Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:13614125623111220243842
HistoryJun 26, 2024 - 12:00 a.m.

Debian: Security Advisory (DLA-3842-1)

2024-06-2600:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
3
debian
security advisory
dla-3842-1
updates
cves

8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%

The remote host is missing an update for the Debian

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.1.2.2024.3842");
  script_cve_id("CVE-2022-38096", "CVE-2023-28746", "CVE-2023-47233", "CVE-2023-52429", "CVE-2023-52434", "CVE-2023-52435", "CVE-2023-52447", "CVE-2023-52458", "CVE-2023-52482", "CVE-2023-52486", "CVE-2023-52488", "CVE-2023-52489", "CVE-2023-52491", "CVE-2023-52492", "CVE-2023-52493", "CVE-2023-52497", "CVE-2023-52498", "CVE-2023-52583", "CVE-2023-52587", "CVE-2023-52594", "CVE-2023-52595", "CVE-2023-52597", "CVE-2023-52598", "CVE-2023-52599", "CVE-2023-52600", "CVE-2023-52601", "CVE-2023-52602", "CVE-2023-52603", "CVE-2023-52604", "CVE-2023-52606", "CVE-2023-52607", "CVE-2023-52614", "CVE-2023-52615", "CVE-2023-52616", "CVE-2023-52617", "CVE-2023-52618", "CVE-2023-52619", "CVE-2023-52620", "CVE-2023-52622", "CVE-2023-52623", "CVE-2023-52627", "CVE-2023-52635", "CVE-2023-52637", "CVE-2023-52642", "CVE-2023-52644", "CVE-2023-52650", "CVE-2023-52656", "CVE-2023-52669", "CVE-2023-52670", "CVE-2023-52672", "CVE-2023-52699", "CVE-2023-52880", "CVE-2023-6270", "CVE-2023-7042", "CVE-2024-0340", "CVE-2024-0565", "CVE-2024-0607", "CVE-2024-0841", "CVE-2024-1151", "CVE-2024-22099", "CVE-2024-23849", "CVE-2024-23850", "CVE-2024-23851", "CVE-2024-24857", "CVE-2024-24858", "CVE-2024-24861", "CVE-2024-25739", "CVE-2024-26581", "CVE-2024-26593", "CVE-2024-26600", "CVE-2024-26601", "CVE-2024-26602", "CVE-2024-26606", "CVE-2024-26610", "CVE-2024-26614", "CVE-2024-26615", "CVE-2024-26622", "CVE-2024-26625", "CVE-2024-26627", "CVE-2024-26635", "CVE-2024-26636", "CVE-2024-26640", "CVE-2024-26641", "CVE-2024-26642", "CVE-2024-26643", "CVE-2024-26644", "CVE-2024-26645", "CVE-2024-26651", "CVE-2024-26654", "CVE-2024-26659", "CVE-2024-26663", "CVE-2024-26664", "CVE-2024-26665", "CVE-2024-26671", "CVE-2024-26673", "CVE-2024-26675", "CVE-2024-26679", "CVE-2024-26684", "CVE-2024-26685", "CVE-2024-26687", "CVE-2024-26688", "CVE-2024-26689", "CVE-2024-26695", "CVE-2024-26696", "CVE-2024-26697", "CVE-2024-26698", "CVE-2024-26702", "CVE-2024-26704", "CVE-2024-26707", "CVE-2024-26712", "CVE-2024-26720", "CVE-2024-26722", "CVE-2024-26727", "CVE-2024-26733", "CVE-2024-26735", "CVE-2024-26736", "CVE-2024-26743", "CVE-2024-26744", "CVE-2024-26747", "CVE-2024-26748", "CVE-2024-26749", "CVE-2024-26751", "CVE-2024-26752", "CVE-2024-26753", "CVE-2024-26754", "CVE-2024-26763", "CVE-2024-26764", "CVE-2024-26766", "CVE-2024-26771", "CVE-2024-26772", "CVE-2024-26773", "CVE-2024-26776", "CVE-2024-26777", "CVE-2024-26778", "CVE-2024-26779", "CVE-2024-26781", "CVE-2024-26782", "CVE-2024-26787", "CVE-2024-26788", "CVE-2024-26790", "CVE-2024-26791", "CVE-2024-26793", "CVE-2024-26795", "CVE-2024-26801", "CVE-2024-26804", "CVE-2024-26805", "CVE-2024-26808", "CVE-2024-26809", "CVE-2024-26810", "CVE-2024-26812", "CVE-2024-26813", "CVE-2024-26814", "CVE-2024-26816", "CVE-2024-26817", "CVE-2024-26820", "CVE-2024-26825", "CVE-2024-26833", "CVE-2024-26835", "CVE-2024-26839", "CVE-2024-26840", "CVE-2024-26843", "CVE-2024-26845", "CVE-2024-26846", "CVE-2024-26848", "CVE-2024-26851", "CVE-2024-26852", "CVE-2024-26855", "CVE-2024-26857", "CVE-2024-26859", "CVE-2024-26861", "CVE-2024-26862", "CVE-2024-26863", "CVE-2024-26870", "CVE-2024-26872", "CVE-2024-26874", "CVE-2024-26875", "CVE-2024-26877", "CVE-2024-26878", "CVE-2024-26880", "CVE-2024-26882", "CVE-2024-26883", "CVE-2024-26884", "CVE-2024-26885", "CVE-2024-26889", "CVE-2024-26891", "CVE-2024-26894", "CVE-2024-26895", "CVE-2024-26897", "CVE-2024-26898", "CVE-2024-26901", "CVE-2024-26903", "CVE-2024-26906", "CVE-2024-26907", "CVE-2024-26910", "CVE-2024-26917", "CVE-2024-26922", "CVE-2024-26923", "CVE-2024-26924", "CVE-2024-26925", "CVE-2024-26926", "CVE-2024-26931", "CVE-2024-26934", "CVE-2024-26935", "CVE-2024-26937", "CVE-2024-26950", "CVE-2024-26951", "CVE-2024-26955", "CVE-2024-26956", "CVE-2024-26957", "CVE-2024-26958", "CVE-2024-26960", "CVE-2024-26961", "CVE-2024-26965", "CVE-2024-26966", "CVE-2024-26969", "CVE-2024-26970", "CVE-2024-26973", "CVE-2024-26974", "CVE-2024-26976", "CVE-2024-26978", "CVE-2024-26981", "CVE-2024-26984", "CVE-2024-26988", "CVE-2024-26993", "CVE-2024-26994", "CVE-2024-26997", "CVE-2024-26999", "CVE-2024-27000", "CVE-2024-27001", "CVE-2024-27004", "CVE-2024-27008", "CVE-2024-27013", "CVE-2024-27020", "CVE-2024-27024", "CVE-2024-27025", "CVE-2024-27028", "CVE-2024-27030", "CVE-2024-27038", "CVE-2024-27043", "CVE-2024-27044", "CVE-2024-27045", "CVE-2024-27046", "CVE-2024-27047", "CVE-2024-27051", "CVE-2024-27052", "CVE-2024-27053", "CVE-2024-27059", "CVE-2024-27065", "CVE-2024-27073", "CVE-2024-27074", "CVE-2024-27075", "CVE-2024-27076", "CVE-2024-27077", "CVE-2024-27078", "CVE-2024-27388", "CVE-2024-27395", "CVE-2024-27396", "CVE-2024-27405", "CVE-2024-27410", "CVE-2024-27412", "CVE-2024-27413", "CVE-2024-27414", "CVE-2024-27416", "CVE-2024-27417", "CVE-2024-27419", "CVE-2024-27431", "CVE-2024-27436", "CVE-2024-27437", "CVE-2024-35785", "CVE-2024-35789", "CVE-2024-35791", "CVE-2024-35796", "CVE-2024-35805", "CVE-2024-35806", "CVE-2024-35807", "CVE-2024-35809", "CVE-2024-35811", "CVE-2024-35813", "CVE-2024-35815", "CVE-2024-35819", "CVE-2024-35821", "CVE-2024-35822", "CVE-2024-35823", "CVE-2024-35825", "CVE-2024-35828", "CVE-2024-35829", "CVE-2024-35830", "CVE-2024-35833", "CVE-2024-35835", "CVE-2024-35837", "CVE-2024-35845", "CVE-2024-35847", "CVE-2024-35849", "CVE-2024-35852", "CVE-2024-35853", "CVE-2024-35854", "CVE-2024-35855", "CVE-2024-35871", "CVE-2024-35877", "CVE-2024-35879", "CVE-2024-35884", "CVE-2024-35886", "CVE-2024-35888", "CVE-2024-35893", "CVE-2024-35895", "CVE-2024-35896", "CVE-2024-35897", "CVE-2024-35898", "CVE-2024-35899", "CVE-2024-35900", "CVE-2024-35902", "CVE-2024-35905", "CVE-2024-35910", "CVE-2024-35915", "CVE-2024-35922", "CVE-2024-35925", "CVE-2024-35930", "CVE-2024-35933", "CVE-2024-35934", "CVE-2024-35935", "CVE-2024-35936", "CVE-2024-35940", "CVE-2024-35944", "CVE-2024-35950", "CVE-2024-35955", "CVE-2024-35958", "CVE-2024-35960", "CVE-2024-35962", "CVE-2024-35967", "CVE-2024-35969", "CVE-2024-35973", "CVE-2024-35976", "CVE-2024-35978", "CVE-2024-35982", "CVE-2024-35983", "CVE-2024-35984", "CVE-2024-35988", "CVE-2024-35990", "CVE-2024-35996", "CVE-2024-35997", "CVE-2024-36004", "CVE-2024-36005", "CVE-2024-36006", "CVE-2024-36007", "CVE-2024-36008", "CVE-2024-36020");
  script_tag(name:"creation_date", value:"2024-06-26 04:25:24 +0000 (Wed, 26 Jun 2024)");
  script_version("2024-06-26T05:05:39+0000");
  script_tag(name:"last_modification", value:"2024-06-26 05:05:39 +0000 (Wed, 26 Jun 2024)");
  script_tag(name:"cvss_base", value:"7.7");
  script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:S/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-03-15 14:21:29 +0000 (Fri, 15 Mar 2024)");

  script_name("Debian: Security Advisory (DLA-3842-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Debian Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB10");

  script_xref(name:"Advisory-ID", value:"DLA-3842-1");
  script_xref(name:"URL", value:"https://www.debian.org/lts/security/2024/DLA-3842-1");

  script_tag(name:"summary", value:"The remote host is missing an update for the Debian 'linux-5.10' package(s) announced via the DLA-3842-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"affected", value:"'linux-5.10' package(s) on Debian 10.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "DEB10") {

  if(!isnull(res = isdpkgvuln(pkg:"linux-config-5.10", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-doc-5.10", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10-armmp-lpae", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10-rt-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-686", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-686-pae", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-amd64", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-arm64", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-armmp-lpae", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-cloud-amd64", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-cloud-arm64", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-common", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-common-rt", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-rt-686-pae", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-rt-amd64", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-rt-arm64", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-headers-5.10.0-0.deb10.29-rt-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-686-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-686-pae-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-amd64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-amd64-signed-template", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-arm64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-arm64-signed-template", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-armmp-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-armmp-lpae", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-armmp-lpae-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-cloud-amd64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-cloud-arm64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-i386-signed-template", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-rt-686-pae-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-rt-amd64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-rt-arm64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-rt-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10-rt-armmp-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-686-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-686-pae-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-686-pae-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-686-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-amd64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-amd64-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-arm64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-arm64-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-armmp-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-armmp-lpae", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-armmp-lpae-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-cloud-amd64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-cloud-amd64-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-cloud-arm64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-cloud-arm64-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-686-pae-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-686-pae-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-amd64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-amd64-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-arm64-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-arm64-unsigned", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-armmp", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.10.0-0.deb10.29-rt-armmp-dbg", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-kbuild-5.10", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-perf-5.10", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-source-5.10", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-support-5.10.0-0.deb10.29", ver:"5.10.216-1~deb10u1", rls:"DEB10"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%