522~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.522~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.522~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-desktop-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-2.6.27.24-server-2mnb\", rpm:\"iscsitarget-kernel-2.6.27.24-server-2mnb~0.4.16~4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-desktop-latest\", rpm:\"iscsitarget-kernel-desktop-latest~0.4.16~1.20090814.4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"iscsitarget-kernel-server-latest\", rpm:\"iscsitarget-kernel-server-latest~0.4.16~1.20090814.4mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-desktop-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-desktop-2mnb~1.4.0pre1~0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-2.6.27.24-server-2mnb\", rpm:\"kqemu-kernel-2.6.27.24-server-2mnb~1.4.0pre1~0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-desktop-latest\", rpm:\"kqemu-kernel-desktop-latest~1.4.0pre1~1.20090814.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kqemu-kernel-server-latest\", rpm:\"kqemu-kernel-server-latest~1.4.0pre1~1.20090814.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.27.24-desktop-2mnb\", rpm:\"libafs-kernel-2.6.27.24-desktop-2mnb~1.4.7~5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.27.24-server-2mnb\", rpm:\"libafs-kernel-2.6.27.24-server-2mnb~1.4.7~5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-desktop-latest\", rpm:\"libafs-kernel-desktop-latest~1.4.7~1.20090814.5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libafs-kernel-server-latest\", rpm:\"libafs-kernel-server-latest~1.4.7~1.20090814.5.1mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-desktop-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-desktop-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.27.24-server-2mnb\", rpm:\"madwifi-kernel-2.6.27.24-server-2mnb~0.9.4~3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20090814.3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20090814.3.r3835mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-desktop-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia71xx-kernel-2.6.27.24-server-2mnb~71.86.06~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-desktop-latest\", rpm:\"nvidia71xx-kernel-desktop-latest~71.86.06~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia71xx-kernel-server-latest\", rpm:\"nvidia71xx-kernel-server-latest~71.86.06~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-desktop-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia96xx-kernel-2.6.27.24-server-2mnb~96.43.07~5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.07~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.07~1.20090814.5mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-desktop-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.27.24-server-2mnb\", rpm:\"nvidia-current-kernel-2.6.27.24-server-2mnb~177.70~2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~177.70~1.20090814.2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~177.70~1.20090814.2.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-desktop-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-desktop-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.27.24-server-2mnb\", rpm:\"vpnclient-kernel-2.6.27.24-server-2mnb~4.8.01.0640~3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.01.0640~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.01.0640~1.20090814.3mdv2009.0\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:52", "description": "The remote host is missing an update as announced\nvia advisory SSA:2009-230-01.", "cvss3": {}, "published": "2012-09-11T00:00:00", "type": "openvas", "title": "Slackware Advisory SSA:2009-230-01 kernel ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:64771", "href": "http://plugins.openvas.org/nasl.php?oid=64771", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2009_230_01.nasl 6598 2017-07-07 09:36:44Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"New Linux kernel packages are available for Slackware 12.2 and -current\nto address a security issue. A kernel bug discovered by Tavis Ormandy\nand Julien Tinnes of the Google Security Team could allow a local user\nto fill memory page zero with arbitrary code and then use the kernel\nsendpage operation to trigger a NULL pointer dereference, executing the\ncode in the context of the kernel. If successfully exploited, this bug\ncan be used to gain root access.\n\nAt this time we have prepared fixed kernels for the stable version of\nSlackware (12.2), as well as for both 32-bit x86 and x86_64 -current\nversions. Additionally, we have added a package to the /patches\ndirectory for Slackware 12.1 and 12.2 that will set the minimum memory\npage that can be mmap()ed from userspace without additional privileges\nto 4096. The package will work with any kernel supporting the\nvm.mmap_min_addr tunable, and should significantly reduce the potential\nharm from this bug, as well as future similar bugs that might be found\nin the kernel. More updated kernels may follow.\";\ntag_summary = \"The remote host is missing an update as announced\nvia advisory SSA:2009-230-01.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2009-230-01\";\n \nif(description)\n{\n script_id(64771);\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:36:44 +0200 (Fri, 07 Jul 2017) $\");\n script_cve_id(\"CVE-2009-2692\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 6598 $\");\n script_name(\"Slackware Advisory SSA:2009-230-01 kernel \");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-slack.inc\");\nvuln = 0;\nif(isslkpkgvuln(pkg:\"kernel-firmware\", ver:\"2.6.27.31-noarch-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-generic\", ver:\"2.6.27.31-i486-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-generic-smp\", ver:\"2.6.27.31_smp-i686-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-headers\", ver:\"2.6.27.31_smp-x86-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-huge\", ver:\"2.6.27.31-i486-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-huge-smp\", ver:\"2.6.27.31_smp-i686-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-modules\", ver:\"2.6.27.31-i486-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-modules-smp\", ver:\"2.6.27.31_smp-i686-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-source\", ver:\"2.6.27.31_smp-noarch-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-mmap_min_addr\", ver:\"4096-noarch-1\", rls:\"SLK12.1\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"kernel-mmap_min_addr\", ver:\"4096-noarch-1\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\n\nif(vuln) {\n security_message(0);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:55:42", "description": "Check for the Version of kernel", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for kernel CESA-2009:1223 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880944", "href": "http://plugins.openvas.org/nasl.php?oid=880944", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2009:1223 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\n macro did not initialize the sendpage operation in the proto_ops structure\n correctly. A local, unprivileged user could use this flaw to cause a local\n denial of service or escalate their privileges. (CVE-2009-2692, Important)\n \n * a flaw was found in the udp_sendmsg() implementation in the Linux kernel\n when using the MSG_MORE flag on UDP sockets. A local, unprivileged user\n could use this flaw to cause a local denial of service or escalate their\n privileges. (CVE-2009-2698, Important)\n \n Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\n Security Team for responsibly reporting these flaws.\n \n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2009-August/016108.html\");\n script_id(880944);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2009:1223\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_name(\"CentOS Update for kernel CESA-2009:1223 centos4 i386\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:55:35", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1233.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nAll Red Hat Enterprise Linux 3 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. The\nsystem must be rebooted for this update to take effect.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1233", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:64671", "href": "http://plugins.openvas.org/nasl.php?oid=64671", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1233.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1233 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1233.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nAll Red Hat Enterprise Linux 3 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. The\nsystem must be rebooted for this update to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(64671);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:1233\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1233.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT\", rpm:\"kernel-BOOT~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem-unsupported\", rpm:\"kernel-hugemem-unsupported~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-unsupported\", rpm:\"kernel-smp-unsupported~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-unsupported\", rpm:\"kernel-unsupported~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:19", "description": "The remote host is missing updates to kernel announced in\nadvisory CESA-2009:1222.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:1222 (kernel)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064792", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064792", "sourceData": "#CESA-2009:1222 64792 2\n# $Id: ovcesa2009_1222.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:1222 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1222\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1222\nhttps://rhn.redhat.com/errata/RHSA-2009-1222.html\";\ntag_summary = \"The remote host is missing updates to kernel announced in\nadvisory CESA-2009:1222.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64792\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"CentOS Security Advisory CESA-2009:1222 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:55:51", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1223.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1223", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:64669", "href": "http://plugins.openvas.org/nasl.php?oid=64669", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1223.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1223 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1223.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(64669);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:1223\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1223.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:17", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1222.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nThese updated packages also fix the following bug:\n\n* in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was\nnot freed in the error exit path. This bug led to a memory leak and an\nunresponsive system. A reported case of this bug occurred after running\ncman_tool kill -n [nodename]. (BZ#515432)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1222", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064668", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064668", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1222.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1222 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1222.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nThese updated packages also fix the following bug:\n\n* in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was\nnot freed in the error exit path. This bug led to a memory leak and an\nunresponsive system. A reported case of this bug occurred after running\ncman_tool kill -n [nodename]. (BZ#515432)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64668\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:1222\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1222.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump\", rpm:\"kernel-kdump~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump-debuginfo\", rpm:\"kernel-kdump-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump-devel\", rpm:\"kernel-kdump-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:00", "description": "Oracle Linux Local Security Checks ELSA-2009-1222", "cvss3": {}, "published": "2015-10-08T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2009-1222", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122454", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122454", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2009-1222.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122454\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:45:39 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2009-1222\");\n script_tag(name:\"insight\", value:\"ELSA-2009-1222 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2009-1222\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2009-1222.html\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~128.7.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5~1.4.2~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5PAE~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5PAE~1.4.2~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5debug~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5debug~1.4.2~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5xen~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~128.7.1.0.1.el5xen~1.4.2~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~128.7.1.0.1.el5~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~128.7.1.0.1.el5PAE~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~128.7.1.0.1.el5debug~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~128.7.1.0.1.el5xen~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:42", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for kernel CESA-2009:1222 centos5 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310880869", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880869", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2009:1222 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2009-August/016109.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880869\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2009:1222\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_name(\"CentOS Update for kernel CESA-2009:1222 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 5\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n\n * a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\n macro did not initialize the sendpage operation in the proto_ops structure\n correctly. A local, unprivileged user could use this flaw to cause a local\n denial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n * a flaw was found in the udp_sendmsg() implementation in the Linux kernel\n when using the MSG_MORE flag on UDP sockets. A local, unprivileged user\n could use this flaw to cause a local denial of service or escalate their\n privileges. (CVE-2009-2698, Important)\n\n Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\n Security Team for responsibly reporting these flaws.\n\n These updated packages also fix the following bug:\n\n * in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was\n not freed in the error exit path. This bug led to a memory leak and an\n unresponsive system. A reported case of this bug occurred after running\n 'cman_tool kill -n [nodename]'. (BZ#515432)\n\n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-25T10:55:30", "description": "Check for the Version of kernel", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for kernel CESA-2009:1222 centos5 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880869", "href": "http://plugins.openvas.org/nasl.php?oid=880869", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2009:1222 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\n macro did not initialize the sendpage operation in the proto_ops structure\n correctly. A local, unprivileged user could use this flaw to cause a local\n denial of service or escalate their privileges. (CVE-2009-2692, Important)\n \n * a flaw was found in the udp_sendmsg() implementation in the Linux kernel\n when using the MSG_MORE flag on UDP sockets. A local, unprivileged user\n could use this flaw to cause a local denial of service or escalate their\n privileges. (CVE-2009-2698, Important)\n \n Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\n Security Team for responsibly reporting these flaws.\n \n These updated packages also fix the following bug:\n \n * in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was\n not freed in the error exit path. This bug led to a memory leak and an\n unresponsive system. A reported case of this bug occurred after running\n "cman_tool kill -n [nodename]". (BZ#515432)\n \n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2009-August/016109.html\");\n script_id(880869);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2009:1222\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_name(\"CentOS Update for kernel CESA-2009:1222 centos5 i386\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:55:39", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1222.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nThese updated packages also fix the following bug:\n\n* in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was\nnot freed in the error exit path. This bug led to a memory leak and an\nunresponsive system. A reported case of this bug occurred after running\ncman_tool kill -n [nodename]. (BZ#515432)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1222", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:64668", "href": "http://plugins.openvas.org/nasl.php?oid=64668", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1222.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1222 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1222.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nThese updated packages also fix the following bug:\n\n* in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was\nnot freed in the error exit path. This bug led to a memory leak and an\nunresponsive system. A reported case of this bug occurred after running\ncman_tool kill -n [nodename]. (BZ#515432)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(64668);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:1222\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1222.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump\", rpm:\"kernel-kdump~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump-debuginfo\", rpm:\"kernel-kdump-debuginfo~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump-devel\", rpm:\"kernel-kdump-devel~2.6.18~128.7.1.el5\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:55:28", "description": "Check for the Version of kernel", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for kernel CESA-2009:1233 centos3 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880685", "href": "http://plugins.openvas.org/nasl.php?oid=880685", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2009:1233 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\n macro did not initialize the sendpage operation in the proto_ops structure\n correctly. A local, unprivileged user could use this flaw to cause a local\n denial of service or escalate their privileges. (CVE-2009-2692, Important)\n \n * a flaw was found in the udp_sendmsg() implementation in the Linux kernel\n when using the MSG_MORE flag on UDP sockets. A local, unprivileged user\n could use this flaw to cause a local denial of service or escalate their\n privileges. (CVE-2009-2698, Important)\n \n Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\n Security Team for responsibly reporting these flaws.\n \n All Red Hat Enterprise Linux 3 users should upgrade to these updated\n packages, which contain backported patches to resolve these issues. The\n system must be rebooted for this update to take effect.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on CentOS 3\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2009-August/016117.html\");\n script_id(880685);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2009:1233\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_name(\"CentOS Update for kernel CESA-2009:1233 centos3 i386\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-BOOT\", rpm:\"kernel-BOOT~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-unsupported\", rpm:\"kernel-hugemem-unsupported~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-unsupported\", rpm:\"kernel-smp-unsupported~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-unsupported\", rpm:\"kernel-unsupported~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:24", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for kernel CESA-2009:1223 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310880944", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880944", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2009:1223 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2009-August/016108.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880944\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2009:1223\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_name(\"CentOS Update for kernel CESA-2009:1223 centos4 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS4\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 4\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n\n * a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\n macro did not initialize the sendpage operation in the proto_ops structure\n correctly. A local, unprivileged user could use this flaw to cause a local\n denial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n * a flaw was found in the udp_sendmsg() implementation in the Linux kernel\n when using the MSG_MORE flag on UDP sockets. A local, unprivileged user\n could use this flaw to cause a local denial of service or escalate their\n privileges. (CVE-2009-2698, Important)\n\n Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\n Security Team for responsibly reporting these flaws.\n\n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.0.9.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:38", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for kernel CESA-2009:1233 centos3 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310880685", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880685", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2009:1233 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2009-August/016117.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880685\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2009:1233\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_name(\"CentOS Update for kernel CESA-2009:1233 centos3 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS3\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 3\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n\n * a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\n macro did not initialize the sendpage operation in the proto_ops structure\n correctly. A local, unprivileged user could use this flaw to cause a local\n denial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n * a flaw was found in the udp_sendmsg() implementation in the Linux kernel\n when using the MSG_MORE flag on UDP sockets. A local, unprivileged user\n could use this flaw to cause a local denial of service or escalate their\n privileges. (CVE-2009-2698, Important)\n\n Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\n Security Team for responsibly reporting these flaws.\n\n All Red Hat Enterprise Linux 3 users should upgrade to these updated\n packages, which contain backported patches to resolve these issues. The\n system must be rebooted for this update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-BOOT\", rpm:\"kernel-BOOT~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-unsupported\", rpm:\"kernel-hugemem-unsupported~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-unsupported\", rpm:\"kernel-smp-unsupported~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-unsupported\", rpm:\"kernel-unsupported~2.4.21~60.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-04-06T11:37:51", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1223.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1223", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064669", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064669", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1223.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1223 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1223.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64669\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:1223\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1223.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.0.9.EL\", rls:\"RHENT_4\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:25", "description": "The remote host is missing updates to kernel announced in\nadvisory CESA-2009:1222.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:1222 (kernel)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:64792", "href": "http://plugins.openvas.org/nasl.php?oid=64792", "sourceData": "#CESA-2009:1222 64792 2\n# $Id: ovcesa2009_1222.nasl 6650 2017-07-10 11:43:12Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:1222 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1222\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1222\nhttps://rhn.redhat.com/errata/RHSA-2009-1222.html\";\ntag_summary = \"The remote host is missing updates to kernel announced in\nadvisory CESA-2009:1222.\";\n\n\n\nif(description)\n{\n script_id(64792);\n script_version(\"$Revision: 6650 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:43:12 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"CentOS Security Advisory CESA-2009:1222 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~128.7.1.el5\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:06", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1233.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nAll Red Hat Enterprise Linux 3 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. The\nsystem must be rebooted for this update to take effect.", "cvss3": {}, "published": "2009-09-02T00:00:00", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1233", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2692", "CVE-2009-2698"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231064671", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064671", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1233.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1233 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1233.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This\nmacro did not initialize the sendpage operation in the proto_ops structure\ncorrectly. A local, unprivileged user could use this flaw to cause a local\ndenial of service or escalate their privileges. (CVE-2009-2692, Important)\n\n* a flaw was found in the udp_sendmsg() implementation in the Linux kernel\nwhen using the MSG_MORE flag on UDP sockets. A local, unprivileged user\ncould use this flaw to cause a local denial of service or escalate their\nprivileges. (CVE-2009-2698, Important)\n\nRed Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google\nSecurity Team for responsibly reporting these flaws.\n\nAll Red Hat Enterprise Linux 3 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. The\nsystem must be rebooted for this update to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64671\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2692\", \"CVE-2009-2698\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:1233\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1233.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#important\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-BOOT\", rpm:\"kernel-BOOT~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-hugemem-unsupported\", rpm:\"kernel-hugemem-unsupported~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-unsupported\", rpm:\"kernel-smp-unsupported~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-unsupported\", rpm:\"kernel-unsupported~2.4.21~60.EL\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:51", "description": "The remote host is missing updates to kernel announced in\nadvisory CESA-2009:1233.", "cvss3": {}, "published": "2009-09-0