[+] Kernel vulnerability identification and verification


[+] Identified kernel version: 4.19.56
[-] No kernel configuration file with matching elf file found for kernel 4.19.56.
[+] Found kernel elf file: /logs/firmware/unblob_extracted/firmware_extract/56048-12514271.gzip_extract/gzip.uncompressed_extract/0-5243916.unknown.elf
[+] Identified kernel architecture arm
[*] Kernel sources for version 4.19.56 available
[*] Kernel version 4.19.56 extraction ... 

==> Version based vulnerability detection

[*] Extract CVE data for kernel version 4.19.56
[*] Create CVE vulnerabilities array for kernel version 4.19.56 ...

[+] Extracted 782 vulnerabilities based on kernel version only


==> Identify kernel symbols ...

[*] Extracted 19104 symbols from kernel
[*] Identify kernel modules symbols ...

[+] Extracted 18700 unique symbols

[*] Splitting symbols file for processing

==> Linux kernel vulnerability verification


[*] Checking vulnerabilities for kernel version 4.19.56

[*] Testing vulnerability 1 / 782 / CVE-2020-26558
[-] CVE-2020-26558 - missing vulnerability path from advisory
[*] Testing vulnerability 2 / 782 / CVE-2019-16714
[*] Testing vulnerability 3 / 782 / CVE-2019-14835
[-] CVE-2019-14835 - missing vulnerability path from advisory
[*] Testing vulnerability 4 / 782 / CVE-2020-24588
[-] CVE-2020-24588 - missing vulnerability path from advisory
[*] Testing vulnerability 5 / 782 / CVE-2020-24586
[-] CVE-2020-24586 - missing vulnerability path from advisory
[*] Testing vulnerability 6 / 782 / CVE-2020-24587
[-] CVE-2020-24587 - missing vulnerability path from advisory
[*] Testing vulnerability 7 / 782 / CVE-2019-0145
[-] CVE-2019-0145 - missing vulnerability path from advisory
[*] Testing vulnerability 8 / 782 / CVE-2019-15902
[-] CVE-2019-15902 - missing vulnerability path from advisory
[*] Testing vulnerability 9 / 782 / CVE-2019-15098
[*] Testing vulnerability 10 / 782 / CVE-2019-7221
[-] CVE-2019-7221 - missing vulnerability path from advisory
[*] Testing vulnerability 11 / 782 / CVE-2019-7222
[-] CVE-2019-7222 - missing vulnerability path from advisory
[*] Testing vulnerability 12 / 782 / CVE-2020-10690
[-] CVE-2020-10690 - missing vulnerability path from advisory
[*] Testing vulnerability 13 / 782 / CVE-2020-10757
[-] CVE-2020-10757 - missing vulnerability path from advisory
[*] Testing vulnerability 14 / 782 / CVE-2020-11884
[-] Vulnerable path for different architecture found for arch/s390/lib/uaccess.c - not further processing CVE-2020-11884
[*] Testing vulnerability 15 / 782 / CVE-2022-1199
[-] CVE-2022-1199 - missing vulnerability path from advisory
[*] Testing vulnerability 16 / 782 / CVE-2021-20322
[-] CVE-2021-20322 - missing vulnerability path from advisory
[*] Testing vulnerability 17 / 782 / CVE-2020-12769
[*] Testing vulnerability 18 / 782 / CVE-2020-12653
[*] Testing vulnerability 19 / 782 / CVE-2020-13143
[*] Testing vulnerability 20 / 782 / CVE-2020-12770
[-] CVE-2020-12770 - missing vulnerability path from advisory
[*] Testing vulnerability 21 / 782 / CVE-2020-12771
[*] Testing vulnerability 22 / 782 / CVE-2020-12888
[-] CVE-2020-12888 - missing vulnerability path from advisory
[*] Testing vulnerability 23 / 782 / CVE-2019-13272
[*] Testing vulnerability 24 / 782 / CVE-2019-15211
[*] Testing vulnerability 25 / 782 / CVE-2019-15219
[*] Testing vulnerability 26 / 782 / CVE-2019-15220
[*] Testing vulnerability 27 / 782 / CVE-2019-15222
[*] Testing vulnerability 28 / 782 / CVE-2019-15212
[*] Testing vulnerability 29 / 782 / CVE-2019-15215
[*] Testing vulnerability 30 / 782 / CVE-2019-15216
[*] Testing vulnerability 31 / 782 / CVE-2020-14356
[-] CVE-2020-14356 - missing vulnerability path from advisory
[*] Testing vulnerability 32 / 782 / CVE-2019-15221
[+] CVE-2019-13272 (7.2/7.8) - kernel/ptrace.c verified - exported symbol (gpl)
[*] Testing vulnerability 33 / 782 / CVE-2019-15223
[*] Testing vulnerability 34 / 782 / CVE-2019-15213
[*] Testing vulnerability 35 / 782 / CVE-2019-15217
[*] Testing vulnerability 36 / 782 / CVE-2019-15218
[*] Testing vulnerability 37 / 782 / CVE-2019-18282
[*] Testing vulnerability 38 / 782 / CVE-2019-19052
[*] Testing vulnerability 39 / 782 / CVE-2019-19057
[*] Testing vulnerability 40 / 782 / CVE-2019-19060
[*] Testing vulnerability 41 / 782 / CVE-2019-19061
[*] Testing vulnerability 42 / 782 / CVE-2019-19054
[+] CVE-2019-18282 (5/5.3) - net/core/flow_dissector.c verified - exported symbol
[*] Testing vulnerability 43 / 782 / CVE-2019-19063
[*] Testing vulnerability 44 / 782 / CVE-2019-18683
[-] CVE-2019-18683 - missing vulnerability path from advisory
[*] Testing vulnerability 45 / 782 / CVE-2019-19922
[*] Testing vulnerability 46 / 782 / CVE-2022-25258
[*] Testing vulnerability 47 / 782 / CVE-2019-19947
[*] Testing vulnerability 48 / 782 / CVE-2019-19965
[*] Testing vulnerability 49 / 782 / CVE-2019-19966
[*] Testing vulnerability 50 / 782 / CVE-2019-20054
[-] CVE-2019-20054 - missing vulnerability path from advisory
[*] Testing vulnerability 51 / 782 / CVE-2019-20095
[*] Testing vulnerability 52 / 782 / CVE-2020-29660
[*] Testing vulnerability 53 / 782 / CVE-2020-29661
[*] Testing vulnerability 54 / 782 / CVE-2019-5108
[-] CVE-2019-5108 - missing vulnerability path from advisory
[*] Testing vulnerability 55 / 782 / CVE-2020-9383
[*] Testing vulnerability 56 / 782 / CVE-2020-8992
[+] CVE-2020-29660 (2.1/4.4) - drivers/tty/tty_io.c verified - exported symbol
[*] Testing vulnerability 57 / 782 / CVE-2021-3753
[+] CVE-2020-29660 (2.1/4.4) - drivers/tty/tty_jobctrl.c verified - exported symbol
[*] Testing vulnerability 58 / 782 / CVE-2020-8648
[+] CVE-2020-29661 (7.2/7.8) - drivers/tty/tty_jobctrl.c verified - exported symbol
[-] CVE-2020-8648 - missing vulnerability path from advisory
[*] Testing vulnerability 59 / 782 / CVE-2021-4203
[*] Testing vulnerability 60 / 782 / CVE-2022-36879
[*] Testing vulnerability 61 / 782 / CVE-2022-36946
[*] Testing vulnerability 62 / 782 / CVE-2022-43945
[-] CVE-2022-43945 - missing vulnerability path from advisory
[+] CVE-2021-3753 (1.9/4.7) - drivers/tty/vt/vt_ioctl.c verified - exported symbol
[*] Testing vulnerability 63 / 782 / CVE-2020-25670
[-] CVE-2020-25670 - missing vulnerability path from advisory
[*] Testing vulnerability 64 / 782 / CVE-2020-25671
[-] CVE-2020-25671 - missing vulnerability path from advisory
[*] Testing vulnerability 65 / 782 / CVE-2020-25673
[+] CVE-2021-4203 (4.9/6.8) - net/core/sock.c verified - exported symbol
[-] CVE-2020-25673 - missing vulnerability path from advisory
[*] Testing vulnerability 66 / 782 / CVE-2022-26966
[*] Testing vulnerability 67 / 782 / CVE-2022-27223
[*] Testing vulnerability 68 / 782 / CVE-2022-28796
[*] Testing vulnerability 69 / 782 / CVE-2022-3649
[*] Testing vulnerability 70 / 782 / CVE-2019-10126
[*] Testing vulnerability 71 / 782 / CVE-2020-10732
[-] CVE-2020-10732 - missing vulnerability path from advisory
[*] Testing vulnerability 72 / 782 / CVE-2020-16166
[*] Testing vulnerability 73 / 782 / CVE-2019-19462
[*] Testing vulnerability 74 / 782 / CVE-2019-19816
[-] CVE-2019-19816 - missing vulnerability path from advisory
[*] Testing vulnerability 75 / 782 / CVE-2019-3846
[-] CVE-2019-3846 - missing vulnerability path from advisory
[*] Testing vulnerability 76 / 782 / CVE-2019-3900
[-] CVE-2019-3900 - missing vulnerability path from advisory
[*] Testing vulnerability 77 / 782 / CVE-2019-14815
[+] CVE-2020-16166 (4.3/3.7) - drivers/char/random.c verified - exported symbol
[-] CVE-2019-14815 - missing vulnerability path from advisory
[*] Testing vulnerability 78 / 782 / CVE-2020-15436
[*] Testing vulnerability 79 / 782 / CVE-2018-16871
[-] CVE-2018-16871 - missing vulnerability path from advisory
[*] Testing vulnerability 80 / 782 / CVE-2021-23133
[-] CVE-2021-23133 - missing vulnerability path from advisory
[*] Testing vulnerability 81 / 782 / CVE-2020-25669
[-] CVE-2020-25669 - missing vulnerability path from advisory
[*] Testing vulnerability 82 / 782 / CVE-2020-29368
[+] CVE-2020-15436 (7.2/6.7) - fs/block_dev.c verified - exported symbol
[*] Testing vulnerability 83 / 782 / CVE-2020-29370
[*] Testing vulnerability 84 / 782 / CVE-2020-28097
[-] CVE-2020-28097 - missing vulnerability path from advisory
[*] Testing vulnerability 85 / 782 / CVE-2020-27786
[-] CVE-2020-27786 - missing vulnerability path from advisory
[*] Testing vulnerability 86 / 782 / CVE-2019-25045
[-] CVE-2019-25045 - missing vulnerability path from advisory
[*] Testing vulnerability 87 / 782 / CVE-2021-26932
[-] CVE-2021-26932 - arch/*/xen/p2m.c - vulnerable source file not found in kernel sources
[+] CVE-2020-29370 (4.4/7) - mm/slub.c verified - exported symbol
[*] Testing vulnerability 88 / 782 / CVE-2021-27363
[-] CVE-2021-27363 - missing vulnerability path from advisory
[*] Testing vulnerability 89 / 782 / CVE-2021-28038
[-] CVE-2021-28038 - missing vulnerability path from advisory
[*] Testing vulnerability 90 / 782 / CVE-2021-28660
[*] Testing vulnerability 91 / 782 / CVE-2021-28951
[-] CVE-2021-28951 - fs/io_uring.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 92 / 782 / CVE-2021-29154
[-] Vulnerable path for different architecture found for arch/x86/net/bpf_jit_comp.c - not further processing CVE-2021-29154
[*] Testing vulnerability 93 / 782 / CVE-2020-36158
[*] Testing vulnerability 94 / 782 / CVE-2021-28971
[-] Vulnerable path for different architecture found for arch/x86/events/intel/ds.c - not further processing CVE-2021-28971
[*] Testing vulnerability 95 / 782 / CVE-2021-28952
[*] Testing vulnerability 96 / 782 / CVE-2021-28964
[*] Testing vulnerability 97 / 782 / CVE-2021-28972
[*] Testing vulnerability 98 / 782 / CVE-2021-3506
[*] Testing vulnerability 99 / 782 / CVE-2021-3612
[-] CVE-2021-3612 - missing vulnerability path from advisory
[*] Testing vulnerability 100 / 782 / CVE-2021-3483
[-] CVE-2021-3483 - missing vulnerability path from advisory
[*] Testing vulnerability 101 / 782 / CVE-2021-3501
[-] CVE-2021-3501 - missing vulnerability path from advisory
[*] Testing vulnerability 102 / 782 / CVE-2021-32399
[*] Testing vulnerability 103 / 782 / CVE-2021-38300
[-] Vulnerable path for different architecture found for arch/mips/net/bpf_jit.c - not further processing CVE-2021-38300
[*] Testing vulnerability 104 / 782 / CVE-2021-41864
[*] Testing vulnerability 105 / 782 / CVE-2021-43976
[*] Testing vulnerability 106 / 782 / CVE-2021-43975
[*] Testing vulnerability 107 / 782 / CVE-2020-36516
[-] CVE-2020-36516 - missing vulnerability path from advisory
[*] Testing vulnerability 108 / 782 / CVE-2019-15538
[*] Testing vulnerability 109 / 782 / CVE-2019-14814
[-] CVE-2019-14814 - missing vulnerability path from advisory
[*] Testing vulnerability 110 / 782 / CVE-2019-14816
[-] CVE-2019-14816 - missing vulnerability path from advisory
[*] Testing vulnerability 111 / 782 / CVE-2019-14821
[-] CVE-2019-14821 - missing vulnerability path from advisory
[*] Testing vulnerability 112 / 782 / CVE-2021-45485
[*] Testing vulnerability 113 / 782 / CVE-2021-3772
[-] CVE-2021-3772 - missing vulnerability path from advisory
[*] Testing vulnerability 114 / 782 / CVE-2021-38199
[*] Testing vulnerability 115 / 782 / CVE-2021-38201
[*] Testing vulnerability 116 / 782 / CVE-2021-38202
[*] Testing vulnerability 117 / 782 / CVE-2021-38203
[-] CVE-2021-38203 - missing vulnerability path from advisory
[*] Testing vulnerability 118 / 782 / CVE-2021-38160
[+] CVE-2021-45485 (5/7.5) - net/ipv6/output_core.c verified - exported symbol
[*] Testing vulnerability 119 / 782 / CVE-2022-28390
[*] Testing vulnerability 120 / 782 / CVE-2023-23559
[*] Testing vulnerability 121 / 782 / CVE-2022-41858
[-] CVE-2022-41858 - missing vulnerability path from advisory
[*] Testing vulnerability 122 / 782 / CVE-2021-22555
[-] CVE-2021-22555 - missing vulnerability path from advisory
[*] Testing vulnerability 123 / 782 / CVE-2020-29369
[*] Testing vulnerability 124 / 782 / CVE-2018-20669
[*] Testing vulnerability 125 / 782 / CVE-2021-33909
[*] Testing vulnerability 126 / 782 / CVE-2021-4083
[-] CVE-2021-4083 - missing vulnerability path from advisory
[*] Testing vulnerability 127 / 782 / CVE-2022-0492
[+] CVE-2020-29369 (6.9/7) - mm/mmap.c verified - exported symbol
[*] Testing vulnerability 128 / 782 / CVE-2022-30594
[-] CVE-2022-30594 - missing vulnerability path from advisory
[*] Testing vulnerability 129 / 782 / CVE-2020-25645
[+] CVE-2021-33909 (7.2/7.8) - fs/seq_file.c verified - exported symbol
[-] CVE-2020-25645 - missing vulnerability path from advisory
[*] Testing vulnerability 130 / 782 / CVE-2020-29374
[*] Testing vulnerability 131 / 782 / CVE-2020-29569
[-] CVE-2020-29569 - missing vulnerability path from advisory
[*] Testing vulnerability 132 / 782 / CVE-2022-29968
[-] CVE-2022-29968 - fs/io_uring.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 133 / 782 / CVE-2021-4197
[-] CVE-2021-4197 - missing vulnerability path from advisory
[*] Testing vulnerability 134 / 782 / CVE-2021-4157
[+] CVE-2020-29374 (3.3/3.6) - mm/gup.c verified - exported symbol
[-] CVE-2021-4157 - missing vulnerability path from advisory
[*] Testing vulnerability 135 / 782 / CVE-2022-0322
[*] Testing vulnerability 136 / 782 / CVE-2022-1011
[-] CVE-2022-1011 - missing vulnerability path from advisory
[*] Testing vulnerability 137 / 782 / CVE-2021-37159
[*] Testing vulnerability 138 / 782 / CVE-2021-3773
[-] CVE-2021-3773 - missing vulnerability path from advisory
[*] Testing vulnerability 139 / 782 / CVE-2021-3744
[-] CVE-2021-3744 - missing vulnerability path from advisory
[*] Testing vulnerability 140 / 782 / CVE-2021-3752
[-] CVE-2021-3752 - missing vulnerability path from advisory
[*] Testing vulnerability 141 / 782 / CVE-2021-43389
[-] CVE-2021-43389 - missing vulnerability path from advisory
[*] Testing vulnerability 142 / 782 / CVE-2021-42739
[-] CVE-2021-42739 - missing vulnerability path from advisory
[*] Testing vulnerability 143 / 782 / CVE-2021-4002
[-] CVE-2021-4002 - missing vulnerability path from advisory
[*] Testing vulnerability 144 / 782 / CVE-2021-45486
[*] Testing vulnerability 145 / 782 / CVE-2020-24394
[*] Testing vulnerability 146 / 782 / CVE-2019-19535
[*] Testing vulnerability 147 / 782 / CVE-2021-27365
[-] CVE-2021-27365 - missing vulnerability path from advisory
[*] Testing vulnerability 148 / 782 / CVE-2021-27364
[*] Testing vulnerability 149 / 782 / CVE-2020-10711
[-] CVE-2020-10711 - missing vulnerability path from advisory
[*] Testing vulnerability 150 / 782 / CVE-2022-0330
[-] CVE-2022-0330 - missing vulnerability path from advisory
[+] CVE-2021-45486 (2.7/3.5) - net/ipv4/route.c verified - exported symbol
[*] Testing vulnerability 151 / 782 / CVE-2021-3656
[-] CVE-2021-3656 - missing vulnerability path from advisory
[*] Testing vulnerability 152 / 782 / CVE-2021-3609
[*] Testing vulnerability 153 / 782 / CVE-2022-0516
[-] Vulnerable path for different architecture found for arch/s390/kvm/kvm-s390.c - not further processing CVE-2022-0516
[*] Testing vulnerability 154 / 782 / CVE-2021-3659
[-] CVE-2021-3659 - missing vulnerability path from advisory
[*] Testing vulnerability 155 / 782 / CVE-2022-0435
[-] CVE-2022-0435 - missing vulnerability path from advisory
[*] Testing vulnerability 156 / 782 / CVE-2019-3460
[-] CVE-2019-3460 - missing vulnerability path from advisory
[*] Testing vulnerability 157 / 782 / CVE-2019-3459
[-] CVE-2019-3459 - missing vulnerability path from advisory
[*] Testing vulnerability 158 / 782 / CVE-2020-25639
[-] CVE-2020-25639 - missing vulnerability path from advisory
[*] Testing vulnerability 159 / 782 / CVE-2020-27777
[-] CVE-2020-27777 - missing vulnerability path from advisory
[*] Testing vulnerability 160 / 782 / CVE-2022-2078
[-] CVE-2022-2078 - missing vulnerability path from advisory
[*] Testing vulnerability 161 / 782 / CVE-2022-27666
[*] Testing vulnerability 162 / 782 / CVE-2020-25704
[-] CVE-2020-25704 - missing vulnerability path from advisory
[*] Testing vulnerability 163 / 782 / CVE-2020-36385
[*] Testing vulnerability 164 / 782 / CVE-2020-36322
[-] CVE-2020-36322 - missing vulnerability path from advisory
[*] Testing vulnerability 165 / 782 / CVE-2020-14314
[-] CVE-2020-14314 - missing vulnerability path from advisory
[*] Testing vulnerability 166 / 782 / CVE-2020-25643
[-] CVE-2020-25643 - missing vulnerability path from advisory
[*] Testing vulnerability 167 / 782 / CVE-2020-25656
[-] CVE-2020-25656 - missing vulnerability path from advisory
[*] Testing vulnerability 168 / 782 / CVE-2020-26147
[-] CVE-2020-26147 - missing vulnerability path from advisory
[*] Testing vulnerability 169 / 782 / CVE-2022-3643
[-] CVE-2022-3643 - missing vulnerability path from advisory
[*] Testing vulnerability 170 / 782 / CVE-2020-35508
[-] CVE-2020-35508 - missing vulnerability path from advisory
[*] Testing vulnerability 171 / 782 / CVE-2021-40490
[*] Testing vulnerability 172 / 782 / CVE-2022-1048
[-] CVE-2022-1048 - missing vulnerability path from advisory
[*] Testing vulnerability 173 / 782 / CVE-2022-1353
[*] Testing vulnerability 174 / 782 / CVE-2022-25265
[-] CVE-2022-25265 - missing vulnerability path from advisory
[*] Testing vulnerability 175 / 782 / CVE-2021-3739
[*] Testing vulnerability 176 / 782 / CVE-2021-3760
[-] CVE-2021-3760 - missing vulnerability path from advisory
[*] Testing vulnerability 177 / 782 / CVE-2021-44733
[*] Testing vulnerability 178 / 782 / CVE-2022-1734
[*] Testing vulnerability 179 / 782 / CVE-2022-24958
[*] Testing vulnerability 180 / 782 / CVE-2022-26490
[*] Testing vulnerability 181 / 782 / CVE-2022-28389
[*] Testing vulnerability 182 / 782 / CVE-2022-28388
[*] Testing vulnerability 183 / 782 / CVE-2022-29581
[-] CVE-2022-29581 - missing vulnerability path from advisory
[*] Testing vulnerability 184 / 782 / CVE-2021-3640
[-] CVE-2021-3640 - missing vulnerability path from advisory
[*] Testing vulnerability 185 / 782 / CVE-2021-42008
[*] Testing vulnerability 186 / 782 / CVE-2021-4090
[-] CVE-2021-4090 - missing vulnerability path from advisory
[*] Testing vulnerability 187 / 782 / CVE-2021-42252
[-] CVE-2021-42252 - drivers/soc/aspeed/aspeed-lpc-ctrl.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 188 / 782 / CVE-2021-42327
[*] Testing vulnerability 189 / 782 / CVE-2021-45868
[*] Testing vulnerability 190 / 782 / CVE-2021-45469
[*] Testing vulnerability 191 / 782 / CVE-2023-1380
[*] Testing vulnerability 192 / 782 / CVE-2022-1671
[-] CVE-2022-1671 - net/rxrpc/server_key.c - vulnerable source file not found in kernel sources
[+] CVE-2021-45868 (4.3/5.5) - kernel/locking/rwsem.c verified - exported symbol
[*] Testing vulnerability 193 / 782 / CVE-2022-1652
[-] CVE-2022-1652 - missing vulnerability path from advisory
[*] Testing vulnerability 194 / 782 / CVE-2022-1973
[-] CVE-2022-1973 - fs/ntfs3/fslog.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 195 / 782 / CVE-2022-2318
[*] Testing vulnerability 196 / 782 / CVE-2023-26545
[*] Testing vulnerability 197 / 782 / CVE-2022-2873
[-] CVE-2022-2873 - missing vulnerability path from advisory
[*] Testing vulnerability 198 / 782 / CVE-2022-2961
[-] CVE-2022-2961 - missing vulnerability path from advisory
[*] Testing vulnerability 199 / 782 / CVE-2022-3202
[*] Testing vulnerability 200 / 782 / CVE-2022-32250
[*] Testing vulnerability 201 / 782 / CVE-2022-34918
[-] CVE-2022-34918 - missing vulnerability path from advisory
[*] Testing vulnerability 202 / 782 / CVE-2021-4204
[-] CVE-2021-4204 - missing vulnerability path from advisory
[*] Testing vulnerability 203 / 782 / CVE-2022-3545
[*] Testing vulnerability 204 / 782 / CVE-2022-36123
[-] CVE-2022-36123 - missing vulnerability path from advisory
[*] Testing vulnerability 205 / 782 / CVE-2022-45886
[*] Testing vulnerability 206 / 782 / CVE-2022-47520
[-] CVE-2022-47520 - drivers/net/wireless/microchip/wilc1000/hif.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 207 / 782 / CVE-2022-45884
[*] Testing vulnerability 208 / 782 / CVE-2022-45888
[-] CVE-2022-45888 - drivers/char/xillybus/xillyusb.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 209 / 782 / CVE-2022-45887
[*] Testing vulnerability 210 / 782 / CVE-2022-45885
[*] Testing vulnerability 211 / 782 / CVE-2022-45919
[-] CVE-2022-45919 - missing vulnerability path from advisory
[*] Testing vulnerability 212 / 782 / CVE-2022-45934
[*] Testing vulnerability 213 / 782 / CVE-2022-47518
[-] CVE-2022-47518 - drivers/net/wireless/microchip/wilc1000/cfg80211.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 214 / 782 / CVE-2022-47519
[-] CVE-2022-47519 - drivers/net/wireless/microchip/wilc1000/cfg80211.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 215 / 782 / CVE-2018-1000026
[-] CVE-2018-1000026 - missing vulnerability path from advisory
[*] Testing vulnerability 216 / 782 / CVE-2019-15031
[-] CVE-2019-15031 - missing vulnerability path from advisory
[*] Testing vulnerability 217 / 782 / CVE-2020-10942
[*] Testing vulnerability 218 / 782 / CVE-2020-11494
[*] Testing vulnerability 219 / 782 / CVE-2020-11565
[*] Testing vulnerability 220 / 782 / CVE-2019-11833
[*] Testing vulnerability 221 / 782 / CVE-2019-12614
[-] Vulnerable path for different architecture found for arch/powerpc/platforms/pseries/dlpar.c - not further processing CVE-2019-12614
[*] Testing vulnerability 222 / 782 / CVE-2020-12656
[*] Testing vulnerability 223 / 782 / CVE-2015-7312
[*] Testing vulnerability 224 / 782 / CVE-2019-14895
[-] CVE-2019-14895 - missing vulnerability path from advisory
[*] Testing vulnerability 225 / 782 / CVE-2019-14897
[-] CVE-2019-14897 - missing vulnerability path from advisory
[*] Testing vulnerability 226 / 782 / CVE-2020-13974
[*] Testing vulnerability 227 / 782 / CVE-2019-14901
[-] CVE-2019-14901 - missing vulnerability path from advisory
[*] Testing vulnerability 228 / 782 / CVE-2019-15505
[*] Testing vulnerability 229 / 782 / CVE-2019-15099
[*] Testing vulnerability 230 / 782 / CVE-2019-14896
[-] CVE-2019-14896 - missing vulnerability path from advisory
[*] Testing vulnerability 231 / 782 / CVE-2020-15393
[+] CVE-2020-13974 (7.2/7.8) - drivers/tty/vt/keyboard.c verified - exported symbol
[*] Testing vulnerability 232 / 782 / CVE-2019-15918
[*] Testing vulnerability 233 / 782 / CVE-2019-17052
[*] Testing vulnerability 234 / 782 / CVE-2019-17055
[*] Testing vulnerability 235 / 782 / CVE-2019-17133
[*] Testing vulnerability 236 / 782 / CVE-2019-17666
[*] Testing vulnerability 237 / 782 / CVE-2020-16120
[-] CVE-2020-16120 - missing vulnerability path from advisory
[*] Testing vulnerability 238 / 782 / CVE-2019-18786
[-] CVE-2019-18786 - missing vulnerability path from advisory
[*] Testing vulnerability 239 / 782 / CVE-2019-18809
[*] Testing vulnerability 240 / 782 / CVE-2020-25285
[*] Testing vulnerability 241 / 782 / CVE-2019-19039
[*] Testing vulnerability 242 / 782 / CVE-2019-19045
[*] Testing vulnerability 243 / 782 / CVE-2019-19078
[*] Testing vulnerability 244 / 782 / CVE-2019-19056
[*] Testing vulnerability 245 / 782 / CVE-2019-19074
[*] Testing vulnerability 246 / 782 / CVE-2019-19058
[*] Testing vulnerability 247 / 782 / CVE-2019-19082
[-] CVE-2019-19082 - missing vulnerability path from advisory
[*] Testing vulnerability 248 / 782 / CVE-2019-19083
[-] CVE-2019-19083 - missing vulnerability path from advisory
[*] Testing vulnerability 249 / 782 / CVE-2019-19062
[-] CVE-2019-19062 - crypto/crypto_user_base.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 250 / 782 / CVE-2019-19051
[*] Testing vulnerability 251 / 782 / CVE-2020-26088
[*] Testing vulnerability 252 / 782 / CVE-2019-19066
[*] Testing vulnerability 253 / 782 / CVE-2019-19068
[*] Testing vulnerability 254 / 782 / CVE-2020-27170
[*] Testing vulnerability 255 / 782 / CVE-2019-19071
[*] Testing vulnerability 256 / 782 / CVE-2019-19524
[*] Testing vulnerability 257 / 782 / CVE-2019-19529
[*] Testing vulnerability 258 / 782 / CVE-2020-25212
[*] Testing vulnerability 259 / 782 / CVE-2019-18660
[-] Vulnerable path for different architecture found for arch/powerpc/kernel/entry_64.S - not further processing CVE-2019-18660
[*] Testing vulnerability 260 / 782 / CVE-2020-27171
[*] Testing vulnerability 261 / 782 / CVE-2019-19534
[*] Testing vulnerability 262 / 782 / CVE-2019-18808
[*] Testing vulnerability 263 / 782 / CVE-2020-29372
[*] Testing vulnerability 264 / 782 / CVE-2019-20810
[*] Testing vulnerability 265 / 782 / CVE-2019-20811
[-] CVE-2019-20811 - missing vulnerability path from advisory
[*] Testing vulnerability 266 / 782 / CVE-2019-20096
[-] CVE-2019-20096 - missing vulnerability path from advisory
[*] Testing vulnerability 267 / 782 / CVE-2021-3444
[-] CVE-2021-3444 - missing vulnerability path from advisory
[*] Testing vulnerability 268 / 782 / CVE-2019-3819
[*] Testing vulnerability 269 / 782 / CVE-2019-11884
[*] Testing vulnerability 270 / 782 / CVE-2020-15780
[*] Testing vulnerability 271 / 782 / CVE-2019-15926
[-] CVE-2019-15926 - missing vulnerability path from advisory
[*] Testing vulnerability 272 / 782 / CVE-2019-16746
[*] Testing vulnerability 273 / 782 / CVE-2019-19075
[*] Testing vulnerability 274 / 782 / CVE-2020-11609
[*] Testing vulnerability 275 / 782 / CVE-2020-11608
[*] Testing vulnerability 276 / 782 / CVE-2019-15090
[*] Testing vulnerability 277 / 782 / CVE-2019-15030
[-] Vulnerable path for different architecture found for arch/powerpc/kernel/process.c - not further processing CVE-2019-15030
[*] Testing vulnerability 278 / 782 / CVE-2019-15214
[+] CVE-2019-3819 (4.9/4.4) - drivers/hid/hid-debug.c verified - exported symbol (gpl)
[*] Testing vulnerability 279 / 782 / CVE-2019-19065
[*] Testing vulnerability 280 / 782 / CVE-2019-20908
[*] Testing vulnerability 281 / 782 / CVE-2019-10220
[-] CVE-2019-10220 - missing vulnerability path from advisory
[*] Testing vulnerability 282 / 782 / CVE-2020-12768
[-] Vulnerable path for different architecture found for arch/x86/kvm/svm.c - not further processing CVE-2020-12768
[*] Testing vulnerability 283 / 782 / CVE-2019-12817
[-] Vulnerable path for different architecture found for arch/powerpc/mm/mmu_context_book3s64.c - not further processing CVE-2019-12817
[*] Testing vulnerability 284 / 782 / CVE-2020-14385
[-] CVE-2020-14385 - missing vulnerability path from advisory
[*] Testing vulnerability 285 / 782 / CVE-2019-15504
[*] Testing vulnerability 286 / 782 / CVE-2019-15925
[-] CVE-2019-15925 - missing vulnerability path from advisory
[*] Testing vulnerability 287 / 782 / CVE-2020-25641
[-] CVE-2020-25641 - missing vulnerability path from advisory
[*] Testing vulnerability 288 / 782 / CVE-2019-18813
[*] Testing vulnerability 289 / 782 / CVE-2019-19067
[*] Testing vulnerability 290 / 782 / CVE-2019-19047
[*] Testing vulnerability 291 / 782 / CVE-2019-19076
[-] CVE-2019-19076 - drivers/net/ethernet/netronome/nfp/abm/cls.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 292 / 782 / CVE-2019-19079
[*] Testing vulnerability 293 / 782 / CVE-2019-19072
[*] Testing vulnerability 294 / 782 / CVE-2019-19059
[*] Testing vulnerability 295 / 782 / CVE-2019-19043
[*] Testing vulnerability 296 / 782 / CVE-2019-19048
[*] Testing vulnerability 297 / 782 / CVE-2019-19055
[*] Testing vulnerability 298 / 782 / CVE-2019-19077
[*] Testing vulnerability 299 / 782 / CVE-2019-19526
[*] Testing vulnerability 300 / 782 / CVE-2019-19602
[-] Vulnerable path for different architecture found for arch/x86/include/asm/fpu/internal.h - not further processing CVE-2019-19602
[*] Testing vulnerability 301 / 782 / CVE-2019-3887
[-] CVE-2019-3887 - missing vulnerability path from advisory
[*] Testing vulnerability 302 / 782 / CVE-2020-12826
[*] Testing vulnerability 303 / 782 / CVE-2023-0458
[-] CVE-2023-0458 - missing vulnerability path from advisory
[*] Testing vulnerability 304 / 782 / CVE-2022-0171
[-] CVE-2022-0171 - missing vulnerability path from advisory
[*] Testing vulnerability 305 / 782 / CVE-2022-0617
[-] CVE-2022-0617 - missing vulnerability path from advisory
[*] Testing vulnerability 306 / 782 / CVE-2022-0494
[*] Testing vulnerability 307 / 782 / CVE-2022-0854
[-] CVE-2022-0854 - missing vulnerability path from advisory
[*] Testing vulnerability 308 / 782 / CVE-2023-1998
[-] CVE-2023-1998 - missing vulnerability path from advisory
[*] Testing vulnerability 309 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 310 / 782 / This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.
[-] This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects. - missing vulnerability path from advisory
[*] Testing vulnerability 311 / 782 / 
[-]  - missing vulnerability path from advisory
[+] CVE-2022-0494 (4.9/4.4) - drivers/scsi/scsi_ioctl.c verified - exported symbol
[*] Testing vulnerability 312 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 313 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 314 / 782 / CVE-2022-1195
[-] CVE-2022-1195 - missing vulnerability path from advisory
[*] Testing vulnerability 315 / 782 / CVE-2022-1204
[-] CVE-2022-1204 - missing vulnerability path from advisory
[*] Testing vulnerability 316 / 782 / CVE-2021-20317
[-] CVE-2021-20317 - missing vulnerability path from advisory
[*] Testing vulnerability 317 / 782 / CVE-2022-1419
[-] CVE-2022-1419 - missing vulnerability path from advisory
[*] Testing vulnerability 318 / 782 / CVE-2021-20321
[-] CVE-2021-20321 - missing vulnerability path from advisory
[*] Testing vulnerability 319 / 782 / CVE-2022-2153
[-] CVE-2022-2153 - missing vulnerability path from advisory
[*] Testing vulnerability 320 / 782 / CVE-2022-24448
[*] Testing vulnerability 321 / 782 / CVE-2020-25211
[-] CVE-2020-25211 - missing vulnerability path from advisory
[*] Testing vulnerability 322 / 782 / CVE-2022-24959
[-] CVE-2022-24959 - missing vulnerability path from advisory
[*] Testing vulnerability 323 / 782 / CVE-2022-25375
[*] Testing vulnerability 324 / 782 / CVE-2020-27830
[-] CVE-2020-27830 - missing vulnerability path from advisory
[*] Testing vulnerability 325 / 782 / CVE-2020-28374
[*] Testing vulnerability 326 / 782 / CVE-2022-26365
[-] CVE-2022-26365 - missing vulnerability path from advisory
[*] Testing vulnerability 327 / 782 / CVE-2021-28714
[-] CVE-2021-28714 - missing vulnerability path from advisory
[*] Testing vulnerability 328 / 782 / CVE-2021-28715
[-] CVE-2021-28715 - missing vulnerability path from advisory
[*] Testing vulnerability 329 / 782 / CVE-2020-36311
[-] CVE-2020-36311 - arch/x86/kvm/svm/sev.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 330 / 782 / CVE-2022-28356
[-] CVE-2022-28356 - missing vulnerability path from advisory
[*] Testing vulnerability 331 / 782 / CVE-2022-2905
[-] CVE-2022-2905 - missing vulnerability path from advisory
[*] Testing vulnerability 332 / 782 / CVE-2022-3028
[-] CVE-2022-3028 - missing vulnerability path from advisory
[*] Testing vulnerability 333 / 782 / CVE-2022-2978
[-] CVE-2022-2978 - missing vulnerability path from advisory
[*] Testing vulnerability 334 / 782 / CVE-2021-34693
[*] Testing vulnerability 335 / 782 / CVE-2021-33655
[-] CVE-2021-33655 - missing vulnerability path from advisory
[*] Testing vulnerability 336 / 782 / CVE-2021-33656
[-] CVE-2021-33656 - missing vulnerability path from advisory
[*] Testing vulnerability 337 / 782 / CVE-2021-3347
[-] CVE-2021-3347 - missing vulnerability path from advisory
[*] Testing vulnerability 338 / 782 / CVE-2021-3679
[-] CVE-2021-3679 - missing vulnerability path from advisory
[*] Testing vulnerability 339 / 782 / CVE-2022-3635
[*] Testing vulnerability 340 / 782 / CVE-2022-33981
[*] Testing vulnerability 341 / 782 / CVE-2022-3303
[-] CVE-2022-3303 - missing vulnerability path from advisory
[*] Testing vulnerability 342 / 782 / CVE-2022-3586
[-] CVE-2022-3586 - missing vulnerability path from advisory
[*] Testing vulnerability 343 / 782 / CVE-2021-4037
[-] CVE-2021-4037 - missing vulnerability path from advisory
[*] Testing vulnerability 344 / 782 / CVE-2022-3594
[*] Testing vulnerability 345 / 782 / CVE-2021-4159
[-] CVE-2021-4159 - missing vulnerability path from advisory
[*] Testing vulnerability 346 / 782 / CVE-2022-3521
[*] Testing vulnerability 347 / 782 / CVE-2022-39188
[*] Testing vulnerability 348 / 782 / CVE-2022-39190
[*] Testing vulnerability 349 / 782 / CVE-2022-40307
[*] Testing vulnerability 350 / 782 / CVE-2021-45095
[*] Testing vulnerability 351 / 782 / CVE-2022-39842
[-] CVE-2022-39842 - missing vulnerability path from advisory
[*] Testing vulnerability 352 / 782 / CVE-2021-45480
[*] Testing vulnerability 353 / 782 / CVE-2022-40768
[*] Testing vulnerability 354 / 782 / CVE-2022-3625
[*] Testing vulnerability 355 / 782 / CVE-2022-41222
[*] Testing vulnerability 356 / 782 / CVE-2022-41849
[*] Testing vulnerability 357 / 782 / CVE-2022-41850
[*] Testing vulnerability 358 / 782 / CVE-2022-42329
[-] CVE-2022-42329 - missing vulnerability path from advisory
[*] Testing vulnerability 359 / 782 / CVE-2022-42328
[-] CVE-2022-42328 - missing vulnerability path from advisory
[*] Testing vulnerability 360 / 782 / CVE-2022-43750
[*] Testing vulnerability 361 / 782 / CVE-2022-33740
[-] CVE-2022-33740 - missing vulnerability path from advisory
[*] Testing vulnerability 362 / 782 / CVE-2022-33741
[-] CVE-2022-33741 - missing vulnerability path from advisory
[*] Testing vulnerability 363 / 782 / CVE-2022-33742
[-] CVE-2022-33742 - missing vulnerability path from advisory
[*] Testing vulnerability 364 / 782 / CVE-2022-33744
[-] CVE-2022-33744 - missing vulnerability path from advisory
[*] Testing vulnerability 365 / 782 / CVE-2022-0487
[*] Testing vulnerability 366 / 782 / CVE-2022-1789
[-] CVE-2022-1789 - missing vulnerability path from advisory
[*] Testing vulnerability 367 / 782 / CVE-2023-23455
[*] Testing vulnerability 368 / 782 / CVE-2023-23454
[*] Testing vulnerability 369 / 782 / CVE-2020-36310
[-] CVE-2020-36310 - arch/x86/kvm/svm/svm.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 370 / 782 / CVE-2022-29582
[-] CVE-2022-29582 - fs/io_uring.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 371 / 782 / CVE-2022-41218
[*] Testing vulnerability 372 / 782 / CVE-2022-36280
[-] CVE-2022-36280 - drivers/gpu/vmxgfx/vmxgfx_kms.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 373 / 782 / CVE-2022-47929
[-] CVE-2022-47929 - missing vulnerability path from advisory
[*] Testing vulnerability 374 / 782 / CVE-2021-38166
[*] Testing vulnerability 375 / 782 / CVE-2023-3090
[-] CVE-2023-3090 - missing vulnerability path from advisory
[*] Testing vulnerability 376 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 377 / 782 / The out-of-bounds write is caused by missing skb->cb  initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.
[-] The out-of-bounds write is caused by missing skb->cb  initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. - missing vulnerability path from advisory
[*] Testing vulnerability 378 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 379 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 380 / 782 / We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.
[-] We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e. - missing vulnerability path from advisory
[*] Testing vulnerability 381 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 382 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 383 / 782 / CVE-2019-15666
[*] Testing vulnerability 384 / 782 / CVE-2019-15807
[*] Testing vulnerability 385 / 782 / CVE-2019-15917
[-] CVE-2019-15917 - missing vulnerability path from advisory
[*] Testing vulnerability 386 / 782 / CVE-2019-19523
[*] Testing vulnerability 387 / 782 / CVE-2019-19531
[*] Testing vulnerability 388 / 782 / CVE-2019-19525
[*] Testing vulnerability 389 / 782 / CVE-2019-19527
[*] Testing vulnerability 390 / 782 / CVE-2019-19530
[*] Testing vulnerability 391 / 782 / CVE-2019-19536
[*] Testing vulnerability 392 / 782 / CVE-2020-8647
[-] CVE-2020-8647 - missing vulnerability path from advisory
[*] Testing vulnerability 393 / 782 / CVE-2020-8649
[-] CVE-2020-8649 - missing vulnerability path from advisory
[*] Testing vulnerability 394 / 782 / CVE-2020-10781
[-] CVE-2020-10781 - missing vulnerability path from advisory
[*] Testing vulnerability 395 / 782 / CVE-2021-20292
[*] Testing vulnerability 396 / 782 / CVE-2020-14351
[-] CVE-2020-14351 - missing vulnerability path from advisory
[*] Testing vulnerability 397 / 782 / CVE-2020-14386
[-] CVE-2020-14386 - missing vulnerability path from advisory
[*] Testing vulnerability 398 / 782 / CVE-2020-14390
[-] CVE-2020-14390 - missing vulnerability path from advisory
[*] Testing vulnerability 399 / 782 / CVE-2021-23134
[-] CVE-2021-23134 - missing vulnerability path from advisory
[*] Testing vulnerability 400 / 782 / CVE-2020-25284
[*] Testing vulnerability 401 / 782 / CVE-2020-27673
[-] CVE-2020-27673 - missing vulnerability path from advisory
[*] Testing vulnerability 402 / 782 / CVE-2020-27675
[*] Testing vulnerability 403 / 782 / CVE-2020-28974
[*] Testing vulnerability 404 / 782 / CVE-2021-26931
[*] Testing vulnerability 405 / 782 / CVE-2020-28941
[-] CVE-2020-28941 - drivers/accessibility/speakup/spk_ttyio.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 406 / 782 / CVE-2021-26930
[-] CVE-2021-26930 - missing vulnerability path from advisory
[*] Testing vulnerability 407 / 782 / CVE-2021-28688
[-] CVE-2021-28688 - missing vulnerability path from advisory
[*] Testing vulnerability 408 / 782 / CVE-2021-28950
[+] CVE-2020-28974 (6.1/5) - drivers/tty/vt/vt.c verified - exported symbol
[*] Testing vulnerability 409 / 782 / CVE-2021-29155
[*] Testing vulnerability 410 / 782 / CVE-2021-29264
[*] Testing vulnerability 411 / 782 / CVE-2021-30002
[*] Testing vulnerability 412 / 782 / CVE-2021-29650
[*] Testing vulnerability 413 / 782 / CVE-2021-29265
[*] Testing vulnerability 414 / 782 / CVE-2021-29647
[*] Testing vulnerability 415 / 782 / CVE-2021-3178
[*] Testing vulnerability 416 / 782 / CVE-2021-31829
[*] Testing vulnerability 417 / 782 / CVE-2021-31916
[+] CVE-2021-29650 (4.9/5.5) - net/netfilter/x_tables.c verified - exported symbol
[*] Testing vulnerability 418 / 782 / CVE-2021-34556
[-] CVE-2021-34556 - missing vulnerability path from advisory
[*] Testing vulnerability 419 / 782 / CVE-2021-33624
[*] Testing vulnerability 420 / 782 / CVE-2021-35039
[*] Testing vulnerability 421 / 782 / CVE-2021-33034
[*] Testing vulnerability 422 / 782 / CVE-2021-3564
[-] CVE-2021-3564 - missing vulnerability path from advisory
[*] Testing vulnerability 423 / 782 / CVE-2021-35477
[+] CVE-2021-35039 (6.9/7.8) - kernel/module.c verified - exported symbol
[-] CVE-2021-35477 - missing vulnerability path from advisory
[*] Testing vulnerability 424 / 782 / CVE-2021-3653
[-] CVE-2021-3653 - missing vulnerability path from advisory
[*] Testing vulnerability 425 / 782 / CVE-2021-3655
[-] CVE-2021-3655 - missing vulnerability path from advisory
[*] Testing vulnerability 426 / 782 / CVE-2021-3348
[*] Testing vulnerability 427 / 782 / CVE-2021-38198
[-] CVE-2021-38198 - arch/x86/kvm/mmu/paging_tmpl.h - vulnerable source file not found in kernel sources
[*] Testing vulnerability 428 / 782 / CVE-2021-38204
[*] Testing vulnerability 429 / 782 / CVE-2021-38205
[*] Testing vulnerability 430 / 782 / CVE-2021-4149
[*] Testing vulnerability 431 / 782 / CVE-2019-19046
[*] Testing vulnerability 432 / 782 / CVE-2019-18811
[-] CVE-2019-18811 - sound/soc/sof/ipc.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 433 / 782 / CVE-2019-19070
[*] Testing vulnerability 434 / 782 / CVE-2019-19073
[*] Testing vulnerability 435 / 782 / CVE-2019-19769
[-] CVE-2019-19769 - missing vulnerability path from advisory
[*] Testing vulnerability 436 / 782 / CVE-2021-26934
[-] CVE-2021-26934 - missing vulnerability path from advisory
[*] Testing vulnerability 437 / 782 / CVE-2021-29649
[-] CVE-2021-29649 - kernel/usermode_driver.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 438 / 782 / CVE-2021-29646
[*] Testing vulnerability 439 / 782 / CVE-2021-30178
[-] Vulnerable path for different architecture found for arch/x86/kvm/hyperv.c - not further processing CVE-2021-30178
[*] Testing vulnerability 440 / 782 / CVE-2021-29648
[*] Testing vulnerability 441 / 782 / CVE-2021-20239
[-] CVE-2021-20239 - missing vulnerability path from advisory
[*] Testing vulnerability 442 / 782 / CVE-2021-37576
[-] Vulnerable path for different architecture found for arch/powerpc/kvm/book3s_rtas.c - not further processing CVE-2021-37576
[*] Testing vulnerability 443 / 782 / CVE-2021-20320
[-] Vulnerable path for different architecture found for arch/s390/net/bpf_jit_comp.c - not further processing CVE-2021-20320
[*] Testing vulnerability 444 / 782 / CVE-2021-3573
[-] CVE-2021-3573 - missing vulnerability path from advisory
[*] Testing vulnerability 445 / 782 / CVE-2021-3635
[-] CVE-2021-3635 - missing vulnerability path from advisory
[*] Testing vulnerability 446 / 782 / CVE-2021-3847
[-] CVE-2021-3847 - missing vulnerability path from advisory
[*] Testing vulnerability 447 / 782 / CVE-2021-4095
[-] CVE-2021-4095 - missing vulnerability path from advisory
[*] Testing vulnerability 448 / 782 / CVE-2022-0433
[-] CVE-2022-0433 - missing vulnerability path from advisory
[*] Testing vulnerability 449 / 782 / CVE-2022-1015
[-] CVE-2022-1015 - linux/net/netfilter/nf_tables_api.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 450 / 782 / CVE-2021-4023
[-] CVE-2021-4023 - missing vulnerability path from advisory
[*] Testing vulnerability 451 / 782 / CVE-2021-4148
[*] Testing vulnerability 452 / 782 / CVE-2023-1611
[+] CVE-2021-4148 (4.9/5.5) - fs/buffer.c verified - exported symbol
[*] Testing vulnerability 453 / 782 / CVE-2023-1513
[-] CVE-2023-1513 - missing vulnerability path from advisory
[*] Testing vulnerability 454 / 782 / CVE-2023-3269
[-] CVE-2023-3269 - missing vulnerability path from advisory
[*] Testing vulnerability 455 / 782 / CVE-2021-3923
[-] CVE-2021-3923 - missing vulnerability path from advisory
[*] Testing vulnerability 456 / 782 / CVE-2023-1206
[-] CVE-2023-1206 - missing vulnerability path from advisory
[*] Testing vulnerability 457 / 782 / CVE-2023-2194
[-] CVE-2023-2194 - missing vulnerability path from advisory
[*] Testing vulnerability 458 / 782 / CVE-2023-3161
[-] CVE-2023-3161 - missing vulnerability path from advisory
[*] Testing vulnerability 459 / 782 / CVE-2023-3212
[-] CVE-2023-3212 - missing vulnerability path from advisory
[*] Testing vulnerability 460 / 782 / CVE-2023-0030
[-] CVE-2023-0030 - missing vulnerability path from advisory
[*] Testing vulnerability 461 / 782 / CVE-2023-0240
[-] CVE-2023-0240 - missing vulnerability path from advisory
[*] Testing vulnerability 462 / 782 / CVE-2023-0266
[-] CVE-2023-0266 - missing vulnerability path from advisory
[*] Testing vulnerability 463 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 464 / 782 / CVE-2023-0469
[-] CVE-2023-0469 - io_uring/filetable.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 465 / 782 / CVE-2023-0459
[-] CVE-2023-0459 - missing vulnerability path from advisory
[*] Testing vulnerability 466 / 782 / CVE-2023-0394
[*] Testing vulnerability 467 / 782 / CVE-2023-0468
[-] CVE-2023-0468 - io_uring/poll.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 468 / 782 / CVE-2023-0590
[*] Testing vulnerability 469 / 782 / CVE-2023-0615
[-] CVE-2023-0615 - missing vulnerability path from advisory
[*] Testing vulnerability 470 / 782 / CVE-2019-10638
[-] CVE-2019-10638 - missing vulnerability path from advisory
[*] Testing vulnerability 471 / 782 / CVE-2020-10720
[-] CVE-2020-10720 - missing vulnerability path from advisory
[*] Testing vulnerability 472 / 782 / CVE-2020-10767
[-] CVE-2020-10767 - missing vulnerability path from advisory
[*] Testing vulnerability 473 / 782 / CVE-2023-1079
[-] CVE-2023-1079 - missing vulnerability path from advisory
[*] Testing vulnerability 474 / 782 / CVE-2022-0264
[-] CVE-2022-0264 - missing vulnerability path from advisory
[*] Testing vulnerability 475 / 782 / CVE-2022-0168
[*] Testing vulnerability 476 / 782 / CVE-2020-10766
[-] CVE-2020-10766 - missing vulnerability path from advisory
[*] Testing vulnerability 477 / 782 / CVE-2023-1095
[-] CVE-2023-1095 - missing vulnerability path from advisory
[*] Testing vulnerability 478 / 782 / CVE-2020-10768
[-] CVE-2020-10768 - missing vulnerability path from advisory
[*] Testing vulnerability 479 / 782 / CVE-2023-1195
[*] Testing vulnerability 480 / 782 / CVE-2023-1382
[*] Testing vulnerability 481 / 782 / CVE-2022-0480
[*] Testing vulnerability 482 / 782 / CVE-2023-1582
[*] Testing vulnerability 483 / 782 / CVE-2022-0382
[-] CVE-2022-0382 - missing vulnerability path from advisory
[*] Testing vulnerability 484 / 782 / CVE-2023-1249
[-] CVE-2023-1249 - missing vulnerability path from advisory
[*] Testing vulnerability 485 / 782 / CVE-2020-11669
[-] Vulnerable path for different architecture found for arch/powerpc/kernel/idle_book3s.S - not further processing CVE-2020-11669
[+] CVE-2022-0480 (null/5.5) - fs/locks.c verified - exported symbol
[*] Testing vulnerability 486 / 782 / CVE-2019-11191
[-] CVE-2019-11191 - missing vulnerability path from advisory
[*] Testing vulnerability 487 / 782 / CVE-2020-11725
[*] Testing vulnerability 488 / 782 / CVE-2023-1872
[-] CVE-2023-1872 - missing vulnerability path from advisory
[*] Testing vulnerability 489 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 490 / 782 / The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.
[-] The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. - missing vulnerability path from advisory
[*] Testing vulnerability 491 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 492 / 782 / We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
[-] We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. - missing vulnerability path from advisory
[*] Testing vulnerability 493 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 494 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 495 / 782 / CVE-2023-1859
[*] Testing vulnerability 496 / 782 / CVE-2020-11668
[*] Testing vulnerability 497 / 782 / CVE-2023-1855
[*] Testing vulnerability 498 / 782 / CVE-2023-1838
[*] Testing vulnerability 499 / 782 / CVE-2023-1989
[*] Found file name driversluetoothtsdio.c for CVE-2023-1989 without path details ... looking for candidates now
[-] CVE-2023-1989 - driversluetoothtsdio.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 500 / 782 / CVE-2023-2006
[-] CVE-2023-2006 - missing vulnerability path from advisory
[*] Testing vulnerability 501 / 782 / CVE-2022-0850
[-] CVE-2022-0850 - missing vulnerability path from advisory
[*] Testing vulnerability 502 / 782 / CVE-2023-1829
[-] CVE-2023-1829 - missing vulnerability path from advisory
[*] Testing vulnerability 503 / 782 / We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
[-] We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. - missing vulnerability path from advisory
[*] Testing vulnerability 504 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 505 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 506 / 782 / CVE-2019-11599
[-] CVE-2019-11599 - missing vulnerability path from advisory
[*] Testing vulnerability 507 / 782 / CVE-2023-2007
[-] CVE-2023-2007 - missing vulnerability path from advisory
[*] Testing vulnerability 508 / 782 / CVE-2023-1990
[*] Testing vulnerability 509 / 782 / CVE-2023-2002
[*] Testing vulnerability 510 / 782 / CVE-2023-2008
[-] CVE-2023-2008 - missing vulnerability path from advisory
[*] Testing vulnerability 511 / 782 / CVE-2022-1016
[-] CVE-2022-1016 - missing vulnerability path from advisory
[*] Testing vulnerability 512 / 782 / CVE-2022-0812
[*] Testing vulnerability 513 / 782 / CVE-2022-1012
[*] Testing vulnerability 514 / 782 / CVE-2023-2019
[-] CVE-2023-2019 - missing vulnerability path from advisory
[*] Testing vulnerability 515 / 782 / CVE-2019-11811
[-] CVE-2019-11811 - missing vulnerability path from advisory
[*] Testing vulnerability 516 / 782 / CVE-2022-1198
[*] Testing vulnerability 517 / 782 / CVE-2023-2124
[-] CVE-2023-2124 - missing vulnerability path from advisory
[*] Testing vulnerability 518 / 782 / CVE-2021-20177
[-] CVE-2021-20177 - missing vulnerability path from advisory
[*] Testing vulnerability 519 / 782 / CVE-2022-1263
[+] CVE-2022-1012 (null/8.2) - net/ipv4/tcp.c verified - exported symbol
[-] CVE-2022-1263 - missing vulnerability path from advisory
[*] Testing vulnerability 520 / 782 / CVE-2023-2166
[*] Testing vulnerability 521 / 782 / CVE-2019-12380
[-] Vulnerable path for different architecture found for arch/x86/platform/efi/efi.c - not further processing CVE-2019-12380
[-] Vulnerable path for different architecture found for arch/x86/platform/efi/efi_64.c - not further processing CVE-2019-12380
[*] Testing vulnerability 522 / 782 / CVE-2021-20268
[-] CVE-2021-20268 - missing vulnerability path from advisory
[*] Testing vulnerability 523 / 782 / CVE-2022-1651
[-] CVE-2022-1651 - drivers/virt/acrn/hsm.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 524 / 782 / CVE-2019-12381
[*] Testing vulnerability 525 / 782 / CVE-2022-1205
[-] CVE-2022-1205 - missing vulnerability path from advisory
[*] Testing vulnerability 526 / 782 / CVE-2020-12654
[*] Testing vulnerability 527 / 782 / CVE-2019-12455
[*] Testing vulnerability 528 / 782 / CVE-2023-2162
[*] Testing vulnerability 529 / 782 / CVE-2022-1508
[-] CVE-2022-1508 - missing vulnerability path from advisory
[*] Testing vulnerability 530 / 782 / CVE-2019-12379
[+] CVE-2019-12381 (4.9/5.5) - net/ipv4/ip_sockglue.c verified - exported symbol
[*] Testing vulnerability 531 / 782 / CVE-2020-12465
[*] Testing vulnerability 532 / 782 / CVE-2019-12454
[-] CVE-2019-12454 - sound/soc/codecs/wcd9335.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 533 / 782 / CVE-2020-12659
[*] Testing vulnerability 534 / 782 / CVE-2022-1852
[-] CVE-2022-1852 - missing vulnerability path from advisory
[+] CVE-2019-12379 (4.9/5.5) - drivers/tty/vt/consolemap.c verified - exported symbol
[*] Testing vulnerability 535 / 782 / CVE-2019-12382
[*] Testing vulnerability 536 / 782 / CVE-2019-12378
[*] Testing vulnerability 537 / 782 / CVE-2019-12456
[*] Testing vulnerability 538 / 782 / CVE-2020-12464
[*] Testing vulnerability 539 / 782 / CVE-2020-12655
[*] Testing vulnerability 540 / 782 / CVE-2019-13233
[-] Vulnerable path for different architecture found for arch/x86/lib/insn-eval.c - not further processing CVE-2019-13233
[*] Testing vulnerability 541 / 782 / CVE-2023-2177
[*] Testing vulnerability 542 / 782 / CVE-2020-12652
[*] Testing vulnerability 543 / 782 / CVE-2019-12818
[*] Testing vulnerability 544 / 782 / CVE-2020-12657
[*] Testing vulnerability 545 / 782 / CVE-2019-12819
[*] Testing vulnerability 546 / 782 / CVE-2019-12984
[*] Testing vulnerability 547 / 782 / CVE-2019-13631
[*] Testing vulnerability 548 / 782 / CVE-2019-13648
[-] Vulnerable path for different architecture found for arch/powerpc/kernel/signal_32.c - not further processing CVE-2019-13648
[*] Testing vulnerability 549 / 782 / CVE-2023-23000
[+] CVE-2019-12819 (2.1/5.5) - drivers/net/phy/mdio_bus.c verified - exported symbol
[*] Testing vulnerability 550 / 782 / CVE-2019-14283
[*] Testing vulnerability 551 / 782 / CVE-2023-23039
[*] Testing vulnerability 552 / 782 / CVE-2019-14284
[*] Testing vulnerability 553 / 782 / CVE-2019-15291
[*] Testing vulnerability 554 / 782 / CVE-2023-22997
[-] CVE-2023-22997 - kernel/module/decompress.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 555 / 782 / CVE-2022-2196
[-] CVE-2022-2196 - missing vulnerability path from advisory
[*] Testing vulnerability 556 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 557 / 782 / CVE-2023-22999
[*] Testing vulnerability 558 / 782 / CVE-2020-14331
[-] CVE-2020-14331 - missing vulnerability path from advisory
[*] Testing vulnerability 559 / 782 / CVE-2023-22998
[*] Testing vulnerability 560 / 782 / CVE-2023-23002
[*] Testing vulnerability 561 / 782 / CVE-2023-23005
[-] CVE-2023-23005 - mm/memory-tiers.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 562 / 782 / CVE-2023-23001
[-] CVE-2023-23001 - drivers/scsi/ufs/ufs-mediatek.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 563 / 782 / CVE-2020-14416
[*] Testing vulnerability 564 / 782 / CVE-2023-23003
[-] CVE-2023-23003 - tools/perf/util/expr.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 565 / 782 / CVE-2023-23006
[-] CVE-2023-23006 - drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 566 / 782 / CVE-2023-22995
[*] Testing vulnerability 567 / 782 / CVE-2019-15118
[*] Testing vulnerability 568 / 782 / CVE-2023-22996
[-] CVE-2023-22996 - drivers/soc/qcom/qcom_aoss.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 569 / 782 / CVE-2020-14381
[-] CVE-2020-14381 - missing vulnerability path from advisory
[*] Testing vulnerability 570 / 782 / CVE-2019-15919
[*] Testing vulnerability 571 / 782 / CVE-2023-23004
[*] Testing vulnerability 572 / 782 / CVE-2019-15921
[-] CVE-2019-15921 - missing vulnerability path from advisory
[*] Testing vulnerability 573 / 782 / CVE-2019-15923
[-] CVE-2019-15923 - missing vulnerability path from advisory
[*] Testing vulnerability 574 / 782 / CVE-2019-15924
[*] Testing vulnerability 575 / 782 / CVE-2019-15920
[*] Testing vulnerability 576 / 782 / CVE-2019-15922
[-] CVE-2019-15922 - missing vulnerability path from advisory
[*] Testing vulnerability 577 / 782 / CVE-2020-15437
[-] CVE-2020-15437 - missing vulnerability path from advisory
[*] Testing vulnerability 578 / 782 / CVE-2019-15117
[*] Testing vulnerability 579 / 782 / CVE-2019-17056
[*] Testing vulnerability 580 / 782 / CVE-2023-25012
[-] CVE-2023-25012 - drivers/hid/hid-bigbenff.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 581 / 782 / CVE-2019-16089
[*] Testing vulnerability 582 / 782 / CVE-2019-16994
[*] Testing vulnerability 583 / 782 / CVE-2019-17053
[*] Testing vulnerability 584 / 782 / CVE-2019-17075
[*] Testing vulnerability 585 / 782 / CVE-2019-16413
[-] CVE-2019-16413 - missing vulnerability path from advisory
[*] Testing vulnerability 586 / 782 / CVE-2019-17054
[*] Testing vulnerability 587 / 782 / CVE-2023-2513
[-] CVE-2023-2513 - missing vulnerability path from advisory
[*] Testing vulnerability 588 / 782 / CVE-2019-17351
[*] Testing vulnerability 589 / 782 / CVE-2023-26242
[*] Testing vulnerability 590 / 782 / CVE-2019-19037
[*] Testing vulnerability 591 / 782 / CVE-2019-19064
[*] Testing vulnerability 592 / 782 / CVE-2019-19080
[*] Testing vulnerability 593 / 782 / CVE-2019-19036
[*] Testing vulnerability 594 / 782 / CVE-2019-18807
[-] CVE-2019-18807 - drivers/net/dsa/sja1105/sja1105_spi.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 595 / 782 / CVE-2019-19081
[*] Testing vulnerability 596 / 782 / CVE-2019-18806
[*] Testing vulnerability 597 / 782 / CVE-2019-18814
[-] CVE-2019-18814 - missing vulnerability path from advisory
[*] Testing vulnerability 598 / 782 / CVE-2019-19049
[*] Found file name unittest.c for CVE-2019-19049 without path details ... looking for candidates now
[-] CVE-2019-19049 - unittest.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 599 / 782 / CVE-2019-19338
[-] CVE-2019-19338 - missing vulnerability path from advisory
[*] Testing vulnerability 600 / 782 / CVE-2020-25705
[-] CVE-2020-25705 - missing vulnerability path from advisory
[*] Testing vulnerability 601 / 782 / CVE-2020-27152
[-] Vulnerable path for different architecture found for arch/x86/kvm/ioapic.c - not further processing CVE-2020-27152
[*] Testing vulnerability 602 / 782 / CVE-2019-19241
[-] CVE-2019-19241 - missing vulnerability path from advisory
[*] Testing vulnerability 603 / 782 / CVE-2019-18885
[*] Testing vulnerability 604 / 782 / CVE-2022-2380
[-] CVE-2022-2380 - missing vulnerability path from advisory
[*] Testing vulnerability 605 / 782 / CVE-2020-26541
[*] Testing vulnerability 606 / 782 / CVE-2019-19533
[*] Testing vulnerability 607 / 782 / CVE-2019-19537
[-] CVE-2019-19537 - missing vulnerability path from advisory
[*] Testing vulnerability 608 / 782 / CVE-2019-19252
[*] Testing vulnerability 609 / 782 / CVE-2020-27194
[*] Testing vulnerability 610 / 782 / CVE-2019-19767
[*] Testing vulnerability 611 / 782 / CVE-2019-19770
[*] Testing vulnerability 612 / 782 / CVE-2019-19227
[*] Testing vulnerability 613 / 782 / CVE-2019-19528
[*] Testing vulnerability 614 / 782 / CVE-2019-19532
[-] CVE-2019-19532 - missing vulnerability path from advisory
[*] Testing vulnerability 615 / 782 / CVE-2022-2503
[-] CVE-2022-2503 - missing vulnerability path from advisory
[*] Testing vulnerability 616 / 782 / CVE-2019-19543
[-] CVE-2019-19543 - missing vulnerability path from advisory
[*] Testing vulnerability 617 / 782 / CVE-2019-20422
[*] Testing vulnerability 618 / 782 / CVE-2019-20806
[-] CVE-2019-20806 - missing vulnerability path from advisory
[*] Testing vulnerability 619 / 782 / CVE-2020-29371
[*] Testing vulnerability 620 / 782 / CVE-2019-20636
[*] Testing vulnerability 621 / 782 / CVE-2020-29373
[-] CVE-2020-29373 - fs/io_uring.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 622 / 782 / CVE-2019-20812
[+] CVE-2019-19770 (6.4/8.2) - fs/debugfs/inode.c verified - exported symbol (gpl)
[*] Testing vulnerability 623 / 782 / CVE-2020-28915
[-] CVE-2020-28915 - missing vulnerability path from advisory
[*] Testing vulnerability 624 / 782 / CVE-2018-20854
[-] CVE-2018-20854 - drivers/phy/mscc/phy-ocelot-serdes.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 625 / 782 / CVE-2020-35499
[*] Testing vulnerability 626 / 782 / CVE-2020-35501
[+] CVE-2019-20636 (7.2/6.7) - drivers/input/input.c verified - exported symbol
[-] CVE-2020-35501 - missing vulnerability path from advisory
[*] Testing vulnerability 627 / 782 / CVE-2022-26878
[-] CVE-2022-26878 - drivers/bluetooth/virtio_bt.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 628 / 782 / CVE-2020-36313
[-] CVE-2020-36313 - missing vulnerability path from advisory
[*] Testing vulnerability 629 / 782 / CVE-2020-36694
[-] CVE-2020-36694 - missing vulnerability path from advisory
[*] Testing vulnerability 630 / 782 / CVE-2020-36557
[-] CVE-2020-36557 - missing vulnerability path from advisory
[*] Testing vulnerability 631 / 782 / CVE-2020-36386
[*] Testing vulnerability 632 / 782 / CVE-2020-36558
[-] CVE-2020-36558 - missing vulnerability path from advisory
[*] Testing vulnerability 633 / 782 / CVE-2020-36691
[*] Testing vulnerability 634 / 782 / CVE-2020-36312
[*] Testing vulnerability 635 / 782 / CVE-2023-28466
[*] Testing vulnerability 636 / 782 / CVE-2023-28327
[*] Testing vulnerability 637 / 782 / CVE-2023-28328
[-] CVE-2023-28328 - drivers/media/usb/dev-usb/az6027.c - vulnerable source file not found in kernel sources
[+] CVE-2020-36691 (null/5.5) - lib/nlattr.c verified - exported symbol
[*] Testing vulnerability 638 / 782 / CVE-2023-28464
[*] Testing vulnerability 639 / 782 / CVE-2022-2785
[-] CVE-2022-2785 - missing vulnerability path from advisory
[*] Testing vulnerability 640 / 782 / CVE-2022-27950
[*] Testing vulnerability 641 / 782 / CVE-2023-3111
[*] Testing vulnerability 642 / 782 / CVE-2023-3117
[-] CVE-2023-3117 - missing vulnerability path from advisory
[*] Testing vulnerability 643 / 782 / CVE-2023-3159
[-] CVE-2023-3159 - missing vulnerability path from advisory
[*] Testing vulnerability 644 / 782 / CVE-2023-28866
[-] CVE-2023-28866 - net/bluetooth/hci_sync.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 645 / 782 / CVE-2023-30456
[-] CVE-2023-30456 - arch/x86/kvm/vmx/nested.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 646 / 782 / CVE-2023-30772
[*] Testing vulnerability 647 / 782 / CVE-2023-2985
[*] Testing vulnerability 648 / 782 / CVE-2022-3108
[*] Testing vulnerability 649 / 782 / CVE-2023-33203
[*] Testing vulnerability 650 / 782 / CVE-2023-3220
[*] Testing vulnerability 651 / 782 / CVE-2023-3439
[-] CVE-2023-3439 - missing vulnerability path from advisory
[*] Testing vulnerability 652 / 782 / CVE-2023-3141
[*] Testing vulnerability 653 / 782 / CVE-2023-3022
[-] CVE-2023-3022 - missing vulnerability path from advisory
[*] Testing vulnerability 654 / 782 / CVE-2023-3357
[-] CVE-2023-3357 - missing vulnerability path from advisory
[*] Testing vulnerability 655 / 782 / CVE-2023-32250
[-] CVE-2023-32250 - missing vulnerability path from advisory
[*] Testing vulnerability 656 / 782 / CVE-2022-3113
[-] CVE-2022-3113 - drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 657 / 782 / CVE-2023-32254
[-] CVE-2023-32254 - missing vulnerability path from advisory
[*] Testing vulnerability 658 / 782 / CVE-2022-3114
[*] Testing vulnerability 659 / 782 / CVE-2022-2991
[-] CVE-2022-2991 - missing vulnerability path from advisory
[*] Testing vulnerability 660 / 782 / CVE-2021-33033
[*] Testing vulnerability 661 / 782 / CVE-2023-31436
[*] Testing vulnerability 662 / 782 / CVE-2023-32233
[-] CVE-2023-32233 - missing vulnerability path from advisory
[*] Testing vulnerability 663 / 782 / CVE-2023-3358
[-] CVE-2023-3358 - missing vulnerability path from advisory
[*] Testing vulnerability 664 / 782 / CVE-2023-37453
[-] CVE-2023-37453 - missing vulnerability path from advisory
[*] Testing vulnerability 665 / 782 / CVE-2023-35788
[*] Testing vulnerability 666 / 782 / CVE-2023-3359
[-] CVE-2023-3359 - missing vulnerability path from advisory
[*] Testing vulnerability 667 / 782 / CVE-2019-9857
[*] Testing vulnerability 668 / 782 / CVE-2023-35824
[-] CVE-2023-35824 - missing vulnerability path from advisory
[*] Testing vulnerability 669 / 782 / CVE-2023-37454
[-] CVE-2023-37454 - missing vulnerability path from advisory
[*] Testing vulnerability 670 / 782 / CVE-2022-3077
[-] CVE-2022-3077 - missing vulnerability path from advisory
[*] Testing vulnerability 671 / 782 / CVE-2023-35826
[-] CVE-2023-35826 - missing vulnerability path from advisory
[*] Testing vulnerability 672 / 782 / CVE-2023-35827
[-] CVE-2023-35827 - missing vulnerability path from advisory
[*] Testing vulnerability 673 / 782 / CVE-2021-32078
[*] Testing vulnerability 674 / 782 / CVE-2022-3104
[*] Testing vulnerability 675 / 782 / CVE-2022-3105
[*] Testing vulnerability 676 / 782 / CVE-2023-35828
[-] CVE-2023-35828 - missing vulnerability path from advisory
[*] Testing vulnerability 677 / 782 / CVE-2021-3411
[-] CVE-2021-3411 - missing vulnerability path from advisory
[*] Testing vulnerability 678 / 782 / CVE-2023-35829
[-] CVE-2023-35829 - missing vulnerability path from advisory
[*] Testing vulnerability 679 / 782 / CVE-2022-3107
[*] Testing vulnerability 680 / 782 / CVE-2022-32296
[-] CVE-2022-32296 - missing vulnerability path from advisory
[*] Testing vulnerability 681 / 782 / CVE-2021-3428
[*] Testing vulnerability 682 / 782 / CVE-2023-3355
[*] Testing vulnerability 683 / 782 / CVE-2023-32269
[-] CVE-2023-32269 - missing vulnerability path from advisory
[*] Testing vulnerability 684 / 782 / CVE-2022-3110
[-] CVE-2022-3110 - drivers/staging/r8188eu/core/rtw_xmit.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 685 / 782 / CVE-2022-3111
[*] Testing vulnerability 686 / 782 / CVE-2022-3112
[-] CVE-2022-3112 - drivers/staging/media/meson/vdec/vdec_helpers.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 687 / 782 / CVE-2022-3078
[-] CVE-2022-3078 - missing vulnerability path from advisory
[*] Testing vulnerability 688 / 782 / CVE-2021-3732
[-] CVE-2021-3732 - missing vulnerability path from advisory
[*] Testing vulnerability 689 / 782 / CVE-2021-38200
[-] Vulnerable path for different architecture found for arch/powerpc/perf/core-book3s.c - not further processing CVE-2021-38200
[*] Testing vulnerability 690 / 782 / CVE-2023-35823
[-] CVE-2023-35823 - missing vulnerability path from advisory
[*] Testing vulnerability 691 / 782 / CVE-2022-3106
[-] CVE-2022-3106 - drivers/net/ethernet/sfc/ef100_nic.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 692 / 782 / CVE-2021-3736
[*] Testing vulnerability 693 / 782 / CVE-2023-34256
[*] Testing vulnerability 694 / 782 / CVE-2021-38206
[-] CVE-2021-38206 - missing vulnerability path from advisory
[*] Testing vulnerability 695 / 782 / CVE-2021-38207
[*] Testing vulnerability 696 / 782 / CVE-2021-38208
[*] Testing vulnerability 697 / 782 / CVE-2022-32981
[+] CVE-2023-34256 (null/5.5) - lib/crc16.c verified - exported symbol
[-] CVE-2022-32981 - missing vulnerability path from advisory
[*] Testing vulnerability 698 / 782 / CVE-2021-38209
[*] Testing vulnerability 699 / 782 / CVE-2023-3268
[*] Testing vulnerability 700 / 782 / CVE-2022-34494
[*] Testing vulnerability 701 / 782 / CVE-2022-34495
[*] Testing vulnerability 702 / 782 / CVE-2021-4135
[-] CVE-2021-4135 - missing vulnerability path from advisory
[*] Testing vulnerability 703 / 782 / CVE-2022-3707
[-] CVE-2022-3707 - missing vulnerability path from advisory
[*] Testing vulnerability 704 / 782 / CVE-2021-4032
[-] Vulnerable path for different architecture found for arch/x86/kvm/lapic.c - not further processing CVE-2021-4032
[*] Testing vulnerability 705 / 782 / CVE-2021-3764
[-] CVE-2021-3764 - missing vulnerability path from advisory
[*] Testing vulnerability 706 / 782 / CVE-2022-3115
[*] Testing vulnerability 707 / 782 / CVE-2021-4202
[*] Testing vulnerability 708 / 782 / CVE-2023-33288
[-] CVE-2023-33288 - missing vulnerability path from advisory
[*] Testing vulnerability 709 / 782 / CVE-2022-3595
[*] Testing vulnerability 710 / 782 / CVE-2021-4150
[-] CVE-2021-4150 - block/partitions/core.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 711 / 782 / CVE-2021-4155
[-] CVE-2021-4155 - missing vulnerability path from advisory
[*] Testing vulnerability 712 / 782 / CVE-2022-3544
[-] CVE-2022-3544 - mm/damon/sysfs.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 713 / 782 / CVE-2021-4001
[-] CVE-2021-4001 - missing vulnerability path from advisory
[*] Testing vulnerability 714 / 782 / CVE-2022-39189
[-] CVE-2022-39189 - missing vulnerability path from advisory
[*] Testing vulnerability 715 / 782 / CVE-2022-3606
[*] Testing vulnerability 716 / 782 / CVE-2022-3533
[-] CVE-2022-3533 - tools/lib/bpf/usdt.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 717 / 782 / CVE-2022-3543
[*] Testing vulnerability 718 / 782 / CVE-2022-4127
[-] CVE-2022-4127 - missing vulnerability path from advisory
[*] Testing vulnerability 719 / 782 / CVE-2022-40476
[-] CVE-2022-40476 - fs/io_uring.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 720 / 782 / CVE-2022-42896
[-] CVE-2022-42896 - missing vulnerability path from advisory
[*] Testing vulnerability 721 / 782 / CVE-2021-44879
[*] Testing vulnerability 722 / 782 / CVE-2022-44034
[*] Testing vulnerability 723 / 782 / CVE-2022-44033
[*] Testing vulnerability 724 / 782 / CVE-2022-45869
[-] CVE-2022-45869 - missing vulnerability path from advisory
[*] Testing vulnerability 725 / 782 / CVE-2021-45402
[*] Testing vulnerability 726 / 782 / CVE-2022-48423
[-] CVE-2022-48423 - fs/ntfs3/record.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 727 / 782 / CVE-2022-48502
[-] CVE-2022-48502 - missing vulnerability path from advisory
[*] Testing vulnerability 728 / 782 / CVE-2021-46283
[*] Testing vulnerability 729 / 782 / CVE-2022-4662
[+] CVE-2022-3543 (null/5.5) - net/unix/af_unix.c verified - exported symbol (gpl)
[-] CVE-2022-4662 - missing vulnerability path from advisory
[*] Testing vulnerability 730 / 782 / CVE-2022-48425
[-] CVE-2022-48425 - fs/ntfs3/inode.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 731 / 782 / CVE-2022-41848
[*] Testing vulnerability 732 / 782 / CVE-2022-44032
[*] Testing vulnerability 733 / 782 / CVE-2022-42703
[*] Testing vulnerability 734 / 782 / CVE-2022-3344
[-] CVE-2022-3344 - missing vulnerability path from advisory
[*] Testing vulnerability 735 / 782 / CVE-2019-3016
[-] CVE-2019-3016 - missing vulnerability path from advisory
[*] Testing vulnerability 736 / 782 / CVE-2010-5321
[-] CVE-2010-5321 - drivers/media/video/videobuf-core.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 737 / 782 / CVE-2023-1670
[-] CVE-2023-1670 - missing vulnerability path from advisory
[*] Testing vulnerability 738 / 782 / CVE-2023-28772
[*] Testing vulnerability 739 / 782 / CVE-2022-3565
[*] Testing vulnerability 740 / 782 / CVE-2015-2877
[-] CVE-2015-2877 - missing vulnerability path from advisory
[*] Testing vulnerability 741 / 782 / CVE-2022-3424
[-] CVE-2022-3424 - missing vulnerability path from advisory
[*] Testing vulnerability 742 / 782 / CVE-2023-1118
[-] CVE-2023-1118 - missing vulnerability path from advisory
[+] CVE-2022-42703 (null/5.5) - mm/rmap.c verified - exported symbol (gpl)
[*] Testing vulnerability 743 / 782 / CVE-2022-4095
[-] CVE-2022-4095 - missing vulnerability path from advisory
[*] Testing vulnerability 744 / 782 / CVE-2015-0570
[*] Found file name wlan_hdd_hostapd.c for CVE-2015-0570 without path details ... looking for candidates now
[-] CVE-2015-0570 - wlan_hdd_hostapd.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 745 / 782 / CVE-2015-0571
[*] Found file name wlan_hdd_hostapd.c for CVE-2015-0571 without path details ... looking for candidates now
[-] CVE-2015-0571 - wlan_hdd_hostapd.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 746 / 782 / CVE-2015-0569
[*] Found file name wlan_hdd_wext.c for CVE-2015-0569 without path details ... looking for candidates now
[-] CVE-2015-0569 - wlan_hdd_wext.c - vulnerable source file not found in kernel sources
[*] Testing vulnerability 747 / 782 / CVE-2016-2853
[-] CVE-2016-2853 - missing vulnerability path from advisory
[*] Testing vulnerability 748 / 782 / CVE-2016-2854
[-] CVE-2016-2854 - missing vulnerability path from advisory
[*] Testing vulnerability 749 / 782 / CVE-2019-19332
[-] CVE-2019-19332 - missing vulnerability path from advisory
[*] Testing vulnerability 750 / 782 / CVE-2022-3239
[-] CVE-2022-3239 - missing vulnerability path from advisory
[*] Testing vulnerability 751 / 782 / CVE-2023-3390
[-] CVE-2023-3390 - missing vulnerability path from advisory
[*] Testing vulnerability 752 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 753 / 782 / Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
[-] Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. - missing vulnerability path from advisory
[*] Testing vulnerability 754 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 755 / 782 / We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
[-] We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. - missing vulnerability path from advisory
[*] Testing vulnerability 756 / 782 / CVE-2021-3715
[-] CVE-2021-3715 - missing vulnerability path from advisory
[*] Testing vulnerability 757 / 782 / CVE-2022-2639
[-] CVE-2022-2639 - missing vulnerability path from advisory
[*] Testing vulnerability 758 / 782 / CVE-2019-10639
[-] CVE-2019-10639 - missing vulnerability path from advisory
[*] Testing vulnerability 759 / 782 / CVE-2020-27784
[-] CVE-2020-27784 - missing vulnerability path from advisory
[*] Testing vulnerability 760 / 782 / CVE-2023-1390
[-] CVE-2023-1390 - missing vulnerability path from advisory
[*] Testing vulnerability 761 / 782 / CVE-2022-2977
[-] CVE-2022-2977 - missing vulnerability path from advisory
[*] Testing vulnerability 762 / 782 / CVE-2023-0461
[-] CVE-2023-0461 - missing vulnerability path from advisory
[*] Testing vulnerability 763 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 764 / 782 / There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.
[-] There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. - missing vulnerability path from advisory
[*] Testing vulnerability 765 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 766 / 782 / When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.
[-] When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. - missing vulnerability path from advisory
[*] Testing vulnerability 767 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 768 / 782 / The setsockopt TCP_ULP operation does not require any privilege.
[-] The setsockopt TCP_ULP operation does not require any privilege. - missing vulnerability path from advisory
[*] Testing vulnerability 769 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 770 / 782 / We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
[-] We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c - missing vulnerability path from advisory
[*] Testing vulnerability 771 / 782 / CVE-2023-1281
[-] CVE-2023-1281 - missing vulnerability path from advisory
[*] Testing vulnerability 772 / 782 / This issue affects Linux Kernel
[-] This issue affects Linux Kernel - missing vulnerability path from advisory
[*] Testing vulnerability 773 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 774 / 782 / 
[-]  - missing vulnerability path from advisory
[*] Testing vulnerability 775 / 782 / CVE-2020-12114
[*] Testing vulnerability 776 / 782 / CVE-2020-25220
[-] CVE-2020-25220 - missing vulnerability path from advisory
[*] Testing vulnerability 777 / 782 / CVE-2020-7053
[-] CVE-2020-7053 - missing vulnerability path from advisory
[*] Testing vulnerability 778 / 782 / CVE-2022-4378
[-] CVE-2022-4378 - missing vulnerability path from advisory
[*] Testing vulnerability 779 / 782 / CVE-2023-1078
[+] CVE-2020-12114 (1.9/4.7) - fs/namespace.c verified - exported symbol
[-] CVE-2023-1078 - missing vulnerability path from advisory
[*] Testing vulnerability 780 / 782 / CVE-2019-20794
[-] CVE-2019-20794 - missing vulnerability path from advisory
[*] Testing vulnerability 781 / 782 / CVE-2020-8428
[*] Testing vulnerability 782 / 782 / CVE-2019-20934
[-] CVE-2019-20934 - missing vulnerability path from advisory
[+] CVE-2020-8428 (3.6/7.1) - fs/namei.c verified - exported symbol

==> Linux kernel verification results


[+] Identified 782 unverified CVE vulnerabilities for kernel version 4.19.56
[*] Detected architecture arm
[*] Extracted 18700 unique symbols from kernel and modules
[*] Found 345 advisories with missing vulnerable path details
[*] Found 55 path details in CVE advisories but no real kernel path found in vanilla kernel source
[*] Found 369 path details in CVE advisories with real kernel path
[*] Found 22 path details in CVE advisories with real kernel path but wrong architecture
[*] 36 symbol usage verified
[*] 35 vulnerable paths verified via symbols
[*] 0 vulnerable paths verified via compiled paths

[+] Verified CVEs: 35 (exported symbols)
[+] Verified CVEs: 35 (one mechanism succeeded)



[*] Exploitability notes:
    EDB - Exploit code found in the Exploit database
    MSF - Exploit code found in the Metasploit framework
    GH - PoC code found on Github (via trickest)
    PS - PoC code found on Packetstormsecurity
    SNYK - PoC code found on Snyk vulnerability database
    EXP - Vulnerability is known as exploited