Debian Security Advisory for 'fai-kernels, linux-2.6, user-mode-linux' package(s) fix multiple vulnerabilities including denial of service and execution of arbitrary code (DSA-1428-1
Reporter | Title | Published | Views | Family All 189 |
---|---|---|---|---|
![]() | fai-kernels linux-2.6 user-mode-linux - several vulnerabilities | 11 Dec 200700:00 | – | osv |
![]() | RHSA-2008:0167 Red Hat Security Advisory: kernel security and bug fix update | 15 Sep 202417:08 | – | osv |
![]() | RHSA-2008:0089 Red Hat Security Advisory: kernel security and bug fix update | 15 Sep 202417:09 | – | osv |
![]() | RHSA-2007:1104 Red Hat Security Advisory: kernel security and bug fix update | 15 Sep 202417:00 | – | osv |
![]() | RHSA-2007:0993 Red Hat Security Advisory: kernel security update | 15 Sep 202417:00 | – | osv |
![]() | RHSA-2008:0055 Red Hat Security Advisory: kernel security and bug fix update | 15 Sep 202417:09 | – | osv |
![]() | RHSA-2007:0488 Red Hat Security Advisory: kernel security update | 15 Sep 202416:45 | – | osv |
![]() | Debian Security Advisory DSA 1428-2 (linux-2.6) | 17 Jan 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 1428-1 (linux-2.6) | 31 Jan 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 1428-1 (linux-2.6) | 31 Jan 200800:00 | – | openvas |
Source | Link |
---|---|
security-tracker | www.security-tracker.debian.org/tracker/DSA-1428 |
debian | www.debian.org/security/2007/DSA-1428-1 |
# SPDX-FileCopyrightText: 2008 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.60011");
script_cve_id("CVE-2007-3104", "CVE-2007-4997", "CVE-2007-5500", "CVE-2007-5904");
script_tag(name:"creation_date", value:"2008-01-17 22:23:47 +0000 (Thu, 17 Jan 2008)");
script_version("2024-02-01T14:37:10+0000");
script_tag(name:"last_modification", value:"2024-02-01 14:37:10 +0000 (Thu, 01 Feb 2024)");
script_tag(name:"cvss_base", value:"7.1");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:C");
script_name("Debian: Security Advisory (DSA-1428-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 Greenbone AG");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB4");
script_xref(name:"Advisory-ID", value:"DSA-1428-1");
script_xref(name:"URL", value:"https://www.debian.org/security/2007/DSA-1428-1");
script_xref(name:"URL", value:"https://security-tracker.debian.org/tracker/DSA-1428");
script_tag(name:"summary", value:"The remote host is missing an update for the Debian 'fai-kernels, linux-2.6, user-mode-linux' package(s) announced via the DSA-1428-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
This is an update to DSA 1428-1 which omitted a reference to CVE-2007-5904.
CVE-2007-3104
Eric Sandeen provided a backport of Tejun Heo's fix for a local denial of service vulnerability in sysfs. Under memory pressure, a dentry structure maybe reclaimed resulting in a bad pointer dereference causing an oops during a readdir.
CVE-2007-4997
Chris Evans discovered an issue with certain drivers that make use of the Linux kernel's ieee80211 layer. A remote user could generate a malicious 802.11 frame that could result in a denial of service (crash). The ipw2100 driver is known to be affected by this issue, while the ipw2200 is believed not to be.
CVE-2007-5500
Scott James Remnant diagnosed a coding error in the implementation of ptrace which could be used by a local user to cause the kernel to enter an infinite loop.
CVE-2007-5904
Przemyslaw Wegrzyn discovered an issue in the CIFS filesystem that could allow a malicious server to cause a denial of service (crash) by overflowing a buffer.
These problems have been fixed in the stable distribution in version 2.6.18.dfsg.1-13etch5.
The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update:
Debian 4.0 (etch)
fai-kernels 1.17+etch.13etch5
user-mode-linux 2.6.18-1um-2etch.13etch5
We recommend that you upgrade your kernel package immediately and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes.");
script_tag(name:"affected", value:"'fai-kernels, linux-2.6, user-mode-linux' package(s) on Debian 4.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "DEB4") {
if(!isnull(res = isdpkgvuln(pkg:"fai-kernels", ver:"1.17+etch.13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-doc-2.6.18", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-486", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-686-bigmem", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-alpha", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-arm", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-hppa", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-i386", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-ia64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-mips", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-mipsel", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-powerpc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-s390", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-sparc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-generic", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-legacy", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-footbridge", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-iop32x", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-itanium", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-ixp4xx", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-k7", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-mckinley", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc64-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-powerpc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-powerpc-miboot", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-powerpc-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-powerpc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-prep", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-qemu", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-r3k-kn02", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-r4k-ip22", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-r4k-kn04", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-r5k-cobalt", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-r5k-ip32", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-rpc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-s390", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-s390x", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-s3c2410", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-sb1-bcm91250a", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-sb1a-bcm91480b", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-sparc32", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-sparc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-sparc64-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-alpha", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-k7", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-powerpc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-powerpc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-s390x", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-sparc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-486", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-686-bigmem", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-generic", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-legacy", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-footbridge", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-iop32x", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-itanium", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-ixp4xx", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-k7", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-mckinley", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-parisc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-parisc-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-parisc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-parisc64-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-powerpc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-powerpc-miboot", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-powerpc-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-powerpc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-prep", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-qemu", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-r3k-kn02", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-r4k-ip22", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-r4k-kn04", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-r5k-cobalt", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-r5k-ip32", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-rpc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-s390", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-s390-tape", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-s390x", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-s3c2410", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-sb1-bcm91250a", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-sb1a-bcm91480b", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-sparc32", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-sparc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-sparc64-smp", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-alpha", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-k7", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-powerpc", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-powerpc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-s390x", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-sparc64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-vserver-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-manual-2.6.18", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-vserver-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-patch-debian-2.6.18", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-source-2.6.18", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-support-2.6.18-5", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-tree-2.6.18", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"user-mode-linux", ver:"2.6.18-1um-2etch.13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-vserver-686", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch5", rls:"DEB4"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo