Debian DLA-2714-1 : linux-4.19 - LTS security update - Nessus

High   Plugin ID: 153148

This page contains detailed information about the Debian DLA-2714-1 : linux-4.19 - LTS security update Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 153148
Name: Debian DLA-2714-1 : linux-4.19 - LTS security update
Filename: debian_DLA-2714.nasl
Vulnerability Published: 2021-04-07
This Plugin Published: 2021-09-08
Last Modification Time: 2022-03-14
Plugin Version: 1.6
Plugin Type: local
Plugin Family: Debian Local Security Checks
Dependencies: ssh_get_info.nasl
Required KB Items [?]: Host/Debian/dpkg-l, Host/Debian/release, Host/local_checks_enabled

Vulnerability Information


Severity: High
Vulnerability Published: 2021-04-07
Patch Published: 2021-07-20
CVE [?]: CVE-2020-36311, CVE-2021-3609, CVE-2021-33909, CVE-2021-34693
CPE [?]: cpe:/o:debian:debian_linux:9.0, p-cpe:/a:debian:debian_linux:linux-config-4.19, p-cpe:/a:debian:debian_linux:linux-doc-4.19, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rpi, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-common, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rpi, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-common, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rpi, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-common, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rpi, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-common, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rpi, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-common, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rpi, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-common, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rpi, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rpi, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rpi, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rpi, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rpi, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rpi, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rpi, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-4.19, p-cpe:/a:debian:debian_linux:linux-perf-4.19, p-cpe:/a:debian:debian_linux:linux-source-4.19, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.10, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.11, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.12, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.13, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.14, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.16, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.17
Exploited by Malware: True

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-2714 advisory.

- fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. (CVE-2021-33909)

- An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184. (CVE-2020-36311)

- .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root. (CVE-2021-3609)

- net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade the linux-4.19 packages.

For Debian 9 stretch, these problems have been fixed in version 4.19.194-3~deb9u1.

Public Exploits


Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (GitHub)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the Debian DLA-2714-1 : linux-4.19 - LTS security update vulnerability:

  1. GitHub: https://github.com/xairy/linux-kernel-exploitation
    [CVE-2021-3609]
  2. GitHub: https://github.com/AlAIAL90/CVE-2021-33909
    [CVE-2021-33909: PoC for exploiting CVE-2021-33909 : fs/seq_file.c in the Linux kernel 3.16 through ...]
  3. GitHub: https://github.com/AmIAHuman/CVE-2021-33909
    [CVE-2021-33909: Sequoia exploit (7/20/21)]
  4. GitHub: https://github.com/ChoKyuWon/exploit_articles
    [CVE-2021-33909]
  5. GitHub: https://github.com/EGI-Federation/SVG-advisories
    [CVE-2021-33909]
  6. GitHub: https://github.com/H0j3n/EzpzCheatSheet
    [CVE-2021-33909]
  7. GitHub: https://github.com/Mr-xn/Penetration_Testing_POC
    [CVE-2021-33909]
  8. GitHub: https://github.com/gitezri/LinuxVulnerabilities
    [CVE-2021-33909]
  9. GitHub: https://github.com/hac425xxx/heap-exploitation-in-real-world
    [CVE-2021-33909]
  10. GitHub: https://github.com/ikramimamoglu/AmIAHuman-CVE-2021-33909
    [CVE-2021-33909]
  11. GitHub: https://github.com/joydo/CVE-Writeups
    [CVE-2021-33909]
  12. GitHub: https://github.com/kaosagnt/ansible-everyday
    [CVE-2021-33909]
  13. GitHub: https://github.com/sfowl/deep-directory
    [CVE-2021-33909]
  14. GitHub: https://github.com/xairy/linux-kernel-exploitation
    [CVE-2021-33909]
  15. GitHub: https://github.com/baerwolf/cve-2021-33909
    [CVE-2021-33909: This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by ...]
  16. GitHub: https://github.com/bbinfosec43/CVE-2021-33909
    [CVE-2021-33909: Exploit code for CVE-2021-33909,Just a dump of removed https://github.com/AmIAHuman/ ...]
  17. GitHub: https://github.com/ChrisTheCoolHut/CVE-2021-33909
    [CVE-2021-33909: CVE-2021-33909 Sequoia]
  18. GitHub: https://github.com/Liang2580/CVE-2021-33909
    [CVE-2021-33909: Sequoia exploit (7/20/21)]

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS Score Source [?]: CVE-2021-33909
CVSS V2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C
CVSS Base Score:7.2 (High)
Impact Subscore:10.0
Exploitability Subscore:3.9
CVSS Temporal Score:6.3 (Medium)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:6.3 (Medium)
CVSS V3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
CVSS Base Score:7.8 (High)
Impact Subscore:5.9
Exploitability Subscore:1.8
CVSS Temporal Score:7.5 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:7.5 (High)
STIG Severity [?]: II
STIG Risk Rating: Medium

Go back to menu.

Plugin Source


This is the debian_DLA-2714.nasl nessus plugin source code. This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory dla-2714. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(153148);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/03/14");

  script_cve_id(
    "CVE-2020-36311",
    "CVE-2021-3609",
    "CVE-2021-33909",
    "CVE-2021-34693"
  );
  script_xref(name:"IAVA", value:"2021-A-0350");

  script_name(english:"Debian DLA-2714-1 : linux-4.19 - LTS security update");

  script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing one or more security-related updates.");
  script_set_attribute(attribute:"description", value:
"The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the
dla-2714 advisory.

  - fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer
    allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an
    unprivileged user, aka CID-8cae8cd89f05. (CVE-2021-33909)

  - An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a
    denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering
    many encrypted regions), aka CID-7be74942f184. (CVE-2020-36311)

  - .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse
    a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race
    condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
    (CVE-2021-3609)

  - net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from
    kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/linux-4.19");
  script_set_attribute(attribute:"see_also", value:"https://www.debian.org/lts/security/2021/dla-2714");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2020-36311");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2021-33909");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2021-34693");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2021-3609");
  script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/stretch/linux-4.19");
  script_set_attribute(attribute:"solution", value:
"Upgrade the linux-4.19 packages.

For Debian 9 stretch, these problems have been fixed in version 4.19.194-3~deb9u1.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-33909");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/04/07");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/07/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/09/08");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-config-4.19");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-doc-4.19");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-armhf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-all-i386");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-common-rt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.10-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-armel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-armhf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-all-i386");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-common-rt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.11-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-armel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-armhf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-all-i386");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-common-rt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.12-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-armel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-armhf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-all-i386");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-common-rt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.13-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-armel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-armhf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-all-i386");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-common-rt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.14-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-armel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-armhf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-all-i386");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-common-rt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.16-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-armel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-armhf");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-all-i386");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-common-rt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-0.bpo.17-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-armmp-lpae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-cloud-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-marvell-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rpi-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.10-rt-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-armmp-lpae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-cloud-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-marvell-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rpi-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.11-rt-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-armmp-lpae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-cloud-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-marvell-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rpi-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.12-rt-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-armmp-lpae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-cloud-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-marvell-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rpi-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.13-rt-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-armmp-lpae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-cloud-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-marvell-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rpi-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.14-rt-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-armmp-lpae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-cloud-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-marvell-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rpi-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.16-rt-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-armmp-lpae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-cloud-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-cloud-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-marvell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-marvell-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rpi");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rpi-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-686-pae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-686-pae-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-amd64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-amd64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-arm64");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-arm64-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-armmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-image-4.19.0-0.bpo.17-rt-armmp-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-kbuild-4.19");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-perf-4.19");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-source-4.19");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.10");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.11");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.12");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.13");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.14");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.16");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:linux-support-4.19.0-0.bpo.17");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Debian Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}

include('audit.inc');
include('debian_package.inc');

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);

var release = get_kb_item('Host/Debian/release');
if ( isnull(release) ) audit(AUDIT_OS_NOT, 'Debian');
var release = chomp(release);
if (! preg(pattern:"^(9)\.[0-9]+", string:release)) audit(AUDIT_OS_NOT, 'Debian 9.0', 'Debian ' + release);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);

var pkgs = [
    {'release': '9.0', 'prefix': 'linux-config-4.19', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-doc-4.19', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-all', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-all-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-all-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-all-armel', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-all-armhf', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-all-i386', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-common', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-common-rt', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.10-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-all', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-all-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-all-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-all-armel', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-all-armhf', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-all-i386', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-common', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-common-rt', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.11-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-all', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-all-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-all-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-all-armel', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-all-armhf', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-all-i386', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-common', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-common-rt', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.12-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-all', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-all-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-all-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-all-armel', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-all-armhf', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-all-i386', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-common', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-common-rt', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.13-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-all', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-all-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-all-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-all-armel', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-all-armhf', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-all-i386', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-common', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-common-rt', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.14-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-all', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-all-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-all-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-all-armel', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-all-armhf', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-all-i386', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-common', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-common-rt', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.16-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-all', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-all-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-all-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-all-armel', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-all-armhf', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-all-i386', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-common', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-common-rt', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-headers-4.19.0-0.bpo.17-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-686-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-armmp-lpae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-cloud-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-marvell-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rpi-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.10-rt-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-686-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-armmp-lpae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-cloud-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-marvell-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rpi-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.11-rt-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-686-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-armmp-lpae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-cloud-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-marvell-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rpi-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.12-rt-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-686-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-armmp-lpae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-cloud-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-marvell-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rpi-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.13-rt-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-686-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-armmp-lpae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-cloud-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-marvell-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rpi-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.14-rt-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-686-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-armmp-lpae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-cloud-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-marvell-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rpi-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.16-rt-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-686', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-686-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-armmp-lpae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-armmp-lpae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-cloud-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-cloud-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-marvell', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-marvell-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rpi', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rpi-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-686-pae', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-686-pae-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-amd64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-amd64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-arm64', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-arm64-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-armmp', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-image-4.19.0-0.bpo.17-rt-armmp-dbg', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-kbuild-4.19', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-perf-4.19', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-source-4.19', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-support-4.19.0-0.bpo.10', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-support-4.19.0-0.bpo.11', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-support-4.19.0-0.bpo.12', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-support-4.19.0-0.bpo.13', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-support-4.19.0-0.bpo.14', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-support-4.19.0-0.bpo.16', 'reference': '4.19.194-3~deb9u1'},
    {'release': '9.0', 'prefix': 'linux-support-4.19.0-0.bpo.17', 'reference': '4.19.194-3~deb9u1'}
];

var flag = 0;
foreach package_array ( pkgs ) {
  var release = NULL;
  var prefix = NULL;
  var reference = NULL;
  if (!empty_or_null(package_array['release'])) release = package_array['release'];
  if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];
  if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
  if (release && prefix && reference) {
    if (deb_check(release:release, prefix:prefix, reference:reference)) flag++;
  }
}

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_HOLE,
    extra      : deb_report_get()
  );
  exit(0);
}
else
{
  var tested = deb_pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'linux-config-4.19 / linux-doc-4.19 / linux-headers-4.19.0-0.bpo.10-686 / etc');
}

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/debian_DLA-2714.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\debian_DLA-2714.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/debian_DLA-2714.nasl

Go back to menu.

How to Run


Here is how to run the Debian DLA-2714-1 : linux-4.19 - LTS security update as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Debian Local Security Checks plugin family.
  6. On the right side table select Debian DLA-2714-1 : linux-4.19 - LTS security update plugin ID 153148.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl debian_DLA-2714.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a debian_DLA-2714.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - debian_DLA-2714.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state debian_DLA-2714.nasl -t <IP/HOST>

Go back to menu.

References


IAVA | Information Assurance Vulnerability Alert:
  • 2021-A-0350
See also: Similar and related Nessus plugins:
  • 152545 - SUSE SLES15 Security Update : kernel (SUSE-SU-2021:2678-1)
  • 152566 - SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2021:2687-1)
  • 152569 - openSUSE 15 Security Update : kernel (openSUSE-SU-2021:2687-1)
  • 152596 - CentOS 8 : kernel (CESA-2021:3057)
  • 152639 - Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-5045-1)
  • 152652 - SUSE SLES12 / SLES15 Security Update : kernel (Live Patch 16 for SLE 15 SP2) (SUSE-SU-2021:2746-1)
  • 152688 - RHEL 8 : Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7] (Important) (RHSA-2021:3235)
  • 152843 - SUSE SLES12 Security Update : kernel (Live Patch 34 for SLE 12 SP3) (SUSE-SU-2021:2842-1)
  • 152925 - RHEL 8 : kernel (RHSA-2021:3363)
  • 152931 - RHEL 8 : kernel-rt (RHSA-2021:3375)
  • 152940 - RHEL 8 : kpatch-patch (RHSA-2021:3380)
  • 153096 - RHEL 8 : kpatch-patch (RHSA-2021:3442)
  • 153103 - RHEL 8 : kernel (RHSA-2021:3444)
  • 153127 - Ubuntu 21.04 : Linux kernel (KVM) vulnerabilities (USN-4997-2)
  • 153129 - Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel vulnerabilities (USN-5017-1)
  • 153130 - Ubuntu 16.04 LTS / 18.04 LTS / 21.04 : Linux kernel vulnerability (USN-5014-1)
  • 153131 - Ubuntu 20.04 LTS : Linux kernel (KVM) vulnerabilities (USN-5000-2)
  • 153172 - Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2021-9442)
  • 153174 - Ubuntu 20.04 LTS / 21.04 : Linux kernel vulnerabilities (USN-5070-1)
  • 153177 - Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-5073-1)
  • 153178 - Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel vulnerabilities (USN-5071-1)
  • 153221 - OracleVM 3.4 : kernel-uek (OVMSA-2021-0030)
  • 153271 - EulerOS 2.0 SP2 : kernel (EulerOS-SA-2021-2392)
  • 153442 - Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2021-9450)
  • 153443 - Oracle Linux 7 / 8 : Unbreakable Enterprise kernel-container (ELSA-2021-9451)
  • 153445 - Ubuntu 18.04 LTS : Linux kernel (HWE) vulnerabilities (USN-5071-2)
  • 153449 - Ubuntu 20.04 LTS : Linux kernel (OEM) vulnerabilities (USN-5082-1)
  • 153476 - Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel (GCP) vulnerabilities (USN-5073-2)
  • 153527 - Ubuntu 18.04 LTS : Linux kernel (Raspberry Pi) vulnerabilities (USN-5073-3)
  • 153610 - EulerOS 2.0 SP8 : kernel (EulerOS-SA-2021-2465)
  • 153692 - EulerOS 2.0 SP5 : kernel (EulerOS-SA-2021-2502)
  • 153703 - EulerOS 2.0 SP9 : kernel (EulerOS-SA-2021-2530)
  • 153860 - Amazon Linux AMI : kernel (ALAS-2021-1539)
  • 154000 - EulerOS 2.0 SP9 : kernel (EulerOS-SA-2021-2569)

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file debian_DLA-2714.nasl version 1.6. For more plugins, visit the Nessus Plugin Library.

Go back to menu.