[+] Kernel vulnerability identification and verification


[+] Identified kernel version: 5.10.52
[-] No kernel configuration file with matching elf file found for kernel 5.10.52.
[+] Found kernel elf file with init entry: /logs/firmware/patool_extraction/rootfs.img_unblob_extracted/rootfs.img_extract/0-50593792.squashfs_v4_le_extract/boot/zImage-5.10.52-axis8_extract/17760-4189147.gzip_extract/gzip.uncompressed_extract/0-10671360.unknown.elf
[+] Identified kernel architecture arm
[*] Kernel sources for version 5.10.52 available
[*] Kernel version 5.10.52 extraction ... 

==> Version based vulnerability detection

[*] Extract CVE data for kernel version 5.10.52
[*] Create CVE vulnerabilities array for kernel version 5.10.52 ...

[+] Extracted 470 vulnerabilities based on kernel version only


==> Identify kernel symbols ...

[*] Extracted 27307 symbols from kernel
[*] Identify kernel modules symbols ...

[+] Extracted 31259 unique symbols

[*] Splitting symbols file for processing

==> Linux kernel vulnerability verification


[*] Checking vulnerabilities for kernel version 5.10.52

[*] Testing vulnerability 1 / 470 / CVE-2020-26558
[-] CVE-2020-26558 - missing vulnerability path from advisory
[*] Testing vulnerability 2 / 470 / CVE-2022-1199
[-] CVE-2022-1199 - missing vulnerability path from advisory
[*] Testing vulnerability 3 / 470 / CVE-2021-20322
[-] CVE-2021-20322 - missing vulnerability path from advisory
[*] Testing vulnerability 4 / 470 / CVE-2022-25258
[*] Testing vulnerability 5 / 470 / CVE-2021-3753
[*] Testing vulnerability 6 / 470 / CVE-2021-4203
[*] Testing vulnerability 7 / 470 / CVE-2022-36879
[*] Testing vulnerability 8 / 470 / CVE-2022-36946
[*] Testing vulnerability 9 / 470 / CVE-2022-43945
[-] CVE-2022-43945 - missing vulnerability path from advisory
[*] Testing vulnerability 10 / 470 / CVE-2022-26966
[*] Testing vulnerability 11 / 470 / CVE-2022-27223
[+] CVE-2021-4203 (4.9/6.8) - net/core/sock.c verified - exported symbol
[*] Testing vulnerability 12 / 470 / CVE-2022-28796
[*] Testing vulnerability 13 / 470 / CVE-2022-3649
[*] Testing vulnerability 14 / 470 / CVE-2021-23133
[-] CVE-2021-23133 - missing vulnerability path from advisory
[*] Testing vulnerability 15 / 470 / CVE-2021-27363
[-] CVE-2021-27363 - missing vulnerability path from advisory
[*] Testing vulnerability 16 / 470 / CVE-2021-28038
[-] CVE-2021-28038 - missing vulnerability path from advisory
[*] Testing vulnerability 17 / 470 / CVE-2021-28691
[-] CVE-2021-28691 - missing vulnerability path from advisory
[*] Testing vulnerability 18 / 470 / CVE-2021-28951
[+] CVE-2022-36879 (null/5.5) - net/xfrm/xfrm_policy.c verified - exported symbol
[*] Testing vulnerability 19 / 470 / CVE-2021-28971
[-] Vulnerable path for different architecture found for arch/x86/events/intel/ds.c - not further processing CVE-2021-28971
[*] Testing vulnerability 20 / 470 / CVE-2021-28952
[*] Testing vulnerability 21 / 470 / CVE-2021-28964
[*] Testing vulnerability 22 / 470 / CVE-2021-28972
[*] Testing vulnerability 23 / 470 / CVE-2021-3506
[+] CVE-2022-28796 (6.9/7) - fs/jbd2/transaction.c verified - exported symbol
[*] Testing vulnerability 24 / 470 / CVE-2021-3483
[+] CVE-2021-28951 (4.9/5.5) - fs/io_uring.c verified - exported symbol
[-] CVE-2021-3483 - missing vulnerability path from advisory
[*] Testing vulnerability 25 / 470 / CVE-2021-3501
[-] CVE-2021-3501 - missing vulnerability path from advisory
[*] Testing vulnerability 26 / 470 / CVE-2021-32399
[*] Testing vulnerability 27 / 470 / CVE-2021-38300
[-] Vulnerable path for different architecture found for arch/mips/net/bpf_jit.c - not further processing CVE-2021-38300
[*] Testing vulnerability 28 / 470 / CVE-2021-41864
[*] Testing vulnerability 29 / 470 / CVE-2021-43976
[*] Testing vulnerability 30 / 470 / CVE-2021-41073
[*] Testing vulnerability 31 / 470 / CVE-2021-43975
[*] Testing vulnerability 32 / 470 / CVE-2021-45485
[*] Testing vulnerability 33 / 470 / CVE-2021-3772
[-] CVE-2021-3772 - missing vulnerability path from advisory
[*] Testing vulnerability 34 / 470 / CVE-2021-38199
[*] Testing vulnerability 35 / 470 / CVE-2021-38201
[+] CVE-2021-41073 (7.2/7.8) - fs/io_uring.c verified - exported symbol
[*] Testing vulnerability 36 / 470 / CVE-2021-38202
[*] Testing vulnerability 37 / 470 / CVE-2021-38203
[-] CVE-2021-38203 - missing vulnerability path from advisory
[*] Testing vulnerability 38 / 470 / CVE-2021-38160
[*] Testing vulnerability 39 / 470 / CVE-2022-28390
[*] Testing vulnerability 40 / 470 / CVE-2023-23559
[+] CVE-2021-45485 (5/7.5) - net/ipv6/output_core.c verified - exported symbol
[*] Testing vulnerability 41 / 470 / CVE-2022-41858
[-] CVE-2022-41858 - missing vulnerability path from advisory
[*] Testing vulnerability 42 / 470 / CVE-2021-4083
[-] CVE-2021-4083 - missing vulnerability path from advisory
[*] Testing vulnerability 43 / 470 / CVE-2022-0492
[*] Testing vulnerability 44 / 470 / CVE-2022-28893
[-] CVE-2022-28893 - missing vulnerability path from advisory
[*] Testing vulnerability 45 / 470 / CVE-2022-30594
[-] CVE-2022-30594 - missing vulnerability path from advisory
[*] Testing vulnerability 46 / 470 / CVE-2022-29968
[*] Testing vulnerability 47 / 470 / CVE-2021-4197
[-] CVE-2021-4197 - missing vulnerability path from advisory
[*] Testing vulnerability 48 / 470 / CVE-2022-0322
[*] Testing vulnerability 49 / 470 / CVE-2022-1011
[-] CVE-2022-1011 - missing vulnerability path from advisory
[*] Testing vulnerability 50 / 470 / CVE-2021-37159
[*] Testing vulnerability 51 / 470 / CVE-2021-3773
[-] CVE-2021-3773 - missing vulnerability path from advisory
[*] Testing vulnerability 52 / 470 / CVE-2021-3744
[+] CVE-2022-29968 (4.6/7.8) - fs/io_uring.c verified - exported symbol
[-] CVE-2021-3744 - missing vulnerability path from advisory
[*] Testing vulnerability 53 / 470 / CVE-2021-3752
[-] CVE-2021-3752 - missing vulnerability path from advisory
[*] Testing vulnerability 54 / 470 / CVE-2021-43389
[-] CVE-2021-43389 - missing vulnerability path from advisory
[*] Testing vulnerability 55 / 470 / CVE-2021-42739
[-] CVE-2021-42739 - missing vulnerability path from advisory
[*] Testing vulnerability 56 / 470 / CVE-2021-4002
[-] CVE-2021-4002 - missing vulnerability path from advisory
[*] Testing vulnerability 57 / 470 / CVE-2021-45486
[*] Testing vulnerability 58 / 470 / CVE-2021-27365
[-] CVE-2021-27365 - missing vulnerability path from advisory
[*] Testing vulnerability 59 / 470 / CVE-2021-27364
[*] Testing vulnerability 60 / 470 / CVE-2022-0847
[-] CVE-2022-0847 - missing vulnerability path from advisory
[*] Testing vulnerability 61 / 470 / CVE-2022-0330
[-] CVE-2022-0330 - missing vulnerability path from advisory
[*] Testing vulnerability 62 / 470 / CVE-2021-3656
[-] CVE-2021-3656 - missing vulnerability path from advisory
[*] Testing vulnerability 63 / 470 / CVE-2021-3609
[*] Testing vulnerability 64 / 470 / CVE-2022-0516
[-] Vulnerable path for different architecture found for arch/s390/kvm/kvm-s390.c - not further processing CVE-2022-0516
[*] Testing vulnerability 65 / 470 / CVE-2021-3659
[-] CVE-2021-3659 - missing vulnerability path from advisory
[+] CVE-2021-45486 (2.7/3.5) - net/ipv4/route.c verified - exported symbol
[*] Testing vulnerability 66 / 470 / CVE-2022-0435
[-] CVE-2022-0435 - missing vulnerability path from advisory
[*] Testing vulnerability 67 / 470 / CVE-2021-20194
[-] CVE-2021-20194 - missing vulnerability path from advisory
[*] Testing vulnerability 68 / 470 / CVE-2020-25639
[-] CVE-2020-25639 - missing vulnerability path from advisory
[*] Testing vulnerability 69 / 470 / CVE-2022-2078
[-] CVE-2022-2078 - missing vulnerability path from advisory
[*] Testing vulnerability 70 / 470 / CVE-2022-27666
[*] Testing vulnerability 71 / 470 / CVE-2022-3643
[-] CVE-2022-3643 - missing vulnerability path from advisory
[*] Testing vulnerability 72 / 470 / CVE-2020-35508
[-] CVE-2020-35508 - missing vulnerability path from advisory
[*] Testing vulnerability 73 / 470 / CVE-2021-40490
[*] Testing vulnerability 74 / 470 / CVE-2022-1048
[-] CVE-2022-1048 - missing vulnerability path from advisory
[*] Testing vulnerability 75 / 470 / CVE-2022-0995
[-] CVE-2022-0995 - missing vulnerability path from advisory
[*] Testing vulnerability 76 / 470 / CVE-2022-1353
[*] Testing vulnerability 77 / 470 / CVE-2022-25265
[-] CVE-2022-25265 - missing vulnerability path from advisory
[*] Testing vulnerability 78 / 470 / CVE-2021-3739
[*] Testing vulnerability 79 / 470 / CVE-2021-3760
[-] CVE-2021-3760 - missing vulnerability path from advisory
[*] Testing vulnerability 80 / 470 / CVE-2021-44733
[*] Testing vulnerability 81 / 470 / CVE-2022-0185
[-] CVE-2022-0185 - missing vulnerability path from advisory
[*] Testing vulnerability 82 / 470 / CVE-2022-0500
[-] CVE-2022-0500 - missing vulnerability path from advisory
[*] Testing vulnerability 83 / 470 / CVE-2022-0998
[-] CVE-2022-0998 - missing vulnerability path from advisory
[*] Testing vulnerability 84 / 470 / CVE-2022-1055
[-] CVE-2022-1055 - missing vulnerability path from advisory
[*] Testing vulnerability 85 / 470 / CVE-2022-1734
[*] Testing vulnerability 86 / 470 / CVE-2022-23222
[*] Testing vulnerability 87 / 470 / CVE-2022-24958
[*] Testing vulnerability 88 / 470 / CVE-2022-26490
[*] Testing vulnerability 89 / 470 / CVE-2022-28389
[*] Testing vulnerability 90 / 470 / CVE-2022-29156
[*] Testing vulnerability 91 / 470 / CVE-2022-28388
[*] Testing vulnerability 92 / 470 / CVE-2022-29581
[-] CVE-2022-29581 - missing vulnerability path from advisory
[*] Testing vulnerability 93 / 470 / CVE-2021-34866
[-] CVE-2021-34866 - missing vulnerability path from advisory
[*] Testing vulnerability 94 / 470 / CVE-2021-3640
[-] CVE-2021-3640 - missing vulnerability path from advisory
[*] Testing vulnerability 95 / 470 / CVE-2021-42008
[*] Testing vulnerability 96 / 470 / CVE-2021-4090
[-] CVE-2021-4090 - missing vulnerability path from advisory
[*] Testing vulnerability 97 / 470 / CVE-2021-42252
[*] Testing vulnerability 98 / 470 / CVE-2021-42327
[+] CVE-2021-44733 (4.4/7) - drivers/tee/tee_shm.c verified - exported symbol (gpl)
[*] Testing vulnerability 99 / 470 / CVE-2021-43267
[*] Testing vulnerability 100 / 470 / CVE-2021-45868
[*] Testing vulnerability 101 / 470 / CVE-2021-45469
[*] Testing vulnerability 102 / 470 / CVE-2023-1380
[*] Testing vulnerability 103 / 470 / CVE-2022-1671
[-] CVE-2022-1671 - net/rxrpc/server_key.c - vulnerable source file not found in kernel sources
[+] CVE-2021-45868 (4.3/5.5) - kernel/locking/rwsem.c verified - exported symbol
[*] Testing vulnerability 104 / 470 / CVE-2022-1786
[-] CVE-2022-1786 - missing vulnerability path from advisory
[*] Testing vulnerability 105 / 470 / CVE-2022-1652
[-] CVE-2022-1652 - missing vulnerability path from advisory
[*] Testing vulnerability 106 / 470 / CVE-2022-1973
[-] CVE-2022-1973 - fs/ntfs3/fslog.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 107 / 470 / CVE-2022-1998
[-] CVE-2022-1998 - missing vulnerability path from advisory
[*] Testing vulnerability 108 / 470 / CVE-2021-22600
[*] Testing vulnerability 109 / 470 / CVE-2022-2318
[*] Testing vulnerability 110 / 470 / CVE-2023-26545
[*] Testing vulnerability 111 / 470 / CVE-2022-2873
[-] CVE-2022-2873 - missing vulnerability path from advisory
[*] Testing vulnerability 112 / 470 / CVE-2022-2938
[-] CVE-2022-2938 - missing vulnerability path from advisory
[*] Testing vulnerability 113 / 470 / CVE-2022-2961
[-] CVE-2022-2961 - missing vulnerability path from advisory
[*] Testing vulnerability 114 / 470 / CVE-2022-2964
[-] CVE-2022-2964 - missing vulnerability path from advisory
[*] Testing vulnerability 115 / 470 / CVE-2022-3202
[*] Testing vulnerability 116 / 470 / CVE-2022-32250
[*] Testing vulnerability 117 / 470 / CVE-2022-34918
[-] CVE-2022-34918 - missing vulnerability path from advisory
[*] Testing vulnerability 118 / 470 / CVE-2022-3545
[*] Testing vulnerability 119 / 470 / CVE-2022-36123
[-] CVE-2022-36123 - missing vulnerability path from advisory
[*] Testing vulnerability 120 / 470 / CVE-2022-45886
[*] Testing vulnerability 121 / 470 / CVE-2022-47520
[*] Testing vulnerability 122 / 470 / CVE-2022-45884
[*] Testing vulnerability 123 / 470 / CVE-2022-45888
[-] CVE-2022-45888 - drivers/char/xillybus/xillyusb.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 124 / 470 / CVE-2022-45887
[*] Testing vulnerability 125 / 470 / CVE-2022-45885
[*] Testing vulnerability 126 / 470 / CVE-2022-45919
[-] CVE-2022-45919 - missing vulnerability path from advisory
[*] Testing vulnerability 127 / 470 / CVE-2022-45934
[*] Testing vulnerability 128 / 470 / CVE-2022-47521
[*] Testing vulnerability 129 / 470 / CVE-2022-47518
[*] Testing vulnerability 130 / 470 / CVE-2022-47519
[*] Testing vulnerability 131 / 470 / CVE-2018-1000026
[-] CVE-2018-1000026 - missing vulnerability path from advisory
[*] Testing vulnerability 132 / 470 / CVE-2020-16120
[-] CVE-2020-16120 - missing vulnerability path from advisory
[*] Testing vulnerability 133 / 470 / CVE-2020-27170
[*] Testing vulnerability 134 / 470 / CVE-2020-27171
[*] Testing vulnerability 135 / 470 / CVE-2019-3819
[*] Testing vulnerability 136 / 470 / CVE-2019-3887
[-] CVE-2019-3887 - missing vulnerability path from advisory
[*] Testing vulnerability 137 / 470 / CVE-2023-0458
[-] CVE-2023-0458 - missing vulnerability path from advisory
[*] Testing vulnerability 138 / 470 / CVE-2022-0171
[-] CVE-2022-0171 - missing vulnerability path from advisory
[*] Testing vulnerability 139 / 470 / CVE-2022-0617
[-] CVE-2022-0617 - missing vulnerability path from advisory
[*] Testing vulnerability 140 / 470 / CVE-2022-0494
[*] Testing vulnerability 141 / 470 / CVE-2022-0854
[-] CVE-2022-0854 - missing vulnerability path from advisory
[*] Testing vulnerability 142 / 470 / CVE-2023-1998
[-] CVE-2023-1998 - missing vulnerability path from advisory
[*] Testing vulnerability 143 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 144 / 470 / This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.
[-] This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects. - missing vulnerability path from advisory
[*] Testing vulnerability 145 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 146 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 147 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 148 / 470 / CVE-2022-1195
[-] CVE-2022-1195 - missing vulnerability path from advisory
[*] Testing vulnerability 149 / 470 / CVE-2022-1204
[-] CVE-2022-1204 - missing vulnerability path from advisory
[*] Testing vulnerability 150 / 470 / CVE-2021-20321
[-] CVE-2021-20321 - missing vulnerability path from advisory
[*] Testing vulnerability 151 / 470 / CVE-2022-2153
[-] CVE-2022-2153 - missing vulnerability path from advisory
[*] Testing vulnerability 152 / 470 / CVE-2022-24448
[*] Testing vulnerability 153 / 470 / CVE-2022-24959
[-] CVE-2022-24959 - missing vulnerability path from advisory
[*] Testing vulnerability 154 / 470 / CVE-2022-25375
[*] Testing vulnerability 155 / 470 / CVE-2022-26365
[-] CVE-2022-26365 - missing vulnerability path from advisory
[*] Testing vulnerability 156 / 470 / CVE-2021-28714
[-] CVE-2021-28714 - missing vulnerability path from advisory
[*] Testing vulnerability 157 / 470 / CVE-2021-28715
[-] CVE-2021-28715 - missing vulnerability path from advisory
[*] Testing vulnerability 158 / 470 / CVE-2022-28356
[-] CVE-2022-28356 - missing vulnerability path from advisory
[*] Testing vulnerability 159 / 470 / CVE-2022-2905
[-] CVE-2022-2905 - missing vulnerability path from advisory
[*] Testing vulnerability 160 / 470 / CVE-2022-3028
[-] CVE-2022-3028 - missing vulnerability path from advisory
[*] Testing vulnerability 161 / 470 / CVE-2022-2978
[-] CVE-2022-2978 - missing vulnerability path from advisory
[*] Testing vulnerability 162 / 470 / CVE-2021-34693
[*] Testing vulnerability 163 / 470 / CVE-2021-33655
[-] CVE-2021-33655 - missing vulnerability path from advisory
[*] Testing vulnerability 164 / 470 / CVE-2021-33656
[-] CVE-2021-33656 - missing vulnerability path from advisory
[*] Testing vulnerability 165 / 470 / CVE-2022-3176
[-] CVE-2022-3176 - missing vulnerability path from advisory
[*] Testing vulnerability 166 / 470 / CVE-2021-3679
[-] CVE-2021-3679 - missing vulnerability path from advisory
[*] Testing vulnerability 167 / 470 / CVE-2022-3635
[*] Testing vulnerability 168 / 470 / CVE-2022-33981
[*] Testing vulnerability 169 / 470 / CVE-2022-3303
[-] CVE-2022-3303 - missing vulnerability path from advisory
[*] Testing vulnerability 170 / 470 / CVE-2022-3586
[-] CVE-2022-3586 - missing vulnerability path from advisory
[*] Testing vulnerability 171 / 470 / CVE-2021-4037
[-] CVE-2021-4037 - missing vulnerability path from advisory
[*] Testing vulnerability 172 / 470 / CVE-2022-3594
[*] Testing vulnerability 173 / 470 / CVE-2022-3521
[*] Testing vulnerability 174 / 470 / CVE-2022-39188
[*] Testing vulnerability 175 / 470 / CVE-2022-39190
[*] Testing vulnerability 176 / 470 / CVE-2022-40307
[*] Testing vulnerability 177 / 470 / CVE-2021-45095
[*] Testing vulnerability 178 / 470 / CVE-2022-39842
[-] CVE-2022-39842 - missing vulnerability path from advisory
[*] Testing vulnerability 179 / 470 / CVE-2021-45480
[*] Testing vulnerability 180 / 470 / CVE-2022-40768
[*] Testing vulnerability 181 / 470 / CVE-2022-3625
[*] Testing vulnerability 182 / 470 / CVE-2022-41222
[*] Testing vulnerability 183 / 470 / CVE-2022-42720
[-] CVE-2022-42720 - missing vulnerability path from advisory
[*] Testing vulnerability 184 / 470 / CVE-2022-41849
[*] Testing vulnerability 185 / 470 / CVE-2022-41850
[*] Testing vulnerability 186 / 470 / CVE-2022-41674
[-] CVE-2022-41674 - missing vulnerability path from advisory
[*] Testing vulnerability 187 / 470 / CVE-2022-42329
[-] CVE-2022-42329 - missing vulnerability path from advisory
[*] Testing vulnerability 188 / 470 / CVE-2022-42328
[-] CVE-2022-42328 - missing vulnerability path from advisory
[*] Testing vulnerability 189 / 470 / CVE-2022-42721
[-] CVE-2022-42721 - missing vulnerability path from advisory
[*] Testing vulnerability 190 / 470 / CVE-2022-42719
[-] CVE-2022-42719 - missing vulnerability path from advisory
[*] Testing vulnerability 191 / 470 / CVE-2022-42722
[-] CVE-2022-42722 - missing vulnerability path from advisory
[*] Testing vulnerability 192 / 470 / CVE-2022-43750
[*] Testing vulnerability 193 / 470 / CVE-2022-33740
[-] CVE-2022-33740 - missing vulnerability path from advisory
[*] Testing vulnerability 194 / 470 / CVE-2022-33741
[-] CVE-2022-33741 - missing vulnerability path from advisory
[*] Testing vulnerability 195 / 470 / CVE-2022-33742
[-] CVE-2022-33742 - missing vulnerability path from advisory
[*] Testing vulnerability 196 / 470 / CVE-2022-33744
[-] CVE-2022-33744 - missing vulnerability path from advisory
[*] Testing vulnerability 197 / 470 / CVE-2022-0487
[*] Testing vulnerability 198 / 470 / CVE-2023-23455
[*] Testing vulnerability 199 / 470 / CVE-2023-23454
[*] Testing vulnerability 200 / 470 / CVE-2022-29582
[*] Testing vulnerability 201 / 470 / CVE-2022-41218
[*] Testing vulnerability 202 / 470 / CVE-2022-36280
[-] CVE-2022-36280 - drivers/gpu/vmxgfx/vmxgfx_kms.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 203 / 470 / CVE-2022-47929
[-] CVE-2022-47929 - missing vulnerability path from advisory
[*] Testing vulnerability 204 / 470 / CVE-2022-33743
[-] CVE-2022-33743 - missing vulnerability path from advisory
[*] Testing vulnerability 205 / 470 / CVE-2021-38166
[*] Testing vulnerability 206 / 470 / CVE-2023-3090
[+] CVE-2022-29582 (6.9/7) - fs/io_uring.c verified - exported symbol
[-] CVE-2023-3090 - missing vulnerability path from advisory
[*] Testing vulnerability 207 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 208 / 470 / The out-of-bounds write is caused by missing skb->cb  initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.
[-] The out-of-bounds write is caused by missing skb->cb  initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. - missing vulnerability path from advisory
[*] Testing vulnerability 209 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 210 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 211 / 470 / We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.
[-] We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e. - missing vulnerability path from advisory
[*] Testing vulnerability 212 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 213 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 214 / 470 / CVE-2021-23134
[-] CVE-2021-23134 - missing vulnerability path from advisory
[*] Testing vulnerability 215 / 470 / CVE-2021-28950
[*] Testing vulnerability 216 / 470 / CVE-2021-29155
[*] Testing vulnerability 217 / 470 / CVE-2021-29264
[*] Testing vulnerability 218 / 470 / CVE-2021-30002
[*] Testing vulnerability 219 / 470 / CVE-2021-29650
[*] Testing vulnerability 220 / 470 / CVE-2021-29265
[*] Testing vulnerability 221 / 470 / CVE-2021-29647
[*] Testing vulnerability 222 / 470 / CVE-2021-31829
[*] Testing vulnerability 223 / 470 / CVE-2021-31916
[*] Testing vulnerability 224 / 470 / CVE-2021-34556
[-] CVE-2021-34556 - missing vulnerability path from advisory
[*] Testing vulnerability 225 / 470 / CVE-2021-33624
[*] Testing vulnerability 226 / 470 / CVE-2021-33034
[*] Testing vulnerability 227 / 470 / CVE-2021-3564
[-] CVE-2021-3564 - missing vulnerability path from advisory
[*] Testing vulnerability 228 / 470 / CVE-2021-35477
[+] CVE-2021-29650 (4.9/5.5) - net/netfilter/x_tables.c verified - exported symbol
[-] CVE-2021-35477 - missing vulnerability path from advisory
[*] Testing vulnerability 229 / 470 / CVE-2021-3653
[-] CVE-2021-3653 - missing vulnerability path from advisory
[*] Testing vulnerability 230 / 470 / CVE-2021-3655
[-] CVE-2021-3655 - missing vulnerability path from advisory
[*] Testing vulnerability 231 / 470 / CVE-2021-38198
[-] Vulnerable path for different architecture found for arch/x86/kvm/mmu/paging_tmpl.h - not further processing CVE-2021-38198
[*] Testing vulnerability 232 / 470 / CVE-2021-38204
[*] Testing vulnerability 233 / 470 / CVE-2021-38205
[*] Testing vulnerability 234 / 470 / CVE-2021-4149
[*] Testing vulnerability 235 / 470 / CVE-2021-29649
[*] Testing vulnerability 236 / 470 / CVE-2021-29646
[*] Testing vulnerability 237 / 470 / CVE-2021-30178
[-] Vulnerable path for different architecture found for arch/x86/kvm/hyperv.c - not further processing CVE-2021-30178
[*] Testing vulnerability 238 / 470 / CVE-2021-29648
[+] CVE-2021-31916 (6.1/6.7) - drivers/md/dm-ioctl.c verified - exported symbol (gpl)
[*] Testing vulnerability 239 / 470 / CVE-2021-37576
[-] Vulnerable path for different architecture found for arch/powerpc/kvm/book3s_rtas.c - not further processing CVE-2021-37576
[*] Testing vulnerability 240 / 470 / CVE-2021-20320
[-] Vulnerable path for different architecture found for arch/s390/net/bpf_jit_comp.c - not further processing CVE-2021-20320
[*] Testing vulnerability 241 / 470 / CVE-2021-3573
[-] CVE-2021-3573 - missing vulnerability path from advisory
[*] Testing vulnerability 242 / 470 / CVE-2021-3847
[-] CVE-2021-3847 - missing vulnerability path from advisory
[*] Testing vulnerability 243 / 470 / CVE-2021-4095
[-] CVE-2021-4095 - missing vulnerability path from advisory
[*] Testing vulnerability 244 / 470 / CVE-2022-0433
[-] CVE-2022-0433 - missing vulnerability path from advisory
[*] Testing vulnerability 245 / 470 / CVE-2022-1015
[-] CVE-2022-1015 - linux/net/netfilter/nf_tables_api.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 246 / 470 / CVE-2021-4023
[-] CVE-2021-4023 - missing vulnerability path from advisory
[*] Testing vulnerability 247 / 470 / CVE-2021-4148
[*] Testing vulnerability 248 / 470 / CVE-2023-1611
[*] Testing vulnerability 249 / 470 / CVE-2022-1158
[-] CVE-2022-1158 - missing vulnerability path from advisory
[*] Testing vulnerability 250 / 470 / CVE-2022-4379
[*] Testing vulnerability 251 / 470 / CVE-2023-1513
[-] CVE-2023-1513 - missing vulnerability path from advisory
[*] Testing vulnerability 252 / 470 / CVE-2023-3269
[-] CVE-2023-3269 - missing vulnerability path from advisory
[*] Testing vulnerability 253 / 470 / CVE-2021-3923
[+] CVE-2021-29648 (4.9/5.5) - kernel/bpf/syscall.c verified - exported symbol (gpl)
[-] CVE-2021-3923 - missing vulnerability path from advisory
[+] CVE-2021-4148 (4.9/5.5) - fs/buffer.c verified - exported symbol
[*] Testing vulnerability 254 / 470 / CVE-2023-1206
[-] CVE-2023-1206 - missing vulnerability path from advisory
[*] Testing vulnerability 255 / 470 / CVE-2023-2194
[-] CVE-2023-2194 - missing vulnerability path from advisory
[*] Testing vulnerability 256 / 470 / CVE-2023-3161
[-] CVE-2023-3161 - missing vulnerability path from advisory
[*] Testing vulnerability 257 / 470 / CVE-2023-3212
[-] CVE-2023-3212 - missing vulnerability path from advisory
[*] Testing vulnerability 258 / 470 / CVE-2023-0266
[-] CVE-2023-0266 - missing vulnerability path from advisory
[*] Testing vulnerability 259 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 260 / 470 / CVE-2023-0469
[-] CVE-2023-0469 - io_uring/filetable.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 261 / 470 / CVE-2023-0459
[-] CVE-2023-0459 - missing vulnerability path from advisory
[*] Testing vulnerability 262 / 470 / CVE-2023-0394
[*] Testing vulnerability 263 / 470 / CVE-2023-0468
[-] CVE-2023-0468 - io_uring/poll.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 264 / 470 / CVE-2023-0590
[*] Testing vulnerability 265 / 470 / CVE-2023-0615
[-] CVE-2023-0615 - missing vulnerability path from advisory
[*] Testing vulnerability 266 / 470 / CVE-2023-1079
[-] CVE-2023-1079 - missing vulnerability path from advisory
[*] Testing vulnerability 267 / 470 / CVE-2022-0264
[-] CVE-2022-0264 - missing vulnerability path from advisory
[*] Testing vulnerability 268 / 470 / CVE-2022-0168
[*] Testing vulnerability 269 / 470 / CVE-2023-1095
[-] CVE-2023-1095 - missing vulnerability path from advisory
[*] Testing vulnerability 270 / 470 / CVE-2023-1195
[*] Testing vulnerability 271 / 470 / CVE-2023-1382
[*] Testing vulnerability 272 / 470 / CVE-2022-0480
[*] Testing vulnerability 273 / 470 / CVE-2022-0382
[+] CVE-2023-0590 (null/4.7) - net/sched/sch_api.c verified - exported symbol
[-] CVE-2022-0382 - missing vulnerability path from advisory
[*] Testing vulnerability 274 / 470 / CVE-2023-1249
[-] CVE-2023-1249 - missing vulnerability path from advisory
[*] Testing vulnerability 275 / 470 / CVE-2023-1872
[-] CVE-2023-1872 - missing vulnerability path from advisory
[*] Testing vulnerability 276 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 277 / 470 / The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.
[-] The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. - missing vulnerability path from advisory
[*] Testing vulnerability 278 / 470 / 
[-]  - missing vulnerability path from advisory
[+] CVE-2022-0480 (null/5.5) - fs/locks.c verified - exported symbol
[*] Testing vulnerability 279 / 470 / We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
[-] We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. - missing vulnerability path from advisory
[*] Testing vulnerability 280 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 281 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 282 / 470 / CVE-2023-1859
[+] CVE-2023-0394 (null/5.5) - net/ipv6/raw.c verified - exported symbol (gpl)
[*] Testing vulnerability 283 / 470 / CVE-2023-1855
[*] Testing vulnerability 284 / 470 / CVE-2023-1838
[*] Testing vulnerability 285 / 470 / CVE-2023-1989
[*] Found file name driversluetoothtsdio.c for CVE-2023-1989 without path details ... looking for candidates now
[-] CVE-2023-1989 - driversluetoothtsdio.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 286 / 470 / CVE-2023-2006
[-] CVE-2023-2006 - missing vulnerability path from advisory
[*] Testing vulnerability 287 / 470 / CVE-2022-0850
[-] CVE-2022-0850 - missing vulnerability path from advisory
[*] Testing vulnerability 288 / 470 / CVE-2023-1829
[-] CVE-2023-1829 - missing vulnerability path from advisory
[*] Testing vulnerability 289 / 470 / We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
[-] We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. - missing vulnerability path from advisory
[*] Testing vulnerability 290 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 291 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 292 / 470 / CVE-2023-2007
[-] CVE-2023-2007 - missing vulnerability path from advisory
[*] Testing vulnerability 293 / 470 / CVE-2023-1990
[*] Testing vulnerability 294 / 470 / CVE-2023-2002
[*] Testing vulnerability 295 / 470 / CVE-2023-2008
[-] CVE-2023-2008 - missing vulnerability path from advisory
[*] Testing vulnerability 296 / 470 / CVE-2022-1016
[-] CVE-2022-1016 - missing vulnerability path from advisory
[*] Testing vulnerability 297 / 470 / CVE-2022-1012
[*] Testing vulnerability 298 / 470 / CVE-2023-2019
[-] CVE-2023-2019 - missing vulnerability path from advisory
[*] Testing vulnerability 299 / 470 / CVE-2022-1198
[*] Testing vulnerability 300 / 470 / CVE-2023-2124
[-] CVE-2023-2124 - missing vulnerability path from advisory
[*] Testing vulnerability 301 / 470 / CVE-2022-1263
[-] CVE-2022-1263 - missing vulnerability path from advisory
[*] Testing vulnerability 302 / 470 / CVE-2023-2166
[*] Testing vulnerability 303 / 470 / CVE-2022-1651
[-] CVE-2022-1651 - drivers/virt/acrn/hsm.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 304 / 470 / CVE-2022-1205
[-] CVE-2022-1205 - missing vulnerability path from advisory
[*] Testing vulnerability 305 / 470 / CVE-2023-2162
[+] CVE-2022-1012 (null/8.2) - net/ipv4/tcp.c verified - exported symbol
[*] Testing vulnerability 306 / 470 / CVE-2022-1508
[-] CVE-2022-1508 - missing vulnerability path from advisory
[*] Testing vulnerability 307 / 470 / CVE-2022-1852
[-] CVE-2022-1852 - missing vulnerability path from advisory
[*] Testing vulnerability 308 / 470 / CVE-2023-2177
[*] Testing vulnerability 309 / 470 / CVE-2023-23000
[*] Testing vulnerability 310 / 470 / CVE-2023-23039
[*] Testing vulnerability 311 / 470 / CVE-2023-22997
[-] CVE-2023-22997 - kernel/module/decompress.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 312 / 470 / CVE-2022-2196
[-] CVE-2022-2196 - missing vulnerability path from advisory
[*] Testing vulnerability 313 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 314 / 470 / CVE-2023-22999
[*] Testing vulnerability 315 / 470 / CVE-2023-22998
[*] Testing vulnerability 316 / 470 / CVE-2023-23002
[*] Testing vulnerability 317 / 470 / CVE-2023-23005
[-] CVE-2023-23005 - mm/memory-tiers.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 318 / 470 / CVE-2023-23001
[*] Testing vulnerability 319 / 470 / CVE-2023-23003
[*] Testing vulnerability 320 / 470 / CVE-2023-23006
[*] Testing vulnerability 321 / 470 / CVE-2023-22995
[*] Testing vulnerability 322 / 470 / CVE-2023-22996
[*] Testing vulnerability 323 / 470 / CVE-2023-23004
[*] Testing vulnerability 324 / 470 / CVE-2023-25012
[*] Testing vulnerability 325 / 470 / CVE-2023-2513
[-] CVE-2023-2513 - missing vulnerability path from advisory
[*] Testing vulnerability 326 / 470 / CVE-2023-26242
[*] Testing vulnerability 327 / 470 / CVE-2022-2380
[-] CVE-2022-2380 - missing vulnerability path from advisory
[*] Testing vulnerability 328 / 470 / CVE-2022-2503
[-] CVE-2022-2503 - missing vulnerability path from advisory
[*] Testing vulnerability 329 / 470 / CVE-2020-35499
[*] Testing vulnerability 330 / 470 / CVE-2020-35501
[-] CVE-2020-35501 - missing vulnerability path from advisory
[*] Testing vulnerability 331 / 470 / CVE-2022-26878
[-] CVE-2022-26878 - drivers/bluetooth/virtio_bt.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 332 / 470 / CVE-2023-28466
[*] Testing vulnerability 333 / 470 / CVE-2023-28327
[*] Testing vulnerability 334 / 470 / CVE-2023-28328
[-] CVE-2023-28328 - drivers/media/usb/dev-usb/az6027.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 335 / 470 / CVE-2023-28464
[*] Testing vulnerability 336 / 470 / CVE-2022-2785
[-] CVE-2022-2785 - missing vulnerability path from advisory
[*] Testing vulnerability 337 / 470 / CVE-2022-27950
[*] Testing vulnerability 338 / 470 / CVE-2023-3111
[*] Testing vulnerability 339 / 470 / CVE-2023-3117
[-] CVE-2023-3117 - missing vulnerability path from advisory
[*] Testing vulnerability 340 / 470 / CVE-2023-3159
[-] CVE-2023-3159 - missing vulnerability path from advisory
[*] Testing vulnerability 341 / 470 / CVE-2023-28866
[-] CVE-2023-28866 - net/bluetooth/hci_sync.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 342 / 470 / CVE-2023-30456
[-] Vulnerable path for different architecture found for arch/x86/kvm/vmx/nested.c - not further processing CVE-2023-30456
[*] Testing vulnerability 343 / 470 / CVE-2023-30772
[*] Testing vulnerability 344 / 470 / CVE-2023-2985
[*] Testing vulnerability 345 / 470 / CVE-2022-3108
[*] Testing vulnerability 346 / 470 / CVE-2023-33203
[*] Testing vulnerability 347 / 470 / CVE-2023-3220
[*] Testing vulnerability 348 / 470 / CVE-2023-3439
[-] CVE-2023-3439 - missing vulnerability path from advisory
[*] Testing vulnerability 349 / 470 / CVE-2023-3141
[*] Testing vulnerability 350 / 470 / CVE-2023-3357
[-] CVE-2023-3357 - missing vulnerability path from advisory
[*] Testing vulnerability 351 / 470 / CVE-2023-32250
[-] CVE-2023-32250 - missing vulnerability path from advisory
[*] Testing vulnerability 352 / 470 / CVE-2022-3113
[*] Testing vulnerability 353 / 470 / CVE-2023-32254
[-] CVE-2023-32254 - missing vulnerability path from advisory
[*] Testing vulnerability 354 / 470 / CVE-2022-3114
[*] Testing vulnerability 355 / 470 / CVE-2022-2991
[-] CVE-2022-2991 - missing vulnerability path from advisory
[*] Testing vulnerability 356 / 470 / CVE-2021-33033
[*] Testing vulnerability 357 / 470 / CVE-2023-31436
[*] Testing vulnerability 358 / 470 / CVE-2023-32233
[-] CVE-2023-32233 - missing vulnerability path from advisory
[*] Testing vulnerability 359 / 470 / CVE-2023-3358
[-] CVE-2023-3358 - missing vulnerability path from advisory
[*] Testing vulnerability 360 / 470 / CVE-2023-37453
[-] CVE-2023-37453 - missing vulnerability path from advisory
[*] Testing vulnerability 361 / 470 / CVE-2023-35788
[*] Testing vulnerability 362 / 470 / CVE-2023-3359
[-] CVE-2023-3359 - missing vulnerability path from advisory
[*] Testing vulnerability 363 / 470 / CVE-2023-35824
[-] CVE-2023-35824 - missing vulnerability path from advisory
[*] Testing vulnerability 364 / 470 / CVE-2023-37454
[-] CVE-2023-37454 - missing vulnerability path from advisory
[*] Testing vulnerability 365 / 470 / CVE-2022-3077
[-] CVE-2022-3077 - missing vulnerability path from advisory
[*] Testing vulnerability 366 / 470 / CVE-2023-35826
[-] CVE-2023-35826 - missing vulnerability path from advisory
[*] Testing vulnerability 367 / 470 / CVE-2023-35827
[-] CVE-2023-35827 - missing vulnerability path from advisory
[*] Testing vulnerability 368 / 470 / CVE-2021-32078
[*] Testing vulnerability 369 / 470 / CVE-2022-3104
[*] Testing vulnerability 370 / 470 / CVE-2022-3105
[*] Testing vulnerability 371 / 470 / CVE-2023-35828
[-] CVE-2023-35828 - missing vulnerability path from advisory
[+] CVE-2022-3114 (null/5.5) - drivers/clk/imx/clk.c verified - exported symbol (gpl)
[*] Testing vulnerability 372 / 470 / CVE-2023-35829
[-] CVE-2023-35829 - missing vulnerability path from advisory
[*] Testing vulnerability 373 / 470 / CVE-2022-3107
[*] Testing vulnerability 374 / 470 / CVE-2022-32296
[-] CVE-2022-32296 - missing vulnerability path from advisory
[*] Testing vulnerability 375 / 470 / CVE-2023-3355
[*] Testing vulnerability 376 / 470 / CVE-2023-32269
[-] CVE-2023-32269 - missing vulnerability path from advisory
[*] Testing vulnerability 377 / 470 / CVE-2022-3110
[-] CVE-2022-3110 - drivers/staging/r8188eu/core/rtw_xmit.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 378 / 470 / CVE-2022-3111
[*] Testing vulnerability 379 / 470 / CVE-2022-3112
[*] Testing vulnerability 380 / 470 / CVE-2022-3078
[-] CVE-2022-3078 - missing vulnerability path from advisory
[*] Testing vulnerability 381 / 470 / CVE-2021-3732
[-] CVE-2021-3732 - missing vulnerability path from advisory
[*] Testing vulnerability 382 / 470 / CVE-2021-38200
[-] Vulnerable path for different architecture found for arch/powerpc/perf/core-book3s.c - not further processing CVE-2021-38200
[*] Testing vulnerability 383 / 470 / CVE-2023-35823
[-] CVE-2023-35823 - missing vulnerability path from advisory
[*] Testing vulnerability 384 / 470 / CVE-2022-3106
[*] Testing vulnerability 385 / 470 / CVE-2021-3736
[*] Testing vulnerability 386 / 470 / CVE-2023-34256
[*] Testing vulnerability 387 / 470 / CVE-2021-38206
[-] CVE-2021-38206 - missing vulnerability path from advisory
[*] Testing vulnerability 388 / 470 / CVE-2021-38207
[*] Testing vulnerability 389 / 470 / CVE-2021-38208
[*] Testing vulnerability 390 / 470 / CVE-2022-32981
[-] CVE-2022-32981 - missing vulnerability path from advisory
[*] Testing vulnerability 391 / 470 / CVE-2021-38209
[*] Testing vulnerability 392 / 470 / CVE-2023-3268
[+] CVE-2023-34256 (null/5.5) - lib/crc16.c verified - exported symbol
[*] Testing vulnerability 393 / 470 / CVE-2022-34494
[*] Testing vulnerability 394 / 470 / CVE-2022-34495
[*] Testing vulnerability 395 / 470 / CVE-2021-4135
[-] CVE-2021-4135 - missing vulnerability path from advisory
[*] Testing vulnerability 396 / 470 / CVE-2022-3707
[-] CVE-2022-3707 - missing vulnerability path from advisory
[*] Testing vulnerability 397 / 470 / CVE-2021-4032
[-] Vulnerable path for different architecture found for arch/x86/kvm/lapic.c - not further processing CVE-2021-4032
[*] Testing vulnerability 398 / 470 / CVE-2021-3764
[-] CVE-2021-3764 - missing vulnerability path from advisory
[*] Testing vulnerability 399 / 470 / CVE-2022-3115
[*] Testing vulnerability 400 / 470 / CVE-2021-4202
[*] Testing vulnerability 401 / 470 / CVE-2023-33288
[-] CVE-2023-33288 - missing vulnerability path from advisory
[*] Testing vulnerability 402 / 470 / CVE-2022-3595
[*] Testing vulnerability 403 / 470 / CVE-2021-4150
[*] Testing vulnerability 404 / 470 / CVE-2021-4155
[-] CVE-2021-4155 - missing vulnerability path from advisory
[*] Testing vulnerability 405 / 470 / CVE-2022-3544
[-] CVE-2022-3544 - mm/damon/sysfs.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 406 / 470 / CVE-2021-4001
[-] CVE-2021-4001 - missing vulnerability path from advisory
[*] Testing vulnerability 407 / 470 / CVE-2022-39189
[-] CVE-2022-39189 - missing vulnerability path from advisory
[*] Testing vulnerability 408 / 470 / CVE-2022-3606
[*] Testing vulnerability 409 / 470 / CVE-2022-3533
[-] CVE-2022-3533 - tools/lib/bpf/usdt.c - vulnerable source file not found in kernel sources
[+] CVE-2021-38209 (2.1/3.3) - net/netfilter/nf_conntrack_standalone.c verified - exported symbol (gpl)
[*] Testing vulnerability 410 / 470 / CVE-2022-3543
[*] Testing vulnerability 411 / 470 / CVE-2022-4127
[-] CVE-2022-4127 - missing vulnerability path from advisory
[*] Testing vulnerability 412 / 470 / CVE-2022-40476
[*] Testing vulnerability 413 / 470 / CVE-2022-42896
[-] CVE-2022-42896 - missing vulnerability path from advisory
[*] Testing vulnerability 414 / 470 / CVE-2021-44879
[*] Testing vulnerability 415 / 470 / CVE-2022-44034
[*] Testing vulnerability 416 / 470 / CVE-2022-44033
[*] Testing vulnerability 417 / 470 / CVE-2022-45869
[-] CVE-2022-45869 - missing vulnerability path from advisory
[*] Testing vulnerability 418 / 470 / CVE-2021-45402
[+] CVE-2022-40476 (null/5.5) - fs/io_uring.c verified - exported symbol
[+] CVE-2021-4150 (4.9/5.5) - block/partitions/core.c verified - exported symbol (gpl)
[*] Testing vulnerability 419 / 470 / CVE-2022-48423
[-] CVE-2022-48423 - fs/ntfs3/record.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 420 / 470 / CVE-2022-48502
[-] CVE-2022-48502 - missing vulnerability path from advisory
[*] Testing vulnerability 421 / 470 / CVE-2021-46283
[*] Testing vulnerability 422 / 470 / CVE-2022-4662
[-] CVE-2022-4662 - missing vulnerability path from advisory
[*] Testing vulnerability 423 / 470 / CVE-2022-48425
[-] CVE-2022-48425 - fs/ntfs3/inode.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 424 / 470 / CVE-2022-41848
[*] Testing vulnerability 425 / 470 / CVE-2022-44032
[*] Testing vulnerability 426 / 470 / CVE-2022-42703
[*] Testing vulnerability 427 / 470 / CVE-2022-3344
[-] CVE-2022-3344 - missing vulnerability path from advisory
[*] Testing vulnerability 428 / 470 / CVE-2019-3016
[+] CVE-2022-3543 (null/5.5) - net/unix/af_unix.c verified - exported symbol (gpl)
[-] CVE-2019-3016 - missing vulnerability path from advisory
[*] Testing vulnerability 429 / 470 / CVE-2022-38096
[-] CVE-2022-38096 - drivers/gpu/vmxgfx/vmxgfx_execbuf.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 430 / 470 / CVE-2023-1670
[-] CVE-2023-1670 - missing vulnerability path from advisory
[*] Testing vulnerability 431 / 470 / CVE-2022-3565
[*] Testing vulnerability 432 / 470 / CVE-2022-3424
[-] CVE-2022-3424 - missing vulnerability path from advisory
[*] Testing vulnerability 433 / 470 / CVE-2023-1118
[-] CVE-2023-1118 - missing vulnerability path from advisory
[*] Testing vulnerability 434 / 470 / CVE-2022-4095
[-] CVE-2022-4095 - missing vulnerability path from advisory
[*] Testing vulnerability 435 / 470 / CVE-2022-3239
[-] CVE-2022-3239 - missing vulnerability path from advisory
[*] Testing vulnerability 436 / 470 / CVE-2023-3390
[-] CVE-2023-3390 - missing vulnerability path from advisory
[*] Testing vulnerability 437 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 438 / 470 / Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
[-] Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. - missing vulnerability path from advisory
[*] Testing vulnerability 439 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 440 / 470 / We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
[-] We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. - missing vulnerability path from advisory
[*] Testing vulnerability 441 / 470 / CVE-2022-2639
[-] CVE-2022-2639 - missing vulnerability path from advisory
[+] CVE-2022-42703 (null/5.5) - mm/rmap.c verified - exported symbol (gpl)
[*] Testing vulnerability 442 / 470 / CVE-2022-2977
[-] CVE-2022-2977 - missing vulnerability path from advisory
[*] Testing vulnerability 443 / 470 / CVE-2023-0461
[-] CVE-2023-0461 - missing vulnerability path from advisory
[*] Testing vulnerability 444 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 445 / 470 / There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.
[-] There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. - missing vulnerability path from advisory
[*] Testing vulnerability 446 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 447 / 470 / When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.
[-] When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. - missing vulnerability path from advisory
[*] Testing vulnerability 448 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 449 / 470 / The setsockopt TCP_ULP operation does not require any privilege.
[-] The setsockopt TCP_ULP operation does not require any privilege. - missing vulnerability path from advisory
[*] Testing vulnerability 450 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 451 / 470 / We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
[-] We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c - missing vulnerability path from advisory
[*] Testing vulnerability 452 / 470 / CVE-2023-1281
[-] CVE-2023-1281 - missing vulnerability path from advisory
[*] Testing vulnerability 453 / 470 / This issue affects Linux Kernel
[-] This issue affects Linux Kernel - missing vulnerability path from advisory
[*] Testing vulnerability 454 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 455 / 470 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 456 / 470 / CVE-2022-4378
[-] CVE-2022-4378 - missing vulnerability path from advisory
[*] Testing vulnerability 457 / 470 / CVE-2023-1078
[-] CVE-2023-1078 - missing vulnerability path from advisory
[*] Testing vulnerability 458 / 470 / CVE-2022-3577
[-] CVE-2022-3577 - missing vulnerability path from advisory
[*] Testing vulnerability 459 / 470 / CVE-2022-38457
[-] CVE-2022-38457 - drivers/gpu/vmxgfx/vmxgfx_execbuf.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 460 / 470 / CVE-2022-40133
[-] CVE-2022-40133 - drivers/gpu/vmxgfx/vmxgfx_execbuf.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 461 / 470 / CVE-2023-1252
[-] CVE-2023-1252 - missing vulnerability path from advisory
[*] Testing vulnerability 462 / 470 / CVE-2023-1295
[-] CVE-2023-1295 - missing vulnerability path from advisory
[*] Testing vulnerability 463 / 470 / CVE-2023-23586
[-] CVE-2023-23586 - missing vulnerability path from advisory
[*] Testing vulnerability 464 / 470 / CVE-2022-2959
[-] CVE-2022-2959 - missing vulnerability path from advisory
[*] Testing vulnerability 465 / 470 / CVE-2021-4028
[-] CVE-2021-4028 - missing vulnerability path from advisory
[*] Testing vulnerability 466 / 470 / CVE-2022-4139
[-] CVE-2022-4139 - missing vulnerability path from advisory
[*] Testing vulnerability 467 / 470 / CVE-2022-47946
[*] Testing vulnerability 468 / 470 / CVE-2022-4744
[-] CVE-2022-4744 - missing vulnerability path from advisory
[*] Testing vulnerability 469 / 470 / CVE-2022-4696
[-] CVE-2022-4696 - missing vulnerability path from advisory
[*] Testing vulnerability 470 / 470 / CVE-2022-1043
[-] CVE-2022-1043 - missing vulnerability path from advisory
[+] CVE-2022-47946 (null/5.5) - fs/io_uring.c verified - exported symbol

==> Linux kernel verification results


[+] Identified 470 unverified CVE vulnerabilities for kernel version 5.10.52
[*] Detected architecture arm
[*] Extracted 31259 unique symbols from kernel and modules
[*] Found 244 advisories with missing vulnerable path details
[*] Found 22 path details in CVE advisories but no real kernel path found in vanilla kernel source
[*] Found 197 path details in CVE advisories with real kernel path
[*] Found 10 path details in CVE advisories with real kernel path but wrong architecture
[*] 27 symbol usage verified
[*] 22 vulnerable paths verified via symbols
[*] 0 vulnerable paths verified via compiled paths

[+] Verified CVEs: 27 (exported symbols)
[+] Verified CVEs: 27 (one mechanism succeeded)



[*] Exploitability notes:
    EDB - Exploit code found in the Exploit database
    MSF - Exploit code found in the Metasploit framework
    GH - PoC code found on Github (via trickest)
    PS - PoC code found on Packetstormsecurity
    SNYK - PoC code found on Snyk vulnerability database
    EXP - Vulnerability is known as exploited