Update 10Sep23

[ci skip]
diff --git a/CHANGES.md b/CHANGES.md
index 331eb13..4f8a8a2 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1,59 +1,48 @@
 
 # **Linux Kernel CVE Changes**
 
-## Last Update - 25Aug23 16:02
+## Last Update - 10Sep23 19:56
 
 ### **New CVEs Added:**
 
-[CVE-2020-27418](cves/CVE-2020-27418)  
-[CVE-2023-40283](cves/CVE-2023-40283)  
-[CVE-2023-4385](cves/CVE-2023-4385)  
-[CVE-2023-4387](cves/CVE-2023-4387)  
-[CVE-2023-4389](cves/CVE-2023-4389)  
-[CVE-2023-4394](cves/CVE-2023-4394)  
-[CVE-2023-4459](cves/CVE-2023-4459)  
+[CVE-2023-25775](cves/CVE-2023-25775)  
+[CVE-2023-3777](cves/CVE-2023-3777)  
+[CVE-2023-4015](cves/CVE-2023-4015)  
+[CVE-2023-4206](cves/CVE-2023-4206)  
+[CVE-2023-4207](cves/CVE-2023-4207)  
+[CVE-2023-4208](cves/CVE-2023-4208)  
+[CVE-2023-4563](cves/CVE-2023-4563)  
+[CVE-2023-4569](cves/CVE-2023-4569)  
+[CVE-2023-4611](cves/CVE-2023-4611)  
+[CVE-2023-4622](cves/CVE-2023-4622)  
+[CVE-2023-4623](cves/CVE-2023-4623)  
 
 
 ### **New Versions Checked:**
 
-[4.14.323](streams/4.14)  
-[4.19.292](streams/4.19)  
-[5.10.191](streams/5.10)  
-[5.15.127](streams/5.15)  
-[5.4.254](streams/5.4)  
-[6.1.47](streams/6.1)  
-[6.4.12](streams/6.4)  
+[4.14.325](streams/4.14)  
+[4.19.294](streams/4.19)  
+[5.10.194](streams/5.10)  
+[5.15.131](streams/5.15)  
+[5.4.256](streams/5.4)  
+[6.1.52](streams/6.1)  
+[6.4.15](streams/6.4)  
 
 
 ### **Updated CVEs:**
 
-[CVE-2015-3339](cves/CVE-2015-3339)  
-[CVE-2022-40982](cves/CVE-2022-40982)  
-[CVE-2022-4662](cves/CVE-2022-4662)  
-[CVE-2023-0160](cves/CVE-2023-0160)  
-[CVE-2023-1206](cves/CVE-2023-1206)  
-[CVE-2023-1611](cves/CVE-2023-1611)  
+[CVE-2022-44032](cves/CVE-2022-44032)  
+[CVE-2022-44033](cves/CVE-2022-44033)  
+[CVE-2022-45886](cves/CVE-2022-45886)  
+[CVE-2022-45887](cves/CVE-2022-45887)  
+[CVE-2022-45919](cves/CVE-2022-45919)  
+[CVE-2023-1077](cves/CVE-2023-1077)  
 [CVE-2023-20569](cves/CVE-2023-20569)  
-[CVE-2023-20588](cves/CVE-2023-20588)  
-[CVE-2023-21264](cves/CVE-2023-21264)  
-[CVE-2023-3006](cves/CVE-2023-3006)  
-[CVE-2023-3111](cves/CVE-2023-3111)  
-[CVE-2023-3117](cves/CVE-2023-3117)  
-[CVE-2023-3212](cves/CVE-2023-3212)  
-[CVE-2023-33250](cves/CVE-2023-33250)  
-[CVE-2023-3390](cves/CVE-2023-3390)  
-[CVE-2023-34319](cves/CVE-2023-34319)  
-[CVE-2023-35001](cves/CVE-2023-35001)  
-[CVE-2023-3609](cves/CVE-2023-3609)  
-[CVE-2023-3611](cves/CVE-2023-3611)  
+[CVE-2023-2430](cves/CVE-2023-2430)  
+[CVE-2023-31083](cves/CVE-2023-31083)  
+[CVE-2023-37453](cves/CVE-2023-37453)  
 [CVE-2023-3772](cves/CVE-2023-3772)  
 [CVE-2023-3773](cves/CVE-2023-3773)  
-[CVE-2023-3776](cves/CVE-2023-3776)  
-[CVE-2023-4128](cves/CVE-2023-4128)  
-[CVE-2023-4132](cves/CVE-2023-4132)  
-[CVE-2023-4133](cves/CVE-2023-4133)  
-[CVE-2023-4134](cves/CVE-2023-4134)  
-[CVE-2023-4147](cves/CVE-2023-4147)  
-[CVE-2023-4155](cves/CVE-2023-4155)  
-[CVE-2023-4194](cves/CVE-2023-4194)  
 [CVE-2023-4273](cves/CVE-2023-4273)  
+[CVE-2020-27418](cves/CVE-2020-27418)  
+[CVE-2023-37454](cves/CVE-2023-37454)  
diff --git a/data/3.12/3.12_CVEs.txt b/data/3.12/3.12_CVEs.txt
index 23b8ff5..a47873b 100644
--- a/data/3.12/3.12_CVEs.txt
+++ b/data/3.12/3.12_CVEs.txt
@@ -1221,14 +1221,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1281,7 +1281,7 @@
 CVE-2023-3108: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1303,10 +1303,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1314,3 +1312,4 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/3.12/3.12_security.txt b/data/3.12/3.12_security.txt
index 1f04663..00ac550 100644
--- a/data/3.12/3.12_security.txt
+++ b/data/3.12/3.12_security.txt
@@ -1359,14 +1359,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1419,7 +1419,7 @@
   CVE-2023-3108: (unk) crypto: fix af_alg_make_sg() conversion to iov_iter 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1441,10 +1441,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1452,3 +1450,4 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/3.14/3.14_CVEs.txt b/data/3.14/3.14_CVEs.txt
index f808963..9f08c59 100644
--- a/data/3.14/3.14_CVEs.txt
+++ b/data/3.14/3.14_CVEs.txt
@@ -1190,14 +1190,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1250,7 +1250,7 @@
 CVE-2023-3108: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1273,10 +1273,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1284,3 +1282,4 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/3.14/3.14_security.txt b/data/3.14/3.14_security.txt
index 89bc051..c69a02e 100644
--- a/data/3.14/3.14_security.txt
+++ b/data/3.14/3.14_security.txt
@@ -1324,14 +1324,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1384,7 +1384,7 @@
   CVE-2023-3108: (unk) crypto: fix af_alg_make_sg() conversion to iov_iter 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1407,10 +1407,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1418,3 +1416,4 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/3.16/3.16_CVEs.txt b/data/3.16/3.16_CVEs.txt
index 619fca1..59f05c9 100644
--- a/data/3.16/3.16_CVEs.txt
+++ b/data/3.16/3.16_CVEs.txt
@@ -1176,14 +1176,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1239,7 +1239,7 @@
 CVE-2023-3108: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1264,10 +1264,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1275,3 +1273,4 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/3.16/3.16_security.txt b/data/3.16/3.16_security.txt
index 774148d..c9642c0 100644
--- a/data/3.16/3.16_security.txt
+++ b/data/3.16/3.16_security.txt
@@ -1283,14 +1283,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1345,7 +1345,7 @@
   CVE-2023-3108: (unk) crypto: fix af_alg_make_sg() conversion to iov_iter 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1370,10 +1370,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1381,3 +1379,4 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/3.18/3.18_CVEs.txt b/data/3.18/3.18_CVEs.txt
index 52467be..1c4da52 100644
--- a/data/3.18/3.18_CVEs.txt
+++ b/data/3.18/3.18_CVEs.txt
@@ -1161,14 +1161,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1226,7 +1226,7 @@
 CVE-2023-3108: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1251,15 +1251,17 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/3.18/3.18_security.txt b/data/3.18/3.18_security.txt
index 7867662..1ab6e57 100644
--- a/data/3.18/3.18_security.txt
+++ b/data/3.18/3.18_security.txt
@@ -1397,14 +1397,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1462,7 +1462,7 @@
   CVE-2023-3108: (unk) crypto: fix af_alg_make_sg() conversion to iov_iter 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1487,15 +1487,17 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/3.2/3.2_CVEs.txt b/data/3.2/3.2_CVEs.txt
index 4dacc2b..b2b96e5 100644
--- a/data/3.2/3.2_CVEs.txt
+++ b/data/3.2/3.2_CVEs.txt
@@ -1193,14 +1193,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1249,7 +1249,7 @@
 CVE-2023-3108: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1269,12 +1269,11 @@
 CVE-2023-35824: Fix not seen in stream
 CVE-2023-35827: Fix unknown
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/3.2/3.2_security.txt b/data/3.2/3.2_security.txt
index cb7e1e3..df934af 100644
--- a/data/3.2/3.2_security.txt
+++ b/data/3.2/3.2_security.txt
@@ -1351,14 +1351,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1407,7 +1407,7 @@
   CVE-2023-3108: (unk) crypto: fix af_alg_make_sg() conversion to iov_iter 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1427,12 +1427,11 @@
   CVE-2023-35824: (unk) media: dm1105: Fix use after free bug in dm1105_remove due to race condition 
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.1/4.1_CVEs.txt b/data/4.1/4.1_CVEs.txt
index ae427b4..6f1fa94 100644
--- a/data/4.1/4.1_CVEs.txt
+++ b/data/4.1/4.1_CVEs.txt
@@ -1126,14 +1126,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1193,7 +1193,7 @@
 CVE-2023-3106: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1218,15 +1218,17 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.1/4.1_security.txt b/data/4.1/4.1_security.txt
index f286ef2..08bd8d8 100644
--- a/data/4.1/4.1_security.txt
+++ b/data/4.1/4.1_security.txt
@@ -1224,14 +1224,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1291,7 +1291,7 @@
   CVE-2023-3106: (unk) xfrm: fix crash in XFRM_MSG_GETSA netlink handler 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1316,15 +1316,17 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.10/4.10_CVEs.txt b/data/4.10/4.10_CVEs.txt
index 9e2b654..e16917e 100644
--- a/data/4.10/4.10_CVEs.txt
+++ b/data/4.10/4.10_CVEs.txt
@@ -1027,15 +1027,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1104,7 +1104,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1131,10 +1131,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1142,6 +1140,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.10/4.10_security.txt b/data/4.10/4.10_security.txt
index 4a72aee..1013c97 100644
--- a/data/4.10/4.10_security.txt
+++ b/data/4.10/4.10_security.txt
@@ -1061,15 +1061,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1138,7 +1138,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1165,10 +1165,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1176,6 +1174,11 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.11/4.11_CVEs.txt b/data/4.11/4.11_CVEs.txt
index f751abb..c9b2004 100644
--- a/data/4.11/4.11_CVEs.txt
+++ b/data/4.11/4.11_CVEs.txt
@@ -999,15 +999,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1076,7 +1076,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1103,10 +1103,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1114,6 +1112,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.11/4.11_security.txt b/data/4.11/4.11_security.txt
index 3705cf9..3438ad1 100644
--- a/data/4.11/4.11_security.txt
+++ b/data/4.11/4.11_security.txt
@@ -1021,15 +1021,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1098,7 +1098,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1125,10 +1125,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1136,6 +1134,11 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.12/4.12_CVEs.txt b/data/4.12/4.12_CVEs.txt
index 22d8457..bf2376a 100644
--- a/data/4.12/4.12_CVEs.txt
+++ b/data/4.12/4.12_CVEs.txt
@@ -984,15 +984,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1063,7 +1063,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1090,10 +1090,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1101,6 +1099,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.12/4.12_security.txt b/data/4.12/4.12_security.txt
index 1e6242c..f745fb2 100644
--- a/data/4.12/4.12_security.txt
+++ b/data/4.12/4.12_security.txt
@@ -1010,15 +1010,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1089,7 +1089,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1116,10 +1116,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1127,6 +1125,11 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.13/4.13_CVEs.txt b/data/4.13/4.13_CVEs.txt
index 8473584..2c1a569 100644
--- a/data/4.13/4.13_CVEs.txt
+++ b/data/4.13/4.13_CVEs.txt
@@ -967,15 +967,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1048,7 +1048,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1075,10 +1075,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1086,6 +1084,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.13/4.13_security.txt b/data/4.13/4.13_security.txt
index c681f9b..f2f75fc 100644
--- a/data/4.13/4.13_security.txt
+++ b/data/4.13/4.13_security.txt
@@ -995,15 +995,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1076,7 +1076,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1103,10 +1103,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1114,6 +1112,11 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt
index f99560e..af49fe0 100644
--- a/data/4.14/4.14_CVEs.txt
+++ b/data/4.14/4.14_CVEs.txt
@@ -936,15 +936,15 @@
 CVE-2022-42895: Fixed with 4.14.299
 CVE-2022-42896: Fixed with 4.14.301
 CVE-2022-43750: Fixed with 4.14.296
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fixed with 4.14.317
+CVE-2022-45919: Fixed with 4.14.317
 CVE-2022-45934: Fixed with 4.14.303
 CVE-2022-4662: Fixed with 4.14.293
 CVE-2022-4744: Fix not seen in stream
@@ -1019,7 +1019,7 @@
 CVE-2023-3090: Fixed with 4.14.316
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fixed with 4.14.318
@@ -1047,10 +1047,8 @@
 CVE-2023-3609: Fixed with 4.14.322
 CVE-2023-3611: Fixed with 4.14.322
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
-CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
+CVE-2023-3772: Fixed with 4.14.324
 CVE-2023-3776: Fixed with 4.14.322
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1058,6 +1056,11 @@
 CVE-2023-4128: Fixed with 4.14.322
 CVE-2023-4132: Fixed with 4.14.322
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fixed with 4.14.322
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fixed with 4.14.322
 CVE-2023-4385: Fixed with 4.14.283
 CVE-2023-4387: Fixed with 4.14.281
 CVE-2023-4459: Fixed with 4.14.281
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt
index 04d95be..a53b2d1 100644
--- a/data/4.14/4.14_security.txt
+++ b/data/4.14/4.14_security.txt
@@ -1346,6 +1346,8 @@
   CVE-2023-3141: 3faa6fe21c516dbcca469c297df77decbc2fed0f memstick: r592: Fix UAF bug in r592_remove due to race condition
 
 CVEs fixed in 4.14.317:
+  CVE-2022-45887: cf412b0543b77d01f74ae2303d7f8a97e6bff686 media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
+  CVE-2022-45919: 66e262ad9b35615b2a1b1cad4751e93e1de90634 media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
   CVE-2023-1838: d1bcb0ab20980c6da663708c9a47c322703f9fc3 Fix double fget() in vhost_net_set_backend()
 
 CVEs fixed in 4.14.318:
@@ -1369,6 +1371,11 @@
   CVE-2023-40283: 51822644a047eac2310fab0799b64e3430b5a111 Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
   CVE-2023-4128: f0f874147a5b00eae875c24281531f8de7900079 net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
   CVE-2023-4132: 45224862e49e1fde86cbd26c7612f029b4e2e662 media: usb: siano: Fix warning due to null work_func_t function pointer
+  CVE-2023-4206: 226d84d54a9339b7045aff36c8f56d6ee9270476 net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4208: f0f874147a5b00eae875c24281531f8de7900079 net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
+
+CVEs fixed in 4.14.324:
+  CVE-2023-3772: ed1cba039309c80b49719fcff3e3d7cdddb73d96 xfrm: add NULL check in xfrm_update_ae_params
 
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
@@ -1539,15 +1546,13 @@
   CVE-2022-4129: (unk) l2tp: Serialize access to sk_user_data with sk_callback_lock 
   CVE-2022-41848: (unk)  
   CVE-2022-4269: (unk) act_mirred: use the backlog for nested calls to mirred ingress 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
   CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets 
   CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions 
@@ -1578,7 +1583,7 @@
   CVE-2023-30456: (unk) KVM: nVMX: add missing consistency checks for CR0 and CR4 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3268: (unk) relayfs: fix out-of-bounds access in relay_file_read 
@@ -1588,10 +1593,10 @@
   CVE-2023-3567: (unk) vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF 
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
-  CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.15/4.15_CVEs.txt b/data/4.15/4.15_CVEs.txt
index 887f1da..14876ed 100644
--- a/data/4.15/4.15_CVEs.txt
+++ b/data/4.15/4.15_CVEs.txt
@@ -888,15 +888,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -972,7 +972,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1001,10 +1001,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -1014,6 +1012,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.15/4.15_security.txt b/data/4.15/4.15_security.txt
index bf39709..2ae0f35 100644
--- a/data/4.15/4.15_security.txt
+++ b/data/4.15/4.15_security.txt
@@ -920,15 +920,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1004,7 +1004,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1033,10 +1033,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -1046,6 +1044,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.16/4.16_CVEs.txt b/data/4.16/4.16_CVEs.txt
index 2f5e739..562b4e7 100644
--- a/data/4.16/4.16_CVEs.txt
+++ b/data/4.16/4.16_CVEs.txt
@@ -868,15 +868,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -952,7 +952,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -981,10 +981,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -994,6 +992,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.16/4.16_security.txt b/data/4.16/4.16_security.txt
index a9e5847..14de723 100644
--- a/data/4.16/4.16_security.txt
+++ b/data/4.16/4.16_security.txt
@@ -900,15 +900,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -984,7 +984,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1013,10 +1013,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -1026,6 +1024,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.17/4.17_CVEs.txt b/data/4.17/4.17_CVEs.txt
index 6a69ca9..81cc2aa 100644
--- a/data/4.17/4.17_CVEs.txt
+++ b/data/4.17/4.17_CVEs.txt
@@ -848,15 +848,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -934,7 +934,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -963,10 +963,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -976,6 +974,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.17/4.17_security.txt b/data/4.17/4.17_security.txt
index 97b1685..56c9443 100644
--- a/data/4.17/4.17_security.txt
+++ b/data/4.17/4.17_security.txt
@@ -880,15 +880,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -966,7 +966,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -995,10 +995,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -1008,6 +1006,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.18/4.18_CVEs.txt b/data/4.18/4.18_CVEs.txt
index 226b597..6bca9be 100644
--- a/data/4.18/4.18_CVEs.txt
+++ b/data/4.18/4.18_CVEs.txt
@@ -826,15 +826,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -912,7 +912,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -941,10 +941,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -954,6 +952,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.18/4.18_security.txt b/data/4.18/4.18_security.txt
index d3a3208..7b23188 100644
--- a/data/4.18/4.18_security.txt
+++ b/data/4.18/4.18_security.txt
@@ -858,15 +858,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -944,7 +944,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -973,10 +973,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -986,6 +984,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt
index 1b7aff4..1917fd8 100644
--- a/data/4.19/4.19_CVEs.txt
+++ b/data/4.19/4.19_CVEs.txt
@@ -805,15 +805,15 @@
 CVE-2022-42895: Fixed with 4.19.265
 CVE-2022-42896: Fixed with 4.19.268
 CVE-2022-43750: Fixed with 4.19.262
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fixed with 4.19.285
+CVE-2022-45887: Fixed with 4.19.285
+CVE-2022-45919: Fixed with 4.19.285
 CVE-2022-45934: Fixed with 4.19.270
 CVE-2022-4662: Fixed with 4.19.258
 CVE-2022-4744: Fixed with 4.19.280
@@ -833,7 +833,7 @@
 CVE-2023-1073: Fixed with 4.19.272
 CVE-2023-1074: Fixed with 4.19.272
 CVE-2023-1076: Fix not seen in stream
-CVE-2023-1077: Fix not seen in stream
+CVE-2023-1077: Fixed with 4.19.293
 CVE-2023-1078: Fixed with 4.19.273
 CVE-2023-1079: Fixed with 4.19.276
 CVE-2023-1095: Fixed with 4.19.256
@@ -892,7 +892,7 @@
 CVE-2023-3090: Fixed with 4.19.284
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fixed with 4.19.286
@@ -924,10 +924,8 @@
 CVE-2023-3609: Fixed with 4.19.291
 CVE-2023-3611: Fixed with 4.19.291
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
-CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
+CVE-2023-3772: Fixed with 4.19.293
 CVE-2023-3776: Fixed with 4.19.291
 CVE-2023-3812: Fixed with 4.19.265
 CVE-2023-3863: Fix not seen in stream
@@ -937,6 +935,11 @@
 CVE-2023-4132: Fixed with 4.19.291
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fixed with 4.19.291
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fixed with 4.19.291
 CVE-2023-4385: Fixed with 4.19.247
 CVE-2023-4387: Fixed with 4.19.245
 CVE-2023-4459: Fixed with 4.19.245
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt
index 971bee7..bf99e9a 100644
--- a/data/4.19/4.19_security.txt
+++ b/data/4.19/4.19_security.txt
@@ -1170,6 +1170,9 @@
   CVE-2023-3141: dce890c3dfaf631d0a8ac79c2792911f9fc551fa memstick: r592: Fix UAF bug in r592_remove due to race condition
 
 CVEs fixed in 4.19.285:
+  CVE-2022-45886: 7bb9c6e05efcecb15b0354d574efbc36ca321d75 media: dvb-core: Fix use-after-free due on race condition at dvb_net
+  CVE-2022-45887: 3e5af0745a4702ab0df2f880bfe0431eb30f9164 media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
+  CVE-2022-45919: 8624c7e048fa9ba584b7ba43715090ab1aed765c media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
   CVE-2023-35788: 59a27414bb00e48c4153a8b794fb4e69910a6a1b net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
 
 CVEs fixed in 4.19.286:
@@ -1196,6 +1199,12 @@
   CVE-2023-40283: 82cdb2ccbe43337798393369f0ceb98699fe6037 Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
   CVE-2023-4128: 4aae24015ecd70d824a953e2dc5b0ca2c4769243 net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
   CVE-2023-4132: 54073c46cbbd2c0c03d6f7d481540cb95cf181a1 media: usb: siano: Fix warning due to null work_func_t function pointer
+  CVE-2023-4206: ad8f36f96696a7f1d191da66637c415959bab6d8 net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4208: 4aae24015ecd70d824a953e2dc5b0ca2c4769243 net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
+
+CVEs fixed in 4.19.293:
+  CVE-2023-1077: 84d90fb72a053c034b018fcc3cfaa6f606faf1c6 sched/rt: pick_next_rt_entity(): check list_entry
+  CVE-2023-3772: 44f69c96f8a147413c23c68cda4d6fb5e23137cd xfrm: add NULL check in xfrm_update_ae_params
 
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
@@ -1351,22 +1360,18 @@
   CVE-2022-4129: (unk) l2tp: Serialize access to sk_user_data with sk_callback_lock 
   CVE-2022-41848: (unk)  
   CVE-2022-4269: (unk) act_mirred: use the backlog for nested calls to mirred ingress 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
   CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets 
   CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions 
   CVE-2023-0386: (unk) ovl: fail on invalid uid/gid mapping at copy up 
   CVE-2023-0590: (unk) net: sched: fix race condition in qdisc_graft() 
   CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area 
   CVE-2023-1076: (unk) tun: tun_chr_open(): correctly initialize socket uid 
-  CVE-2023-1077: (unk) sched/rt: pick_next_rt_entity(): check list_entry 
   CVE-2023-1249: (unk) coredump: Use the vma snapshot in fill_files_note 
   CVE-2023-1281: (unk) net/sched: tcindex: update imperfect hash filters respecting rcu 
   CVE-2023-1582: (unk) fs/proc: task_mmu.c: don't read mapcount for migration entry 
@@ -1388,7 +1393,7 @@
   CVE-2023-3022: (unk) ipv6: Use result arg in fib_lookup_arg consistently 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-33288: (unk) power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition 
@@ -1396,11 +1401,11 @@
   CVE-2023-34255: (unk) xfs: verify buffer contents when we skip log replay 
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
-  CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.20/4.20_CVEs.txt b/data/4.20/4.20_CVEs.txt
index d13eaa7..3fb1ea7 100644
--- a/data/4.20/4.20_CVEs.txt
+++ b/data/4.20/4.20_CVEs.txt
@@ -796,15 +796,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -889,7 +889,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -921,10 +921,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -934,6 +932,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.20/4.20_security.txt b/data/4.20/4.20_security.txt
index 04467b6..d43c78b 100644
--- a/data/4.20/4.20_security.txt
+++ b/data/4.20/4.20_security.txt
@@ -828,15 +828,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -921,7 +921,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -953,10 +953,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -966,6 +964,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.3/4.3_CVEs.txt b/data/4.3/4.3_CVEs.txt
index 9b3e982..ae575e3 100644
--- a/data/4.3/4.3_CVEs.txt
+++ b/data/4.3/4.3_CVEs.txt
@@ -1123,14 +1123,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1194,7 +1194,7 @@
 CVE-2023-3106: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1219,15 +1219,18 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.3/4.3_security.txt b/data/4.3/4.3_security.txt
index 3d266b4..fbb73a6 100644
--- a/data/4.3/4.3_security.txt
+++ b/data/4.3/4.3_security.txt
@@ -1139,14 +1139,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1210,7 +1210,7 @@
   CVE-2023-3106: (unk) xfrm: fix crash in XFRM_MSG_GETSA netlink handler 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1235,15 +1235,18 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt
index 493cc23..a4a6500 100644
--- a/data/4.4/4.4_CVEs.txt
+++ b/data/4.4/4.4_CVEs.txt
@@ -1104,14 +1104,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1175,7 +1175,7 @@
 CVE-2023-3106: Fixed with 4.4.223
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1200,16 +1200,19 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt
index 7951b4a..6114021 100644
--- a/data/4.4/4.4_security.txt
+++ b/data/4.4/4.4_security.txt
@@ -1592,14 +1592,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1661,7 +1661,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1686,16 +1686,19 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.5/4.5_CVEs.txt b/data/4.5/4.5_CVEs.txt
index af30a2f..cb49b87 100644
--- a/data/4.5/4.5_CVEs.txt
+++ b/data/4.5/4.5_CVEs.txt
@@ -1086,14 +1086,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1158,7 +1158,7 @@
 CVE-2023-3106: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1183,16 +1183,19 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.5/4.5_security.txt b/data/4.5/4.5_security.txt
index dc3725c..623158f 100644
--- a/data/4.5/4.5_security.txt
+++ b/data/4.5/4.5_security.txt
@@ -1102,14 +1102,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1174,7 +1174,7 @@
   CVE-2023-3106: (unk) xfrm: fix crash in XFRM_MSG_GETSA netlink handler 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1199,16 +1199,19 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.6/4.6_CVEs.txt b/data/4.6/4.6_CVEs.txt
index f8c67fb..30c4f10 100644
--- a/data/4.6/4.6_CVEs.txt
+++ b/data/4.6/4.6_CVEs.txt
@@ -1059,14 +1059,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1131,7 +1131,7 @@
 CVE-2023-3106: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1156,10 +1156,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1167,6 +1165,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.6/4.6_security.txt b/data/4.6/4.6_security.txt
index 2cba866..75baeb6 100644
--- a/data/4.6/4.6_security.txt
+++ b/data/4.6/4.6_security.txt
@@ -1077,14 +1077,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1149,7 +1149,7 @@
   CVE-2023-3106: (unk) xfrm: fix crash in XFRM_MSG_GETSA netlink handler 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1174,10 +1174,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1185,6 +1183,11 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.7/4.7_CVEs.txt b/data/4.7/4.7_CVEs.txt
index 2e94e0c..442d252 100644
--- a/data/4.7/4.7_CVEs.txt
+++ b/data/4.7/4.7_CVEs.txt
@@ -1042,14 +1042,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1114,7 +1114,7 @@
 CVE-2023-3106: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1139,10 +1139,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1150,6 +1148,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.7/4.7_security.txt b/data/4.7/4.7_security.txt
index a9aea03..a13e2aa 100644
--- a/data/4.7/4.7_security.txt
+++ b/data/4.7/4.7_security.txt
@@ -1062,14 +1062,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1134,7 +1134,7 @@
   CVE-2023-3106: (unk) xfrm: fix crash in XFRM_MSG_GETSA netlink handler 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1159,10 +1159,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1170,6 +1168,11 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.8/4.8_CVEs.txt b/data/4.8/4.8_CVEs.txt
index 07bb26e..eb716e4 100644
--- a/data/4.8/4.8_CVEs.txt
+++ b/data/4.8/4.8_CVEs.txt
@@ -1046,14 +1046,14 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -1117,7 +1117,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1142,10 +1142,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1153,6 +1151,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.8/4.8_security.txt b/data/4.8/4.8_security.txt
index ae436ae..f5ce698 100644
--- a/data/4.8/4.8_security.txt
+++ b/data/4.8/4.8_security.txt
@@ -1076,14 +1076,14 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -1147,7 +1147,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1172,10 +1172,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1183,6 +1181,11 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt
index 1d7d565..4037107 100644
--- a/data/4.9/4.9_CVEs.txt
+++ b/data/4.9/4.9_CVEs.txt
@@ -1045,14 +1045,14 @@
 CVE-2022-42895: Fixed with 4.9.333
 CVE-2022-42896: Fixed with 4.9.335
 CVE-2022-43750: Fixed with 4.9.331
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fixed with 4.9.337
 CVE-2022-4662: Fixed with 4.9.328
 CVE-2022-4744: Fix not seen in stream
@@ -1119,7 +1119,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -1146,10 +1146,8 @@
 CVE-2023-35827: Fix unknown
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4010: Fix unknown
@@ -1157,6 +1155,11 @@
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fixed with 4.9.318
 CVE-2023-4387: Fixed with 4.9.316
 CVE-2023-4459: Fixed with 4.9.316
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt
index 3e83da2..aa672ec 100644
--- a/data/4.9/4.9_security.txt
+++ b/data/4.9/4.9_security.txt
@@ -1605,14 +1605,14 @@
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
   CVE-2022-4129: (unk) l2tp: Serialize access to sk_user_data with sk_callback_lock 
   CVE-2022-41848: (unk)  
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
   CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets 
   CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes 
@@ -1669,7 +1669,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -1695,10 +1695,8 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4010: (unk)  
@@ -1706,3 +1704,8 @@
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.0/5.0_CVEs.txt b/data/5.0/5.0_CVEs.txt
index 7fab58f..775035c 100644
--- a/data/5.0/5.0_CVEs.txt
+++ b/data/5.0/5.0_CVEs.txt
@@ -776,15 +776,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -868,7 +868,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -900,10 +900,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -913,6 +911,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.0/5.0_security.txt b/data/5.0/5.0_security.txt
index 5ee7a4a..22b4c0e 100644
--- a/data/5.0/5.0_security.txt
+++ b/data/5.0/5.0_security.txt
@@ -824,15 +824,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -916,7 +916,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -948,10 +948,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -961,6 +959,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.1/5.1_CVEs.txt b/data/5.1/5.1_CVEs.txt
index 502a304..7413c17 100644
--- a/data/5.1/5.1_CVEs.txt
+++ b/data/5.1/5.1_CVEs.txt
@@ -752,15 +752,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -847,7 +847,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -880,10 +880,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -893,6 +891,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.1/5.1_security.txt b/data/5.1/5.1_security.txt
index bec2502..2150234 100644
--- a/data/5.1/5.1_security.txt
+++ b/data/5.1/5.1_security.txt
@@ -788,15 +788,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -883,7 +883,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -916,10 +916,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -929,6 +927,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt
index 9c1d332..88a4b49 100644
--- a/data/5.10/5.10_CVEs.txt
+++ b/data/5.10/5.10_CVEs.txt
@@ -481,15 +481,15 @@
 CVE-2022-4378: Fixed with 5.10.158
 CVE-2022-4379: Fixed with 5.10.177
 CVE-2022-4382: Fixed with 5.10.165
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fixed with 5.10.183
+CVE-2022-45887: Fixed with 5.10.183
+CVE-2022-45919: Fixed with 5.10.183
 CVE-2022-45934: Fixed with 5.10.161
 CVE-2022-4662: Fixed with 5.10.142
 CVE-2022-4696: Fix not seen in stream
@@ -593,7 +593,7 @@
 CVE-2023-3090: Fixed with 5.10.181
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fixed with 5.10.184
@@ -629,23 +629,29 @@
 CVE-2023-3610: Fixed with 5.10.188
 CVE-2023-3611: Fixed with 5.10.188
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
-CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
+CVE-2023-3772: Fixed with 5.10.192
 CVE-2023-3776: Fixed with 5.10.188
+CVE-2023-3777: Fixed with 5.10.188
 CVE-2023-3812: Fixed with 5.10.154
 CVE-2023-3863: Fixed with 5.10.188
 CVE-2023-4004: Fixed with 5.10.188
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fixed with 5.10.190
 CVE-2023-40283: Fixed with 5.10.190
 CVE-2023-4128: Fixed with 5.10.190
 CVE-2023-4132: Fixed with 5.10.188
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fixed with 5.10.190
+CVE-2023-4206: Fixed with 5.10.190
+CVE-2023-4207: Fixed with 5.10.190
+CVE-2023-4208: Fixed with 5.10.190
 CVE-2023-4273: Fixed with 5.10.190
 CVE-2023-4385: Fixed with 5.10.121
 CVE-2023-4387: Fixed with 5.10.118
 CVE-2023-4389: Fixed with 5.10.112
 CVE-2023-4459: Fixed with 5.10.118
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt
index 0091f84..709a959 100644
--- a/data/5.10/5.10_security.txt
+++ b/data/5.10/5.10_security.txt
@@ -741,6 +741,9 @@
   CVE-2023-3141: 5c23f6da62f71ebfeda6ea3960982ccd926ebb09 memstick: r592: Fix UAF bug in r592_remove due to race condition
 
 CVEs fixed in 5.10.183:
+  CVE-2022-45886: 2ea7d26ed851db7176e4bfa8174c8a1380255bbe media: dvb-core: Fix use-after-free due on race condition at dvb_net
+  CVE-2022-45887: eb37fef417a246fe54530901a3ea9c0abc914fc2 media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
+  CVE-2022-45919: 76169f7490899d74aad4b0e2c4c1b9d4904dd01f media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
   CVE-2023-3212: d03d31d3a206093b9b8759dddf0ba9bd843606ba gfs2: Don't deref jdesc in evict
   CVE-2023-35788: 7c5c67aa294444b53f697dc3ddce61b33ff8badd net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
 
@@ -765,6 +768,7 @@
   CVE-2023-3610: d53c295c1f43b7460d28ba0f0f98a602084fdcb6 netfilter: nf_tables: fix chain binding transaction logic
   CVE-2023-3611: 8359ee85fd6dabc5c134ed69fb22faadd8a44071 net/sched: sch_qfq: account for stab overhead in qfq_enqueue
   CVE-2023-3776: 80e0e8d5f54397c5048fa2274144134dd9dc91b5 net/sched: cls_fw: Fix improper refcount update leads to use-after-free
+  CVE-2023-3777: 30e5460d69e631c0e84db37dba2d8f98648778d4 netfilter: nf_tables: skip bound chain on rule flush
   CVE-2023-3863: 96f2c6f272ec04083d828de46285a7d7b17d1aad net: nfc: Fix use-after-free caused by nfc_llcp_find_local
   CVE-2023-4004: 3a91099ecd59a42d1632fcb152bf7222f268ea2b netfilter: nft_set_pipapo: fix improper element removal
   CVE-2023-4132: d87ef4e857b790f1616809eccda6b4d0c9c3da11 media: usb: siano: Fix warning due to null work_func_t function pointer
@@ -776,11 +780,18 @@
 CVEs fixed in 5.10.190:
   CVE-2023-1206: 0cd74fbd3b8327e60525e1ec4a6c28895693909f tcp: Reduce chance of collisions in inet6_hashfn().
   CVE-2023-20588: b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7 x86/CPU/AMD: Do not leak quotient data after a division by 0
+  CVE-2023-4015: ab5a97a94b57324df76d659686ac2d30494170e6 netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
   CVE-2023-40283: 06f87c96216bc5cd1094c23492274f77f1d5dd3b Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
   CVE-2023-4128: b4256c99a7116c9514224847e8aaee2ecf110a0a net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
   CVE-2023-4147: 308a43f1521d5b7220693d0865b23e8dad3ed137 netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
+  CVE-2023-4206: aaa71c4e8ad98828ed50dde3eec8e0d545a117f7 net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4207: a8d478200b104ff356f51e1f63499fe46ba8c9b8 net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4208: b4256c99a7116c9514224847e8aaee2ecf110a0a net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
   CVE-2023-4273: 381f7df0f3c3bd7dceb3e2b2b64c2f6247e2ac19 exfat: check if filename entries exceeds max filename length
 
+CVEs fixed in 5.10.192:
+  CVE-2023-3772: bd30aa9c7febb6e709670cd5154194189ca3b7b5 xfrm: add NULL check in xfrm_update_ae_params
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -890,15 +901,12 @@
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-40133: (unk) drm/vmwgfx: Remove rcu locks from user resources 
   CVE-2022-41848: (unk)  
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
   CVE-2022-4696: (unk) io_uring: remove any grabbing of context 
   CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting 
   CVE-2023-0386: (unk) ovl: fail on invalid uid/gid mapping at copy up 
@@ -919,17 +927,17 @@
   CVE-2023-26242: (unk)  
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3389: (unk) io_uring: mutex locked poll hashing 
   CVE-2023-3397: (unk)  
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
-  CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-4010: (unk)  
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.11/5.11_CVEs.txt b/data/5.11/5.11_CVEs.txt
index 16e352d..089eaaf 100644
--- a/data/5.11/5.11_CVEs.txt
+++ b/data/5.11/5.11_CVEs.txt
@@ -472,15 +472,15 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4696: Fix not seen in stream
@@ -584,7 +584,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -622,15 +622,15 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -638,8 +638,14 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.11/5.11_security.txt b/data/5.11/5.11_security.txt
index 65234d3..e9c67ea 100644
--- a/data/5.11/5.11_security.txt
+++ b/data/5.11/5.11_security.txt
@@ -515,15 +515,15 @@
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
   CVE-2022-43945: (unk) NFSD: Protect against send buffer overflow in NFSv2 READDIR 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4696: (unk) io_uring: remove any grabbing of context 
@@ -626,7 +626,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -664,15 +664,15 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -680,8 +680,14 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.12/5.12_CVEs.txt b/data/5.12/5.12_CVEs.txt
index 9915ca0..a745907 100644
--- a/data/5.12/5.12_CVEs.txt
+++ b/data/5.12/5.12_CVEs.txt
@@ -424,16 +424,16 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fix not seen in stream
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -536,7 +536,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -574,15 +574,15 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -590,8 +590,14 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.12/5.12_security.txt b/data/5.12/5.12_security.txt
index 76cedc5..5654d3c 100644
--- a/data/5.12/5.12_security.txt
+++ b/data/5.12/5.12_security.txt
@@ -457,16 +457,16 @@
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
   CVE-2022-43945: (unk) NFSD: Protect against send buffer overflow in NFSv2 READDIR 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45869: (unk) KVM: x86/mmu: Fix race condition in direct_page_fault 
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -568,7 +568,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -606,15 +606,15 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -622,8 +622,14 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.13/5.13_CVEs.txt b/data/5.13/5.13_CVEs.txt
index 1961e14..e58921e 100644
--- a/data/5.13/5.13_CVEs.txt
+++ b/data/5.13/5.13_CVEs.txt
@@ -392,16 +392,16 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fix not seen in stream
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -505,7 +505,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -543,15 +543,15 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -559,8 +559,15 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.13/5.13_security.txt b/data/5.13/5.13_security.txt
index 806d555..a597670 100644
--- a/data/5.13/5.13_security.txt
+++ b/data/5.13/5.13_security.txt
@@ -425,16 +425,16 @@
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
   CVE-2022-43945: (unk) NFSD: Protect against send buffer overflow in NFSv2 READDIR 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45869: (unk) KVM: x86/mmu: Fix race condition in direct_page_fault 
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -537,7 +537,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -575,15 +575,15 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -591,8 +591,15 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.14/5.14_CVEs.txt b/data/5.14/5.14_CVEs.txt
index d15da08..3305747 100644
--- a/data/5.14/5.14_CVEs.txt
+++ b/data/5.14/5.14_CVEs.txt
@@ -364,17 +364,17 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fix not seen in stream
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -463,6 +463,7 @@
 CVE-2023-2483: Fix not seen in stream
 CVE-2023-25012: Fix not seen in stream
 CVE-2023-2513: Fix not seen in stream
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-26545: Fix not seen in stream
 CVE-2023-26607: Fix not seen in stream
@@ -479,7 +480,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -517,15 +518,15 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -533,8 +534,15 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.14/5.14_security.txt b/data/5.14/5.14_security.txt
index 3d6d321..705aee4 100644
--- a/data/5.14/5.14_security.txt
+++ b/data/5.14/5.14_security.txt
@@ -400,17 +400,17 @@
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
   CVE-2022-43945: (unk) NFSD: Protect against send buffer overflow in NFSv2 READDIR 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45869: (unk) KVM: x86/mmu: Fix race condition in direct_page_fault 
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -497,6 +497,7 @@
   CVE-2023-2483: (unk) net: qcom/emac: Fix use after free bug in emac_remove due to race condition 
   CVE-2023-25012: (unk) HID: bigben: use spinlock to safely schedule workers 
   CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename 
   CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() 
@@ -513,7 +514,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -551,15 +552,15 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -567,8 +568,15 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt
index af55312..a9090d3 100644
--- a/data/5.15/5.15_CVEs.txt
+++ b/data/5.15/5.15_CVEs.txt
@@ -335,17 +335,17 @@
 CVE-2022-4379: Fixed with 5.15.105
 CVE-2022-4382: Fixed with 5.15.90
 CVE-2022-43945: Fixed with 5.15.75
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fixed with 5.15.82
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fixed with 5.15.116
+CVE-2022-45887: Fixed with 5.15.116
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fixed with 5.15.116
 CVE-2022-45934: Fixed with 5.15.85
 CVE-2022-4662: Fixed with 5.15.66
 CVE-2022-4744: Fixed with 5.15.12
@@ -449,6 +449,7 @@
 CVE-2023-2483: Fixed with 5.15.105
 CVE-2023-25012: Fixed with 5.15.99
 CVE-2023-2513: Fixed with 5.15.61
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-26544: Fixed with 5.15.87
 CVE-2023-26545: Fixed with 5.15.95
@@ -467,7 +468,7 @@
 CVE-2023-3090: Fixed with 5.15.113
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fixed with 5.15.63
@@ -513,11 +514,10 @@
 CVE-2023-3610: Fixed with 5.15.119
 CVE-2023-3611: Fixed with 5.15.121
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
-CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
+CVE-2023-3772: Fixed with 5.15.128
 CVE-2023-3776: Fixed with 5.15.121
+CVE-2023-3777: Fixed with 5.15.123
 CVE-2023-3812: Fixed with 5.15.78
 CVE-2023-38426: Fixed with 5.15.113
 CVE-2023-38427: Fix not seen in stream
@@ -529,6 +529,7 @@
 CVE-2023-3863: Fixed with 5.15.121
 CVE-2023-4004: Fixed with 5.15.123
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fixed with 5.15.124
 CVE-2023-40283: Fixed with 5.15.126
 CVE-2023-4128: Fixed with 5.15.126
 CVE-2023-4132: Fixed with 5.15.121
@@ -536,8 +537,15 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fixed with 5.15.124
 CVE-2023-4155: Fix not seen in stream
-CVE-2023-4273: Fix not seen in stream
+CVE-2023-4206: Fixed with 5.15.126
+CVE-2023-4207: Fixed with 5.15.126
+CVE-2023-4208: Fixed with 5.15.126
+CVE-2023-4273: Fixed with 5.15.128
 CVE-2023-4385: Fixed with 5.15.46
 CVE-2023-4387: Fixed with 5.15.42
 CVE-2023-4389: Fixed with 5.15.35
 CVE-2023-4459: Fixed with 5.15.42
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fixed with 5.15.128
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt
index eed1a2a..0762e6d 100644
--- a/data/5.15/5.15_security.txt
+++ b/data/5.15/5.15_security.txt
@@ -558,6 +558,9 @@
   CVE-2023-38429: 61e043326e72b5abb02b5bc9132f2620a7faf8c5 ksmbd: allocate one more byte for implied bcc[0]
 
 CVEs fixed in 5.15.116:
+  CVE-2022-45886: 50831747cb3a880dd4bdebe3fc3c81de9e21582d media: dvb-core: Fix use-after-free due on race condition at dvb_net
+  CVE-2022-45887: d6c47b23599253d7d866e1e8d60cd410855c1be5 media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
+  CVE-2022-45919: 42624bc8c30c463a9155286bb716223ad04dd2a7 media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
   CVE-2023-3212: fd8b4e28f400a067e6ef84569816967be1f0642b gfs2: Don't deref jdesc in evict
   CVE-2023-35788: 45f47d2cf1142fbfe5d6fc39ad78f4aac058907c net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
 
@@ -589,10 +592,12 @@
   CVE-2023-20593: be824fdb827dc06f77a31122949fe1bc011e3e1e x86/cpu/amd: Add a Zenbleed fix
 
 CVEs fixed in 5.15.123:
+  CVE-2023-3777: 10013f764ad2957de08968bd02870b6b7683e3f6 netfilter: nf_tables: skip bound chain on rule flush
   CVE-2023-4004: 706ce3c81b5c8e262a8bcf116ea689d0710c3a13 netfilter: nft_set_pipapo: fix improper element removal
 
 CVEs fixed in 5.15.124:
   CVE-2023-1206: ecb741a17cb2abf693b34d8e05a1e7e40494afb6 tcp: Reduce chance of collisions in inet6_hashfn().
+  CVE-2023-4015: 98bcfcaecc76c4be288278c213b47d36292f40fa netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
   CVE-2023-4147: 5bee91121ccea8d69cea51632e9a1dd348ee49a1 netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
 
 CVEs fixed in 5.15.125:
@@ -603,6 +608,14 @@
   CVE-2023-20588: a74878207b02060c5feaf88b5566208ed08eb78d x86/CPU/AMD: Do not leak quotient data after a division by 0
   CVE-2023-40283: fbe5a2fed8156cc19eb3b956602b0a1dd46a302d Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
   CVE-2023-4128: 262430dfc618509246e07acd26211cb4cca79ecc net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4206: 79c3d81c9ad140957b081c91908d7e2964dc603f net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4207: 9edf7955025a602ab6bcc94d923c436e160a10e3 net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4208: 262430dfc618509246e07acd26211cb4cca79ecc net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
+
+CVEs fixed in 5.15.128:
+  CVE-2023-3772: 075448a2eb753f813fe873cfa52853e9fef8eedb xfrm: add NULL check in xfrm_update_ae_params
+  CVE-2023-4273: 6b64974e02ea82d0bae917f1fa79495a1a59b5bf exfat: check if filename entries exceeds max filename length
+  CVE-2023-4569: 1adaec4758d1cefbf348a291ad9b752aaa10f8d3 netfilter: nf_tables: deactivate catchall elements in next generation
 
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
@@ -690,16 +703,13 @@
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-40133: (unk) drm/vmwgfx: Remove rcu locks from user resources 
   CVE-2022-41848: (unk)  
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
   CVE-2022-47940: (unk) ksmbd: validate length in smb2_write() 
   CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area 
   CVE-2023-1075: (unk) net/tls: tls_is_tx_ready() checked list_entry 
@@ -714,10 +724,11 @@
   CVE-2023-23000: (unk) phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function 
   CVE-2023-23039: (unk)  
   CVE-2023-2430: (unk) io_uring/msg_ring: fix missing lock on overflow for IOPOLL 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-32247: (unk) ksmbd: destroy expired sessions 
@@ -731,10 +742,7 @@
   CVE-2023-3439: (unk) mctp: defer the kfree of object mdev->addrs 
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
-  CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-38427: (unk) ksmbd: fix out-of-bound read in deassemble_neg_contexts() 
   CVE-2023-38430: (unk) ksmbd: validate smb request protocol id 
   CVE-2023-38431: (unk) ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop 
@@ -742,4 +750,6 @@
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
-  CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt
index 6147baf..45c7ae1 100644
--- a/data/5.16/5.16_CVEs.txt
+++ b/data/5.16/5.16_CVEs.txt
@@ -304,17 +304,17 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fix not seen in stream
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-47518: Fix not seen in stream
@@ -417,6 +417,7 @@
 CVE-2023-2483: Fix not seen in stream
 CVE-2023-25012: Fix not seen in stream
 CVE-2023-2513: Fix not seen in stream
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-26544: Fix not seen in stream
 CVE-2023-26545: Fix not seen in stream
@@ -435,7 +436,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -481,11 +482,10 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-38426: Fix not seen in stream
 CVE-2023-38427: Fix not seen in stream
@@ -497,6 +497,7 @@
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -504,9 +505,16 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4394: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt
index 8144956..1352d3f 100644
--- a/data/5.16/5.16_security.txt
+++ b/data/5.16/5.16_security.txt
@@ -348,17 +348,17 @@
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
   CVE-2022-43945: (unk) NFSD: Protect against send buffer overflow in NFSv2 READDIR 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45869: (unk) KVM: x86/mmu: Fix race condition in direct_page_fault 
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-47518: (unk) wifi: wilc1000: validate number of channels 
@@ -454,6 +454,7 @@
   CVE-2023-2483: (unk) net: qcom/emac: Fix use after free bug in emac_remove due to race condition 
   CVE-2023-25012: (unk) HID: bigben: use spinlock to safely schedule workers 
   CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-26544: (unk) fs/ntfs3: Fix slab-out-of-bounds read in run_unpack 
   CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename 
@@ -471,7 +472,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -517,11 +518,10 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-38426: (unk) ksmbd: fix global-out-of-bounds in smb2_find_context_vals 
   CVE-2023-38427: (unk) ksmbd: fix out-of-bound read in deassemble_neg_contexts() 
@@ -533,6 +533,7 @@
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -540,9 +541,16 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4394: (unk) btrfs: fix possible memory leak in btrfs_get_dev_args_from_path() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt
index cd23445..72780ed 100644
--- a/data/5.17/5.17_CVEs.txt
+++ b/data/5.17/5.17_CVEs.txt
@@ -248,17 +248,17 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fix not seen in stream
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-47518: Fix not seen in stream
@@ -359,6 +359,7 @@
 CVE-2023-2483: Fix not seen in stream
 CVE-2023-25012: Fix not seen in stream
 CVE-2023-2513: Fix not seen in stream
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-26544: Fix not seen in stream
 CVE-2023-26545: Fix not seen in stream
@@ -378,7 +379,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -426,11 +427,11 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
 CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-38426: Fix not seen in stream
 CVE-2023-38427: Fix not seen in stream
@@ -442,6 +443,7 @@
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -449,9 +451,16 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fixed with 5.17.14
 CVE-2023-4387: Fixed with 5.17.10
 CVE-2023-4389: Fixed with 5.17.4
 CVE-2023-4394: Fix not seen in stream
 CVE-2023-4459: Fixed with 5.17.10
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt
index 0c908ab..6d2e6ea 100644
--- a/data/5.17/5.17_security.txt
+++ b/data/5.17/5.17_security.txt
@@ -293,17 +293,17 @@
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
   CVE-2022-43945: (unk) NFSD: Protect against send buffer overflow in NFSv2 READDIR 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45869: (unk) KVM: x86/mmu: Fix race condition in direct_page_fault 
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-47518: (unk) wifi: wilc1000: validate number of channels 
@@ -398,6 +398,7 @@
   CVE-2023-2483: (unk) net: qcom/emac: Fix use after free bug in emac_remove due to race condition 
   CVE-2023-25012: (unk) HID: bigben: use spinlock to safely schedule workers 
   CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-26544: (unk) fs/ntfs3: Fix slab-out-of-bounds read in run_unpack 
   CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename 
@@ -416,7 +417,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -462,11 +463,11 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
   CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-38426: (unk) ksmbd: fix global-out-of-bounds in smb2_find_context_vals 
   CVE-2023-38427: (unk) ksmbd: fix out-of-bound read in deassemble_neg_contexts() 
@@ -478,6 +479,7 @@
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -485,5 +487,12 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4394: (unk) btrfs: fix possible memory leak in btrfs_get_dev_args_from_path() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.18/5.18_CVEs.txt b/data/5.18/5.18_CVEs.txt
index b5f4dfa..32bc8b1 100644
--- a/data/5.18/5.18_CVEs.txt
+++ b/data/5.18/5.18_CVEs.txt
@@ -203,17 +203,17 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fix not seen in stream
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-47518: Fix not seen in stream
@@ -309,6 +309,7 @@
 CVE-2023-2483: Fix not seen in stream
 CVE-2023-25012: Fix not seen in stream
 CVE-2023-2513: Fixed with 5.18.18
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-26544: Fix not seen in stream
 CVE-2023-26545: Fix not seen in stream
@@ -328,7 +329,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -376,11 +377,11 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
 CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-38426: Fix not seen in stream
 CVE-2023-38427: Fix not seen in stream
@@ -392,6 +393,7 @@
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -399,8 +401,15 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fixed with 5.18.3
 CVE-2023-4387: Fixed with 5.18
 CVE-2023-4394: Fix not seen in stream
 CVE-2023-4459: Fixed with 5.18
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.18/5.18_security.txt b/data/5.18/5.18_security.txt
index 15ad582..a0bf5d9 100644
--- a/data/5.18/5.18_security.txt
+++ b/data/5.18/5.18_security.txt
@@ -257,17 +257,17 @@
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
   CVE-2022-43945: (unk) NFSD: Protect against send buffer overflow in NFSv2 READDIR 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45869: (unk) KVM: x86/mmu: Fix race condition in direct_page_fault 
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-47518: (unk) wifi: wilc1000: validate number of channels 
@@ -349,6 +349,7 @@
   CVE-2023-2430: (unk) io_uring/msg_ring: fix missing lock on overflow for IOPOLL 
   CVE-2023-2483: (unk) net: qcom/emac: Fix use after free bug in emac_remove due to race condition 
   CVE-2023-25012: (unk) HID: bigben: use spinlock to safely schedule workers 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-26544: (unk) fs/ntfs3: Fix slab-out-of-bounds read in run_unpack 
   CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename 
@@ -367,7 +368,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -415,11 +416,11 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
   CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-38426: (unk) ksmbd: fix global-out-of-bounds in smb2_find_context_vals 
   CVE-2023-38427: (unk) ksmbd: fix out-of-bound read in deassemble_neg_contexts() 
@@ -431,6 +432,7 @@
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -438,5 +440,12 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4394: (unk) btrfs: fix possible memory leak in btrfs_get_dev_args_from_path() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.19/5.19_CVEs.txt b/data/5.19/5.19_CVEs.txt
index 549d5a9..03e2793 100644
--- a/data/5.19/5.19_CVEs.txt
+++ b/data/5.19/5.19_CVEs.txt
@@ -158,17 +158,17 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fixed with 5.19.17
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fix not seen in stream
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fixed with 5.19.8
 CVE-2022-47518: Fix not seen in stream
@@ -266,6 +266,7 @@
 CVE-2023-2483: Fix not seen in stream
 CVE-2023-25012: Fix not seen in stream
 CVE-2023-2513: Fixed with 5.19.2
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-2640: Fix unknown
 CVE-2023-26544: Fix not seen in stream
@@ -285,7 +286,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fixed with 5.19.4
@@ -334,11 +335,11 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
 CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-38409: Fix not seen in stream
 CVE-2023-38426: Fix not seen in stream
@@ -351,6 +352,7 @@
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -358,5 +360,12 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4394: Fixed with 5.19.6
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.19/5.19_security.txt b/data/5.19/5.19_security.txt
index 8d08251..31f7a05 100644
--- a/data/5.19/5.19_security.txt
+++ b/data/5.19/5.19_security.txt
@@ -199,17 +199,17 @@
   CVE-2022-4378: (unk) proc: proc_skip_spaces() shouldn't think it is working on C strings 
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45869: (unk) KVM: x86/mmu: Fix race condition in direct_page_fault 
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-47518: (unk) wifi: wilc1000: validate number of channels 
   CVE-2022-47519: (unk) wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute 
@@ -298,6 +298,7 @@
   CVE-2023-2430: (unk) io_uring/msg_ring: fix missing lock on overflow for IOPOLL 
   CVE-2023-2483: (unk) net: qcom/emac: Fix use after free bug in emac_remove due to race condition 
   CVE-2023-25012: (unk) HID: bigben: use spinlock to safely schedule workers 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-2640: (unk)  
   CVE-2023-26544: (unk) fs/ntfs3: Fix slab-out-of-bounds read in run_unpack 
@@ -317,7 +318,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3117: (unk) netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE 
@@ -365,11 +366,11 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
   CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-38409: (unk) fbcon: set_con2fb_map needs to set con2fb_map! 
   CVE-2023-38426: (unk) ksmbd: fix global-out-of-bounds in smb2_find_context_vals 
@@ -382,6 +383,7 @@
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -389,4 +391,11 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.2/5.2_CVEs.txt b/data/5.2/5.2_CVEs.txt
index 0d0de7b..4c70488 100644
--- a/data/5.2/5.2_CVEs.txt
+++ b/data/5.2/5.2_CVEs.txt
@@ -715,15 +715,15 @@
 CVE-2022-42895: Fix not seen in stream
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -809,7 +809,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -842,10 +842,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -855,6 +853,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.2/5.2_security.txt b/data/5.2/5.2_security.txt
index 5afbc10..6222927 100644
--- a/data/5.2/5.2_security.txt
+++ b/data/5.2/5.2_security.txt
@@ -753,15 +753,15 @@
   CVE-2022-42895: (unk) Bluetooth: L2CAP: Fix attempting to access uninitialized memory 
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -847,7 +847,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -880,10 +880,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -893,6 +891,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.3/5.3_CVEs.txt b/data/5.3/5.3_CVEs.txt
index 2222c71..f098780 100644
--- a/data/5.3/5.3_CVEs.txt
+++ b/data/5.3/5.3_CVEs.txt
@@ -688,15 +688,15 @@
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -784,7 +784,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -817,10 +817,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -830,6 +828,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.3/5.3_security.txt b/data/5.3/5.3_security.txt
index bc043da..3963a7c 100644
--- a/data/5.3/5.3_security.txt
+++ b/data/5.3/5.3_security.txt
@@ -724,15 +724,15 @@
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -820,7 +820,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -853,10 +853,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -866,6 +864,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt
index cf30703..4420d96 100644
--- a/data/5.4/5.4_CVEs.txt
+++ b/data/5.4/5.4_CVEs.txt
@@ -617,15 +617,15 @@
 CVE-2022-42896: Fixed with 5.4.226
 CVE-2022-43750: Fixed with 5.4.218
 CVE-2022-4382: Fixed with 5.4.230
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fixed with 5.4.246
+CVE-2022-45887: Fixed with 5.4.246
+CVE-2022-45919: Fixed with 5.4.246
 CVE-2022-45934: Fixed with 5.4.229
 CVE-2022-4662: Fixed with 5.4.213
 CVE-2022-4744: Fixed with 5.4.240
@@ -714,7 +714,7 @@
 CVE-2023-3090: Fixed with 5.4.244
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fixed with 5.4.247
@@ -747,10 +747,8 @@
 CVE-2023-3609: Fixed with 5.4.248
 CVE-2023-3611: Fixed with 5.4.253
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
-CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
+CVE-2023-3772: Fixed with 5.4.255
 CVE-2023-3776: Fixed with 5.4.251
 CVE-2023-3812: Fixed with 5.4.224
 CVE-2023-3863: Fixed with 5.4.251
@@ -760,6 +758,11 @@
 CVE-2023-4132: Fixed with 5.4.251
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fixed with 5.4.253
+CVE-2023-4207: Fixed with 5.4.253
+CVE-2023-4208: Fixed with 5.4.253
 CVE-2023-4385: Fixed with 5.4.198
 CVE-2023-4387: Fixed with 5.4.196
 CVE-2023-4459: Fixed with 5.4.196
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt
index 379678e..b7de17b 100644
--- a/data/5.4/5.4_security.txt
+++ b/data/5.4/5.4_security.txt
@@ -940,6 +940,9 @@
   CVE-2023-3141: a2a5d3a584bf86c9c09017381a8fc63cfaf5a9e6 memstick: r592: Fix UAF bug in r592_remove due to race condition
 
 CVEs fixed in 5.4.246:
+  CVE-2022-45886: ed47886a73dbc0477ae09a4a979e27317cf2b52d media: dvb-core: Fix use-after-free due on race condition at dvb_net
+  CVE-2022-45887: 08b20cb8e5b9d69bb3b83c1ad30a702767a9f0ef media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
+  CVE-2022-45919: 353fd22693a672efb337d399e610898c64f57b17 media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
   CVE-2023-35788: 94a00f1142c581fe01d17d7beca314592f85e83a net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
 
 CVEs fixed in 5.4.247:
@@ -976,6 +979,12 @@
   CVE-2023-3611: cf8ecd6ea68099a38e94e9b82cf58f6fd4cdf3c9 net/sched: sch_qfq: account for stab overhead in qfq_enqueue
   CVE-2023-40283: a2da00d1ea1abfb04f846638e210b5b5166e3c9c Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
   CVE-2023-4128: be785808db32b595728c4042d002c83d0dd4b66f net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4206: 1c8262f31fd2d23d1cfd2539715d976c2a99e582 net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4207: 83e3d4b0ae373dcba30c68bf28f8d179191a297a net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4208: be785808db32b595728c4042d002c83d0dd4b66f net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
+
+CVEs fixed in 5.4.255:
+  CVE-2023-3772: 8046beb890ebc83c5820188c650073e1c6066e67 xfrm: add NULL check in xfrm_update_ae_params
 
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
@@ -1102,15 +1111,12 @@
   CVE-2022-40133: (unk) drm/vmwgfx: Remove rcu locks from user resources 
   CVE-2022-41848: (unk)  
   CVE-2022-4269: (unk) act_mirred: use the backlog for nested calls to mirred ingress 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
   CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets 
   CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting 
   CVE-2023-0240: (unk) io_uring: COW io_identity on mismatch 
@@ -1134,7 +1140,7 @@
   CVE-2023-26242: (unk)  
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-33288: (unk) power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition 
@@ -1142,10 +1148,9 @@
   CVE-2023-3397: (unk)  
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
-  CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-4010: (unk)  
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.5/5.5_CVEs.txt b/data/5.5/5.5_CVEs.txt
index 7fef9d8..fdea4c0 100644
--- a/data/5.5/5.5_CVEs.txt
+++ b/data/5.5/5.5_CVEs.txt
@@ -577,15 +577,15 @@
 CVE-2022-42896: Fix not seen in stream
 CVE-2022-43750: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -675,7 +675,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -708,10 +708,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -721,6 +719,11 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.5/5.5_security.txt b/data/5.5/5.5_security.txt
index 79b3540..03b9e04 100644
--- a/data/5.5/5.5_security.txt
+++ b/data/5.5/5.5_security.txt
@@ -611,15 +611,15 @@
   CVE-2022-42896: (unk) Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM 
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -709,7 +709,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -742,10 +742,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -755,6 +753,11 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.6/5.6_CVEs.txt b/data/5.6/5.6_CVEs.txt
index 6a5a8e6..50a8e57 100644
--- a/data/5.6/5.6_CVEs.txt
+++ b/data/5.6/5.6_CVEs.txt
@@ -553,15 +553,15 @@
 CVE-2022-43750: Fix not seen in stream
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -654,7 +654,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -687,10 +687,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -701,6 +699,12 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.6/5.6_security.txt b/data/5.6/5.6_security.txt
index 44b2c47..d93e3cc 100644
--- a/data/5.6/5.6_security.txt
+++ b/data/5.6/5.6_security.txt
@@ -587,15 +587,15 @@
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -688,7 +688,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -721,10 +721,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -735,6 +733,12 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.7/5.7_CVEs.txt b/data/5.7/5.7_CVEs.txt
index 7210e15..8b043d3 100644
--- a/data/5.7/5.7_CVEs.txt
+++ b/data/5.7/5.7_CVEs.txt
@@ -544,15 +544,15 @@
 CVE-2022-43750: Fix not seen in stream
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -652,7 +652,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -685,10 +685,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -699,8 +697,14 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.7/5.7_security.txt b/data/5.7/5.7_security.txt
index d9f8021..54375c9 100644
--- a/data/5.7/5.7_security.txt
+++ b/data/5.7/5.7_security.txt
@@ -578,15 +578,15 @@
   CVE-2022-43750: (unk) usb: mon: make mmapped memory read only 
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -686,7 +686,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -719,10 +719,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -733,8 +731,14 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.8/5.8_CVEs.txt b/data/5.8/5.8_CVEs.txt
index f73e100..b3edf4a 100644
--- a/data/5.8/5.8_CVEs.txt
+++ b/data/5.8/5.8_CVEs.txt
@@ -528,15 +528,15 @@
 CVE-2022-4378: Fix not seen in stream
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -638,7 +638,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -672,10 +672,8 @@
 CVE-2023-3609: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
@@ -686,8 +684,14 @@
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.8/5.8_security.txt b/data/5.8/5.8_security.txt
index f636401..cb5de98 100644
--- a/data/5.8/5.8_security.txt
+++ b/data/5.8/5.8_security.txt
@@ -562,15 +562,15 @@
   CVE-2022-4378: (unk) proc: proc_skip_spaces() shouldn't think it is working on C strings 
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -672,7 +672,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -706,10 +706,8 @@
   CVE-2023-3609: (unk) net/sched: cls_u32: Fix reference counter leak leading to overflow 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
@@ -720,8 +718,14 @@
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/5.9/5.9_CVEs.txt b/data/5.9/5.9_CVEs.txt
index d638a07..4a6f737 100644
--- a/data/5.9/5.9_CVEs.txt
+++ b/data/5.9/5.9_CVEs.txt
@@ -501,15 +501,15 @@
 CVE-2022-4378: Fix not seen in stream
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fix not seen in stream
 CVE-2022-4662: Fix not seen in stream
 CVE-2022-4744: Fix not seen in stream
@@ -611,7 +611,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3111: Fix not seen in stream
@@ -647,23 +647,29 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
-CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
 CVE-2023-4387: Fix not seen in stream
 CVE-2023-4389: Fix not seen in stream
 CVE-2023-4459: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/5.9/5.9_security.txt b/data/5.9/5.9_security.txt
index ac45ccd..03a200c 100644
--- a/data/5.9/5.9_security.txt
+++ b/data/5.9/5.9_security.txt
@@ -531,15 +531,15 @@
   CVE-2022-4378: (unk) proc: proc_skip_spaces() shouldn't think it is working on C strings 
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-45934: (unk) Bluetooth: L2CAP: Fix u8 overflow 
   CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls 
   CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev 
@@ -641,7 +641,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3111: (unk) btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() 
@@ -677,23 +677,29 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
-  CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
   CVE-2023-4387: (unk) net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() 
   CVE-2023-4389: (unk) btrfs: fix root ref counts in error handling in btrfs_get_root_ref 
   CVE-2023-4459: (unk) net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/6.0/6.0_CVEs.txt b/data/6.0/6.0_CVEs.txt
index c817041..bdce6da 100644
--- a/data/6.0/6.0_CVEs.txt
+++ b/data/6.0/6.0_CVEs.txt
@@ -129,17 +129,17 @@
 CVE-2022-4379: Fix not seen in stream
 CVE-2022-4382: Fix not seen in stream
 CVE-2022-43945: Fixed with 6.0.3
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45869: Fixed with 6.0.11
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-45934: Fixed with 6.0.15
 CVE-2022-47518: Fixed with 6.0.11
 CVE-2022-47519: Fixed with 6.0.11
@@ -224,6 +224,7 @@
 CVE-2023-2430: Fix not seen in stream
 CVE-2023-2483: Fix not seen in stream
 CVE-2023-25012: Fix not seen in stream
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-2640: Fix unknown
 CVE-2023-26544: Fixed with 6.0.17
@@ -242,7 +243,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3117: Fix not seen in stream
@@ -289,11 +290,11 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
 CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-3812: Fixed with 6.0.8
 CVE-2023-38409: Fix not seen in stream
 CVE-2023-38426: Fix not seen in stream
@@ -306,6 +307,7 @@
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -313,4 +315,11 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/6.0/6.0_security.txt b/data/6.0/6.0_security.txt
index 066f3b7..4d273b2 100644
--- a/data/6.0/6.0_security.txt
+++ b/data/6.0/6.0_security.txt
@@ -193,16 +193,16 @@
   CVE-2022-4269: (unk) act_mirred: use the backlog for nested calls to mirred ingress 
   CVE-2022-4379: (unk) NFSD: fix use-after-free in __nfs42_ssc_open() 
   CVE-2022-4382: (unk) USB: gadgetfs: Fix race between mounting and unmounting 
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes 
   CVE-2022-4842: (unk) fs/ntfs3: Fix attr_punch_hole() null pointer derenference 
   CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs 
@@ -266,6 +266,7 @@
   CVE-2023-2430: (unk) io_uring/msg_ring: fix missing lock on overflow for IOPOLL 
   CVE-2023-2483: (unk) net: qcom/emac: Fix use after free bug in emac_remove due to race condition 
   CVE-2023-25012: (unk) HID: bigben: use spinlock to safely schedule workers 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-2640: (unk)  
   CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename 
@@ -278,7 +279,7 @@
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3117: (unk) netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE 
@@ -324,11 +325,11 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
   CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-38409: (unk) fbcon: set_con2fb_map needs to set con2fb_map! 
   CVE-2023-38426: (unk) ksmbd: fix global-out-of-bounds in smb2_find_context_vals 
   CVE-2023-38427: (unk) ksmbd: fix out-of-bound read in deassemble_neg_contexts() 
@@ -340,6 +341,7 @@
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
@@ -347,4 +349,11 @@
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/6.1/6.1_CVEs.txt b/data/6.1/6.1_CVEs.txt
index e63ef46..189c16f 100644
--- a/data/6.1/6.1_CVEs.txt
+++ b/data/6.1/6.1_CVEs.txt
@@ -87,16 +87,16 @@
 CVE-2022-4378: Fixed with 6.1
 CVE-2022-4379: Fixed with 6.1.3
 CVE-2022-4382: Fixed with 6.1.8
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
+CVE-2022-45886: Fixed with 6.1.33
+CVE-2022-45887: Fixed with 6.1.33
 CVE-2022-45888: Fix not seen in stream
-CVE-2022-45919: Fix unknown
+CVE-2022-45919: Fixed with 6.1.33
 CVE-2022-45934: Fixed with 6.1
 CVE-2022-47929: Fixed with 6.1.6
 CVE-2022-4842: Fixed with 6.1.8
@@ -167,9 +167,10 @@
 CVE-2023-23454: Fixed with 6.1.5
 CVE-2023-23455: Fixed with 6.1.5
 CVE-2023-23559: Fixed with 6.1.9
-CVE-2023-2430: Fix not seen in stream
+CVE-2023-2430: Fixed with 6.1.50
 CVE-2023-2483: Fixed with 6.1.22
 CVE-2023-25012: Fixed with 6.1.16
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-2640: Fix unknown
 CVE-2023-26544: Fixed with 6.1.3
@@ -186,7 +187,7 @@
 CVE-2023-3090: Fixed with 6.1.30
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3117: Fixed with 6.1.35
@@ -234,11 +235,11 @@
 CVE-2023-3610: Fixed with 6.1.36
 CVE-2023-3611: Fixed with 6.1.40
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fixed with 6.1.47
 CVE-2023-3773: Fixed with 6.1.47
 CVE-2023-3776: Fixed with 6.1.40
+CVE-2023-3777: Fixed with 6.1.42
 CVE-2023-38409: Fixed with 6.1.25
 CVE-2023-38426: Fixed with 6.1.30
 CVE-2023-38427: Fixed with 6.1.34
@@ -250,6 +251,7 @@
 CVE-2023-3863: Fixed with 6.1.39
 CVE-2023-4004: Fixed with 6.1.42
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fixed with 6.1.43
 CVE-2023-40283: Fixed with 6.1.45
 CVE-2023-4128: Fixed with 6.1.45
 CVE-2023-4132: Fixed with 6.1.39
@@ -257,4 +259,11 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fixed with 6.1.43
 CVE-2023-4155: Fixed with 6.1.46
+CVE-2023-4206: Fixed with 6.1.45
+CVE-2023-4207: Fixed with 6.1.45
+CVE-2023-4208: Fixed with 6.1.45
 CVE-2023-4273: Fixed with 6.1.45
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fixed with 6.1.47
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/6.1/6.1_security.txt b/data/6.1/6.1_security.txt
index 158621c..40ea864 100644
--- a/data/6.1/6.1_security.txt
+++ b/data/6.1/6.1_security.txt
@@ -169,6 +169,9 @@
   CVE-2023-21255: e1e198eff1fbaf56fd8022c4fbbf59c5324ea320 binder: fix UAF caused by faulty buffer cleanup
 
 CVEs fixed in 6.1.33:
+  CVE-2022-45886: 93b5dfebcb1821dde466e29404fcf1fb919f4c72 media: dvb-core: Fix use-after-free due on race condition at dvb_net
+  CVE-2022-45887: ea2938c27b0212aaab6702c16b7385e073b35643 media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
+  CVE-2022-45919: d5d61f747e3f1ff9042db66896f2f90afa5f3197 media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
   CVE-2022-48425: a8eaa9a06addbd9cb0238cb1c729921ecbb6504c fs/ntfs3: Validate MFT flags before replaying logs
   CVE-2023-1192: a8eaa9a06addbd9cb0238cb1c729921ecbb6504c fs/ntfs3: Validate MFT flags before replaying logs
   CVE-2023-2124: a2961463d74f5c86a8dda3b41c484c28ccc4c289 xfs: verify buffer contents when we skip log replay
@@ -209,10 +212,12 @@
   CVE-2023-20593: ed9b87010aa84c157096f98c322491e9af8e8f07 x86/cpu/amd: Add a Zenbleed fix
 
 CVEs fixed in 6.1.42:
+  CVE-2023-3777: e18922ce3e3169eb97838d1dcba2d679bcca446c netfilter: nf_tables: skip bound chain on rule flush
   CVE-2023-4004: 90c3955beb858bb52a9e5c4380ed0e520e3730d1 netfilter: nft_set_pipapo: fix improper element removal
 
 CVEs fixed in 6.1.43:
   CVE-2023-1206: 51aea7e9d5212adb8a3d198510cfcde4125988f9 tcp: Reduce chance of collisions in inet6_hashfn().
+  CVE-2023-4015: 4237462a073e24f71c700f3e5929f07b6ee1bcaa netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
   CVE-2023-4147: 268cb07ef3ee17b5454a7c4b23376802c5b00c79 netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
 
 CVEs fixed in 6.1.44:
@@ -224,6 +229,9 @@
   CVE-2023-20588: f2615bb47be4f53be92c81a6a8aa286c92ef04d9 x86/CPU/AMD: Do not leak quotient data after a division by 0
   CVE-2023-40283: 29fac18499332211b2615ade356e2bd8b3269f98 Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
   CVE-2023-4128: aab2d095ce4dd8d01ca484c0cc641fb497bf74db net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4206: d4d3b53a4c66004e8e864fea744b3a2b86a73b62 net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4207: 7f691439b29be0aae68f83ad5eecfddc11007724 net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4208: aab2d095ce4dd8d01ca484c0cc641fb497bf74db net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
   CVE-2023-4273: c2fdf827f8fc6a571e1b7cc38a61041f0321adf5 exfat: check if filename entries exceeds max filename length
 
 CVEs fixed in 6.1.46:
@@ -232,6 +240,10 @@
 CVEs fixed in 6.1.47:
   CVE-2023-3772: 87b655f4936b6fc01f3658aa88a22c923b379ebd xfrm: add NULL check in xfrm_update_ae_params
   CVE-2023-3773: a442cd17019385c53bbddf3bb92d91474081916b xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
+  CVE-2023-4569: 00ea7eb1c69eec91cdf9259f0e427c56e7999fcd netfilter: nf_tables: deactivate catchall elements in next generation
+
+CVEs fixed in 6.1.50:
+  CVE-2023-2430: 22a406b3629a10979916ea7cace47858410117b5 io_uring/msg_ring: fix missing lock on overflow for IOPOLL
 
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
@@ -304,16 +316,13 @@
   CVE-2022-3642: (unk)  
   CVE-2022-38096: (unk)  
   CVE-2022-41848: (unk)  
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
   CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition 
-  CVE-2022-45919: (unk)  
   CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area 
   CVE-2023-1193: (unk)  
   CVE-2023-1194: (unk)  
@@ -323,20 +332,22 @@
   CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr 
   CVE-2023-23005: (unk) mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init 
   CVE-2023-23039: (unk)  
-  CVE-2023-2430: (unk) io_uring/msg_ring: fix missing lock on overflow for IOPOLL 
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-2640: (unk)  
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-32629: (unk)  
   CVE-2023-3397: (unk)  
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-4010: (unk)  
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/6.2/6.2_CVEs.txt b/data/6.2/6.2_CVEs.txt
index feb9f49..1a7f4a6 100644
--- a/data/6.2/6.2_CVEs.txt
+++ b/data/6.2/6.2_CVEs.txt
@@ -71,15 +71,15 @@
 CVE-2022-40982: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-4269: Fixed with 6.2.9
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fix not seen in stream
+CVE-2022-45887: Fix not seen in stream
+CVE-2022-45919: Fix not seen in stream
 CVE-2022-48425: Fix not seen in stream
 CVE-2023-0160: Fixed with 6.2.15
 CVE-2023-0459: Fixed with 6.2.1
@@ -123,6 +123,7 @@
 CVE-2023-23039: Fix unknown
 CVE-2023-2483: Fixed with 6.2.9
 CVE-2023-25012: Fixed with 6.2.3
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-2640: Fix unknown
 CVE-2023-26545: Fixed with 6.2
@@ -135,7 +136,7 @@
 CVE-2023-3090: Fix not seen in stream
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3117: Fix not seen in stream
@@ -180,11 +181,11 @@
 CVE-2023-3610: Fix not seen in stream
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
 CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-38409: Fixed with 6.2.12
 CVE-2023-38426: Fix not seen in stream
 CVE-2023-38427: Fix not seen in stream
@@ -196,6 +197,7 @@
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -203,4 +205,11 @@
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/6.2/6.2_security.txt b/data/6.2/6.2_security.txt
index 1aed3bd..70820a3 100644
--- a/data/6.2/6.2_security.txt
+++ b/data/6.2/6.2_security.txt
@@ -159,15 +159,15 @@
   CVE-2022-38096: (unk)  
   CVE-2022-40982: (unk) x86/speculation: Add Gather Data Sampling mitigation 
   CVE-2022-41848: (unk)  
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
+  CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net 
+  CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() 
+  CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 
   CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs 
   CVE-2023-1192: (unk) fs/ntfs3: Validate MFT flags before replaying logs 
   CVE-2023-1193: (unk)  
@@ -183,13 +183,14 @@
   CVE-2023-21400: (unk)  
   CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr 
   CVE-2023-23039: (unk)  
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-2640: (unk)  
   CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() 
   CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-3117: (unk) netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE 
@@ -210,11 +211,11 @@
   CVE-2023-3610: (unk) netfilter: nf_tables: fix chain binding transaction logic 
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
   CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-38426: (unk) ksmbd: fix global-out-of-bounds in smb2_find_context_vals 
   CVE-2023-38427: (unk) ksmbd: fix out-of-bound read in deassemble_neg_contexts() 
   CVE-2023-38428: (unk) ksmbd: fix wrong UserName check in session_user 
@@ -225,10 +226,18 @@
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/6.3/6.3_CVEs.txt b/data/6.3/6.3_CVEs.txt
index 71fe895..865654a 100644
--- a/data/6.3/6.3_CVEs.txt
+++ b/data/6.3/6.3_CVEs.txt
@@ -69,15 +69,15 @@
 CVE-2022-38096: Fix unknown
 CVE-2022-40982: Fix not seen in stream
 CVE-2022-41848: Fix unknown
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
+CVE-2022-44032: Fix not seen in stream
+CVE-2022-44033: Fix not seen in stream
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
+CVE-2022-45886: Fixed with 6.3.7
+CVE-2022-45887: Fixed with 6.3.7
+CVE-2022-45919: Fixed with 6.3.7
 CVE-2022-48425: Fixed with 6.3.4
 CVE-2023-0160: Fixed with 6.3.2
 CVE-2023-1192: Fixed with 6.3.4
@@ -99,6 +99,7 @@
 CVE-2023-2248: Fixed with 6.3
 CVE-2023-2269: Fixed with 6.3.2
 CVE-2023-23039: Fix unknown
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-2598: Fixed with 6.3.2
 CVE-2023-26242: Fix unknown
 CVE-2023-2640: Fix unknown
@@ -106,7 +107,7 @@
 CVE-2023-3090: Fixed with 6.3.4
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31084: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-3117: Fixed with 6.3.9
@@ -146,11 +147,12 @@
 CVE-2023-3610: Fixed with 6.3.10
 CVE-2023-3611: Fix not seen in stream
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
+CVE-2023-37453: Fix not seen in stream
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fix not seen in stream
 CVE-2023-3773: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
+CVE-2023-3777: Fix not seen in stream
 CVE-2023-38426: Fixed with 6.3.4
 CVE-2023-38427: Fixed with 6.3.8
 CVE-2023-38428: Fixed with 6.3.4
@@ -161,6 +163,7 @@
 CVE-2023-3863: Fixed with 6.3.13
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
@@ -169,4 +172,11 @@
 CVE-2023-4147: Fix not seen in stream
 CVE-2023-4155: Fix not seen in stream
 CVE-2023-4194: Fix not seen in stream
+CVE-2023-4206: Fix not seen in stream
+CVE-2023-4207: Fix not seen in stream
+CVE-2023-4208: Fix not seen in stream
 CVE-2023-4273: Fix not seen in stream
+CVE-2023-4563: Fix not seen in stream
+CVE-2023-4569: Fix not seen in stream
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/6.3/6.3_security.txt b/data/6.3/6.3_security.txt
index a454e10..056237b 100644
--- a/data/6.3/6.3_security.txt
+++ b/data/6.3/6.3_security.txt
@@ -50,6 +50,9 @@
   CVE-2023-21255: c9e6aae1f26758f3e87b93cff18d79dfd80f2f25 binder: fix UAF caused by faulty buffer cleanup
 
 CVEs fixed in 6.3.7:
+  CVE-2022-45886: 8bade849b15b3ecb62893f328b2cc4cdc65ac0c6 media: dvb-core: Fix use-after-free due on race condition at dvb_net
+  CVE-2022-45887: dbef7d1ffea0ccc95446c5383e0be65babedf667 media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
+  CVE-2022-45919: 59918dd7a6d1ad098550ca6fcf154c1ae6842bc7 media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
   CVE-2023-2124: 69ebe82c73f4f9f4b49ed3b35ce347af20716d0a xfs: verify buffer contents when we skip log replay
   CVE-2023-21264: c3cd33abe63f0ea32c3966ae67a7efc48e86c3e0 KVM: arm64: Prevent unconditional donation of unmapped regions from the host
   CVE-2023-3212: 14c454764a37b194dc916c07488ce7339c82bc4f gfs2: Don't deref jdesc in evict
@@ -150,15 +153,12 @@
   CVE-2022-38096: (unk)  
   CVE-2022-40982: (unk) x86/speculation: Add Gather Data Sampling mitigation 
   CVE-2022-41848: (unk)  
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
+  CVE-2022-44032: (unk) char: pcmcia: remove all the drivers 
+  CVE-2022-44033: (unk) char: pcmcia: remove all the drivers 
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
   CVE-2023-1193: (unk)  
   CVE-2023-1194: (unk)  
   CVE-2023-1206: (unk) tcp: Reduce chance of collisions in inet6_hashfn(). 
@@ -168,12 +168,13 @@
   CVE-2023-20941: (unk)  
   CVE-2023-21400: (unk)  
   CVE-2023-23039: (unk)  
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-2640: (unk)  
   CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() 
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() 
   CVE-2023-31085: (unk)  
   CVE-2023-31248: (unk) netfilter: nf_tables: do not ignore genmask when looking up chain by id 
@@ -184,17 +185,26 @@
   CVE-2023-35827: (unk)  
   CVE-2023-3611: (unk) net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
+  CVE-2023-37453: (unk) USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() 
   CVE-2023-37454: (unk)  
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
   CVE-2023-3773: (unk) xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
+  CVE-2023-3777: (unk) netfilter: nf_tables: skip bound chain on rule flush 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
+  CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4147: (unk) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
   CVE-2023-4194: (unk) net: tun_chr_open(): set sk_uid from current_fsuid() 
+  CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4207: (unk) net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free 
+  CVE-2023-4208: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4273: (unk) exfat: check if filename entries exceeds max filename length 
+  CVE-2023-4563: (unk) netfilter: nf_tables: don't skip expired elements during walk 
+  CVE-2023-4569: (unk) netfilter: nf_tables: deactivate catchall elements in next generation 
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/6.4/6.4_CVEs.txt b/data/6.4/6.4_CVEs.txt
index 752b23c..c833b4d 100644
--- a/data/6.4/6.4_CVEs.txt
+++ b/data/6.4/6.4_CVEs.txt
@@ -69,15 +69,10 @@
 CVE-2022-38096: Fix unknown
 CVE-2022-40982: Fixed with 6.4.9
 CVE-2022-41848: Fix unknown
-CVE-2022-44032: Fix unknown
-CVE-2022-44033: Fix unknown
 CVE-2022-44034: Fix unknown
 CVE-2022-4543: Fix unknown
 CVE-2022-45884: Fix unknown
 CVE-2022-45885: Fix unknown
-CVE-2022-45886: Fix unknown
-CVE-2022-45887: Fix unknown
-CVE-2022-45919: Fix unknown
 CVE-2023-1193: Fix unknown
 CVE-2023-1194: Fix unknown
 CVE-2023-1206: Fixed with 6.4.8
@@ -87,12 +82,13 @@
 CVE-2023-20941: Fix unknown
 CVE-2023-21400: Fix unknown
 CVE-2023-23039: Fix unknown
+CVE-2023-25775: Fix not seen in stream
 CVE-2023-26242: Fix unknown
 CVE-2023-2640: Fix unknown
 CVE-2023-2898: Fixed with 6.4.4
 CVE-2023-31081: Fix unknown
 CVE-2023-31082: Fix unknown
-CVE-2023-31083: Fix unknown
+CVE-2023-31083: Fix not seen in stream
 CVE-2023-31085: Fix unknown
 CVE-2023-31248: Fixed with 6.4.4
 CVE-2023-32629: Fix unknown
@@ -105,15 +101,17 @@
 CVE-2023-3610: Fixed with 6.4
 CVE-2023-3611: Fixed with 6.4.5
 CVE-2023-3640: Fix unknown
-CVE-2023-37453: Fix unknown
+CVE-2023-37453: Fix not seen in stream
 CVE-2023-37454: Fix unknown
 CVE-2023-3772: Fixed with 6.4.12
 CVE-2023-3773: Fixed with 6.4.12
 CVE-2023-3776: Fixed with 6.4.5
+CVE-2023-3777: Fixed with 6.4.7
 CVE-2023-38432: Fixed with 6.4
 CVE-2023-3863: Fixed with 6.4.4
 CVE-2023-4004: Fixed with 6.4.7
 CVE-2023-4010: Fix unknown
+CVE-2023-4015: Fixed with 6.4.8
 CVE-2023-40283: Fixed with 6.4.10
 CVE-2023-4128: Fixed with 6.4.10
 CVE-2023-4132: Fixed with 6.4.4
@@ -121,4 +119,12 @@
 CVE-2023-4147: Fixed with 6.4.8
 CVE-2023-4155: Fixed with 6.4.11
 CVE-2023-4194: Fixed with 6.4.10
+CVE-2023-4206: Fixed with 6.4.10
+CVE-2023-4207: Fixed with 6.4.10
+CVE-2023-4208: Fixed with 6.4.10
 CVE-2023-4273: Fixed with 6.4.10
+CVE-2023-4563: Fixed with 6.4.11
+CVE-2023-4569: Fixed with 6.4.12
+CVE-2023-4611: Fixed with 6.4.8
+CVE-2023-4622: Fix not seen in stream
+CVE-2023-4623: Fix not seen in stream
diff --git a/data/6.4/6.4_security.txt b/data/6.4/6.4_security.txt
index 4e5ebb5..f55d1fc 100644
--- a/data/6.4/6.4_security.txt
+++ b/data/6.4/6.4_security.txt
@@ -23,11 +23,14 @@
   CVE-2023-20593: 9b8bb5c4e25678af895dc9dd4a1e82b2f948cacc x86/cpu/amd: Add a Zenbleed fix
 
 CVEs fixed in 6.4.7:
+  CVE-2023-3777: ab87c6b43822a56ae0aadc715364b5f8d4a96037 netfilter: nf_tables: skip bound chain on rule flush
   CVE-2023-4004: 48dbb5d24c667bf26bc2fea8caa7fe51fcc6aa62 netfilter: nft_set_pipapo: fix improper element removal
 
 CVEs fixed in 6.4.8:
   CVE-2023-1206: 1e50c11ed44e28a57c6215a5e7643ae85c6297fa tcp: Reduce chance of collisions in inet6_hashfn().
+  CVE-2023-4015: 027d00132487bcf2a4ee7493bb8de9d6331d48e3 netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
   CVE-2023-4147: 14448359681062bf51d9c67e0264869548b79853 netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
+  CVE-2023-4611: e872d6b6ea4947fb87f0d6ea1ef814019dbed89e mm/mempolicy: Take VMA lock before replacing policy
 
 CVEs fixed in 6.4.9:
   CVE-2022-40982: ff0642207e24f9a7011e8982ab7da1e16db75a38 x86/speculation: Add Gather Data Sampling mitigation
@@ -39,14 +42,19 @@
   CVE-2023-40283: 10426afe65c8bf7b24dd0c7be4dcc65f86fc99f9 Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
   CVE-2023-4128: 4b717802428fa02cbcbb61209f638f65f9cd4710 net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
   CVE-2023-4194: 36161e7d40e7293d7f213e16d881042d15c8a53a net: tun_chr_open(): set sk_uid from current_fsuid()
+  CVE-2023-4206: a836184b670f59e24d3a0f7c07115ec6e6ce6900 net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4207: 7d848d718aeb3b482e177b682dd04e76dd413afb net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
+  CVE-2023-4208: 4b717802428fa02cbcbb61209f638f65f9cd4710 net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
   CVE-2023-4273: e1a73ba43cf883cb37f6331aca5a4c5be6350982 exfat: check if filename entries exceeds max filename length
 
 CVEs fixed in 6.4.11:
   CVE-2023-4155: ab8e9a874574ce511eca21caa5d7ef5426963a54 KVM: SEV: only access GHCB fields once
+  CVE-2023-4563: bd156ce9553dcaf2d6ee2c825d1a5a1718e86524 netfilter: nf_tables: don't skip expired elements during walk
 
 CVEs fixed in 6.4.12:
   CVE-2023-3772: 53df4be4f5221e90dc7aa9ce745a9a21bb7024f4 xfrm: add NULL check in xfrm_update_ae_params
   CVE-2023-3773: a9020514f175ef15bb68eea9345782abfd9afea3 xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
+  CVE-2023-4569: 83ff16e449a675e215125d97a2c4a7f097d291d0 netfilter: nf_tables: deactivate catchall elements in next generation
 
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
@@ -119,30 +127,28 @@
   CVE-2022-3642: (unk)  
   CVE-2022-38096: (unk)  
   CVE-2022-41848: (unk)  
-  CVE-2022-44032: (unk)  
-  CVE-2022-44033: (unk)  
   CVE-2022-44034: (unk)  
   CVE-2022-4543: (unk)  
   CVE-2022-45884: (unk)  
   CVE-2022-45885: (unk)  
-  CVE-2022-45886: (unk)  
-  CVE-2022-45887: (unk)  
-  CVE-2022-45919: (unk)  
   CVE-2023-1193: (unk)  
   CVE-2023-1194: (unk)  
   CVE-2023-20941: (unk)  
   CVE-2023-21400: (unk)  
   CVE-2023-23039: (unk)  
+  CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration 
   CVE-2023-26242: (unk)  
   CVE-2023-2640: (unk)  
   CVE-2023-31081: (unk)  
   CVE-2023-31082: (unk)  
-  CVE-2023-31083: (unk)  
+  CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO 
   CVE-2023-31085: (unk)  
   CVE-2023-32629: (unk)  
   CVE-2023-3397: (unk)  
   CVE-2023-35827: (unk)  
   CVE-2023-3640: (unk)  
-  CVE-2023-37453: (unk)  
+  CVE-2023-37453: (unk) USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() 
   CVE-2023-37454: (unk)  
   CVE-2023-4010: (unk)  
+  CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
+  CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
diff --git a/data/CVEs.txt b/data/CVEs.txt
index 85424ac..5ff2ee1 100644
--- a/data/CVEs.txt
+++ b/data/CVEs.txt
@@ -2254,17 +2254,17 @@
 CVE-2022-4379: ce0887ac96d35c7105090e166bb0807dc0a0e838 - 75333d48f92256a0dec91dbf07835e804fc411c0 (v5.6-rc1 to v6.2-rc1)
 CVE-2022-4382: e5d82a7360d124ae1a38c2a5eac92ba49b125191 - d18dcfe9860e842f394e37ba01ca9440ab2178f4 (v5.3-rc1 to v6.2-rc5)
 CVE-2022-43945: 5191955d6fc65e6d4efe8f4f10a6028298f57281 - 00b4492686e0497fdb924a9d4c8f6f99377e176c (v5.11-rc1 to v6.1-rc1)
-CVE-2022-44032: (n/a) - (n/a) (unk to unk)
-CVE-2022-44033: (n/a) - (n/a) (unk to unk)
+CVE-2022-44032: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9b12f050c76f090cc6d0aebe0ef76fed79ec3f15 (v2.6.12-rc2 to v6.4-rc1)
+CVE-2022-44033: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9b12f050c76f090cc6d0aebe0ef76fed79ec3f15 (v2.6.12-rc2 to v6.4-rc1)
 CVE-2022-44034: f2ed287bcc9073d8edbf6561c389b282163edc78 - (n/a) (v4.10-rc1 to unk)
 CVE-2022-4543: (n/a) - (n/a) (unk to unk)
 CVE-2022-45869: a2855afc7ee88475e8feb16840b23f787bfc994d - 47b0c2e4c220f2251fd8dcfbb44479819c715e15 (v5.12-rc1-dontuse to v6.1-rc7)
 CVE-2022-45884: b61901024776b25ce7b8edc31bb1757c7382a88e - (n/a) (v2.6.21-rc2 to unk)
 CVE-2022-45885: (n/a) - (n/a) (unk to unk)
-CVE-2022-45886: (n/a) - (n/a) (unk to unk)
-CVE-2022-45887: (n/a) - (n/a) (unk to unk)
+CVE-2022-45886: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4172385b0c9ac366dcab78eda48c26814b87ed1a (v2.6.12-rc2 to v6.4-rc3)
+CVE-2022-45887: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 517a281338322ff8293f988771c98aaa7205e457 (v2.6.12-rc2 to v6.4-rc3)
 CVE-2022-45888: a53d1202aef122894b6e46116a92174a9123db5d - 282a4b71816b6076029017a7bab3a9dcee12a920 (v5.14-rc1 to v6.2-rc1)
-CVE-2022-45919: (n/a) - (n/a) (unk to unk)
+CVE-2022-45919: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 280a8ab81733da8bc442253c700a52c4c0886ffd (v2.6.12-rc2 to v6.4-rc3)
 CVE-2022-45934: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - bcd70260ef56e0aee8a4fc6cd214a419900b0765 (v2.6.12-rc2 to v6.1)
 CVE-2022-4662: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9c6d778800b921bde3bff3cff5003d1650f942d1 (v2.6.12-rc2 to v6.0-rc4)
 CVE-2022-4696: 0f203765880c4416675726be558b65da4a7604e2 - 44526bedc2ff8fcd58552e3c5bae928524b6f13c (v5.10-rc1 to v5.12-rc1-dontuse)
@@ -2347,7 +2347,7 @@
 CVE-2023-2007: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b04e75a4a8a81887386a0d2dbf605a48e779d2a0 (v2.6.12-rc2 to v6.0-rc1)
 CVE-2023-2008: 7b26e4e2119d0c5ede1282b22ce2af22835ff4b5 - 05b252cccb2e5c3f56119d25de684b4f810ba40a (v4.20-rc1 to v5.19-rc4)
 CVE-2023-2019: 0ae3eb7b4611207e140e9772398b9f88b72d6839 - 180a6a3ee60a7cb69ed1232388460644f6a21f00 (v5.12-rc1-dontuse to v6.0-rc1)
-CVE-2023-20569: (n/a) - 0e52740ffd10c6c316837c6c128f460f1aaba1ea (unk to v6.5-rc6)
+CVE-2023-20569: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 0e52740ffd10c6c316837c6c128f460f1aaba1ea (v2.6.12-rc2 to v6.5-rc6)
 CVE-2023-20588: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 77245f1c3c6495521f6a3af082696ee2f8ce3921 (v2.6.12-rc2 to v6.5-rc6)
 CVE-2023-20593: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 522b1d69219d8f083173819fde04f994aa051a98 (v2.6.12-rc2 to v6.5-rc4)
 CVE-2023-20928: dd2283f2605e3b3e9c61bcae844b34f2afa4813f - a43cfc87caaf46710c8027a8c23b8a55f1078f19 (v4.20-rc1 to v6.0-rc1)
@@ -2392,6 +2392,7 @@
 CVE-2023-2483: b9b17debc69d27cd55e21ee51a5ba7fc50a426cf - 6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 (v4.9-rc1 to v6.3-rc4)
 CVE-2023-25012: 4eb1b01de5b9d8596d6c103efcf1a15cfc1bedf7 - 76ca8da989c7d97a7f76c75d475fe95a584439d7 (v5.6-rc4 to v6.3-rc1)
 CVE-2023-2513: ac27a0ec112a089f1a5102bc8dffc79c8c815571 - 67d7d8ad99beccd9fe92d585b87f1760dc9018e3 (v2.6.19-rc2 to v6.0-rc1)
+CVE-2023-25775: b48c24c2d710cf34810c555dcef883a3d35a9c08 - bb6d73d9add68ad270888db327514384dfa44958 (v5.14-rc1 to unk)
 CVE-2023-2598: 57bebf807e2abcf87d96b9de1266104ee2d8fc2f - 776617db78c6d208780e7c69d4d68d1fa82913de (v6.3-rc1 to v6.4-rc1)
 CVE-2023-26242: 857a26222ff75eecf7d701ef0e91e4fbf6efa663 - (n/a) (v4.19-rc1 to unk)
 CVE-2023-2640: c914c0e27eb0843b7cf3bec71d6f34d53a3a671e - (n/a) (v5.19-rc1 to unk)
@@ -2419,7 +2420,7 @@
 CVE-2023-3108: 1d10eb2f156f5fc83cf6c7ce60441592e66eadb3 - 9399f0c51489ae8c16d6559b82a452fdc1895e91 (CVE Caused by Backporting)
 CVE-2023-31081: (n/a) - (n/a) (unk to unk)
 CVE-2023-31082: (n/a) - (n/a) (unk to unk)
-CVE-2023-31083: (n/a) - (n/a) (unk to unk)
+CVE-2023-31083: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9c33663af9ad115f90c076a1828129a3fbadea98 (v2.6.12-rc2 to unk)
 CVE-2023-31084: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b8c75e4a1b325ea0a9433fa8834be97b5836b946 (v2.6.12-rc2 to v6.4-rc3)
 CVE-2023-31085: (n/a) - (n/a) (unk to unk)
 CVE-2023-3111: 5d4f98a28c7d334091c1b7744f48a1acdd2a4ae0 - 85f02d6c856b9f3a0acf5219de6e32f58b9778eb (v2.6.31-rc1 to v6.0-rc2)
@@ -2476,11 +2477,12 @@
 CVE-2023-3610: d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87 - 4bedf9eee016286c835e3d8fa981ddece5338795 (v5.9-rc1 to v6.4)
 CVE-2023-3611: 462dbc9101acd38e92eda93c0726857517a24bbd - 3e337087c3b5805fe0b8a46ba622a962880b5d64 (v3.8-rc1 to v6.5-rc2)
 CVE-2023-3640: (n/a) - (n/a) (unk to unk)
-CVE-2023-37453: (n/a) - (n/a) (unk to unk)
+CVE-2023-37453: 45bf39f8df7f05efb83b302c65ae3b9bc92b7065 - ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b (v6.3-rc1 to unk)
 CVE-2023-37454: (n/a) - (n/a) (unk to unk)
-CVE-2023-3772: (n/a) - 00374d9b6d9f932802b55181be9831aa948e5b7c (unk to v6.5-rc7)
-CVE-2023-3773: (n/a) - 5e2424708da7207087934c5c75211e8584d553a0 (unk to v6.5-rc7)
+CVE-2023-3772: d8647b79c3b7e223ac051439d165bc8e7bbb832f - 00374d9b6d9f932802b55181be9831aa948e5b7c (v2.6.39-rc1 to v6.5-rc7)
+CVE-2023-3773: 4e484b3e969b52effd95c17f7a86f39208b2ccf4 - 5e2424708da7207087934c5c75211e8584d553a0 (v5.17-rc1 to v6.5-rc7)
 CVE-2023-3776: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 0323bce598eea038714f941ce2b22541c46d488f (v2.6.12-rc2 to v6.5-rc2)
+CVE-2023-3777: d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87 - 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 (v5.9-rc1 to v6.5-rc3)
 CVE-2023-3812: 90e33d45940793def6f773b2d528e9f3c84ffdc7 - 363a5328f4b0517e59572118ccfb7c626d81dca9 (v4.15-rc1 to v6.1-rc4)
 CVE-2023-38409: d443d93864726ad68c0a741d1e7b03934a9af143 - fffb0b52d5258554c645c966c6cbef7de50b851d (v5.19-rc1 to v6.3-rc7)
 CVE-2023-38426: 0626e6641f6b467447c81dd7678a69c66f7746cf - 02f76c401d17e409ed45bf7887148fcc22c93c85 (v5.15-rc1 to v6.4-rc3)
@@ -2493,6 +2495,7 @@
 CVE-2023-3863: 52feb444a90304eb13c03115bb9758101dbb9254 - 6709d4b7bc2e079241fdef15d1160581c5261c10 (v3.8-rc1 to v6.5-rc1)
 CVE-2023-4004: 3c4287f62044a90e73a561aa05fc46e62da173da - 87b5a5c209405cb6b57424cdfa226a6dbd349232 (v5.6-rc1 to v6.5-rc3)
 CVE-2023-4010: (n/a) - (n/a) (unk to unk)
+CVE-2023-4015: d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87 - 0a771f7b266b02d262900c75f1e175c7fe76fec2 (v5.9-rc1 to v6.5-rc4)
 CVE-2023-40283: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 1728137b33c00d5a2b5110ed7aafb42e7c32e4a1 (v2.6.12-rc2 to v6.5-rc1)
 CVE-2023-4128: de5df63228fcfbd5bb7fd883774c18fec9e61f12 - 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 (v3.18-rc1 to v6.5-rc5)
 CVE-2023-4132: dd47fbd40e6ea6884e295e13a2e50b0894258fdf - 6f489a966fbeb0da63d45c2c66a8957eab604bf6 (v4.6-rc1 to v6.5-rc1)
@@ -2501,9 +2504,17 @@
 CVE-2023-4147: d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87 - 0ebc1064e4874d5987722a2ddbc18f94aa53b211 (v5.9-rc1 to v6.5-rc4)
 CVE-2023-4155: 291bd20d5d88814a73d43b55b9428feab2f28094 - 7588dbcebcbf0193ab5b76987396d0254270b04a (v5.11-rc1 to v6.5-rc6)
 CVE-2023-4194: a096ccca6e503a5c575717ff8a36ace27510ab0a - 9bc3047374d5bec163e83e743709e23753376f0c (v6.3-rc1 to v6.5-rc5)
+CVE-2023-4206: 1109c00547fc66df45b9ff923544be4c1e1bec13 - b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 (v3.18-rc1 to v6.5-rc5)
+CVE-2023-4207: e35a8ee5993ba81fd6c092f6827458c60406255b - 76e42ae831991c828cffa8c37736ebfb831ad5ec (v3.18-rc1 to v6.5-rc5)
+CVE-2023-4208: de5df63228fcfbd5bb7fd883774c18fec9e61f12 - 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 (v3.18-rc1 to v6.5-rc5)
 CVE-2023-4273: ca06197382bde0a3bc20215595d1c9ce20c6e341 - d42334578eba1390859012ebb91e1e556d51db49 (v5.7-rc1 to v6.5-rc5)
 CVE-2023-4385: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 0d4837fdb796f99369cf7691d33de1b856bcaf1f (v2.6.12-rc2 to v5.19-rc1)
 CVE-2023-4387: 5738a09d58d5ad2871f1f9a42bf6a3aa9ece5b3c - 9e7fef9521e73ca8afd7da9e58c14654b02dfad8 (v4.4-rc4 to v5.18)
 CVE-2023-4389: bc44d7c4b2b179c4b74fba208b9908e2ecbc1b4d - 168a2f776b9762f4021421008512dd7ab7474df1 (v5.7-rc1 to v5.18-rc3)
 CVE-2023-4394: faa775c41d655a4786e9d53cb075a77bb5a75f66 - 9ea0106a7a3d8116860712e3f17cd52ce99f6707 (v5.16-rc1 to v6.0-rc3)
 CVE-2023-4459: d1a890fa37f27d6aca3abc6e25e4148efc3223a6 - edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd (v2.6.32-rc5 to v5.18)
+CVE-2023-4563: 3c4287f62044a90e73a561aa05fc46e62da173da - 24138933b97b055d486e8064b4a1721702442a9b (v5.6-rc1 to v6.5-rc6)
+CVE-2023-4569: aaa31047a6d25da0fa101da1ed544e1247949b40 - 90e5b3462efa37b8bba82d7c4e63683856e188af (v5.13-rc1 to v6.5-rc7)
+CVE-2023-4611: 5e31275cc997f8ec5d9e8d65fe9840ebed89db19 - 6c21e066f9256ea1df6f88768f6ae1080b7cf509 (v6.4-rc1 to v6.5-rc4)
+CVE-2023-4622: 869e7c62486ec0e170a9771acaa251d1a33b5871 - 57d44a354a43edba4ef9963327d4657d12edbfbc (v4.2-rc1 to v6.5-rc1)
+CVE-2023-4623: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b3d26c5702c7d6c45456326e56d2ccf3f103e60f (v2.6.12-rc2 to unk)
diff --git a/data/cmts.json b/data/cmts.json
index 5f90e2f..6303dc5 100644
--- a/data/cmts.json
+++ b/data/cmts.json
@@ -131,6 +131,7 @@
     "0a515a06c5ebfa46fee3ac519e418f801e718da4": "v5.16-rc6", 
     "0a54917c3fc295cb61f3fb52373c173fd3b69f48": "v2.6.37-rc6", 
     "0a6e77784f490912d81b92cfd48424541c04691e": "v4.19-rc1", 
+    "0a771f7b266b02d262900c75f1e175c7fe76fec2": "v6.5-rc4", 
     "0a944e8a6c66ca04c7afbaa17e22bf208a8b37f0": "v5.2-rc2", 
     "0a9ab9bdb3e891762553f667066190c1d22ad62b": "v3.8-rc6", 
     "0a9cd0a80ac559357c6a90d26c55270ed752aa26": "v3.12-rc2", 
@@ -504,6 +505,7 @@
     "23fcb3340d033d9f081e21e6c12c2db7eaa541d3": "v4.18-rc3", 
     "2400617da7eebf9167d71a46122828bc479d64c9": "v5.19-rc6", 
     "2406a307ac7ddfd7effeeaff6947149ec6a95b4e": "v5.6-rc1", 
+    "24138933b97b055d486e8064b4a1721702442a9b": "v6.5-rc6", 
     "241699cd72a8489c9446ae3910ddd243e9b9061b": "v4.9-rc1", 
     "2423496af35d94a87156b063ea5cedffc10a70a1": "v4.12-rc2", 
     "2433c8f094a008895e66f25bd1773cdb01c91d01": "v3.12-rc4", 
@@ -551,6 +553,7 @@
     "2777e654371dd4207a3a7f4fb5fa39550053a080": "v5.2-rc1", 
     "27ae357fa82be5ab73b2ef8d39dcb8ca2563483a": "v4.17-rc5", 
     "27d461333459d282ffa4a2bdb6b215a59d493a8f": "v5.5-rc1", 
+    "280a8ab81733da8bc442253c700a52c4c0886ffd": "v6.4-rc3", 
     "2811ebac2521ceac84f2bdae402455baa6a7fb47": "v3.12-rc4", 
     "282a4b71816b6076029017a7bab3a9dcee12a920": "v6.2-rc1", 
     "282f23c6ee343126156dd41218b22ece96d747e3": "v3.6-rc1", 
@@ -905,6 +908,7 @@
     "414ee50b3a111983056b1a828fac08f9e8fbc7e9": "v3.2-rc1", 
     "415e3d3e90ce9e18727e8843ae343eda5a58fad6": "v4.5-rc4", 
     "41672c0c24a62699d20aab53b98d843b16483053": "v5.2-rc1", 
+    "4172385b0c9ac366dcab78eda48c26814b87ed1a": "v6.4-rc3", 
     "4180bf1b655a791a0a6ef93a2ffffc762722c782": "v4.19-rc1", 
     "41bdc78544b8a93a9c6814b8bbbfef966272abbe": "v3.19-rc1", 
     "41df7f6d43723deb7364340b44bc5d94bf717456": "v3.12-rc2", 
@@ -961,6 +965,7 @@
     "457f44363a8894135c85b7a9afd2bd8196db24ab": "v5.8-rc1", 
     "458e279f861d3f61796894cd158b780765a1569f": "v6.2-rc6", 
     "45af1d7aae7d5520d2858f8517a1342646f015db": "v6.2-rc1", 
+    "45bf39f8df7f05efb83b302c65ae3b9bc92b7065": "v6.3-rc1", 
     "45c1380358b12bf2d1db20a5874e9544f56b34ab": "v5.4-rc7", 
     "45e093ae2830cd1264677d47ff9a95a71f5d9f9c": "v4.7-rc1", 
     "45f05def5c44c806f094709f1c9b03dcecdd54f0": "v4.19-rc1", 
@@ -1079,6 +1084,7 @@
     "4e19d6b65fb4fc42e352ce9883649e049da14743": "v5.3-rc1", 
     "4e2024624e678f0ebb916e6192bd23c1f9fdf696": "v3.19-rc3", 
     "4e3c51f4e805291b057d12f5dda5aeb50a538dc4": "v6.1-rc7", 
+    "4e484b3e969b52effd95c17f7a86f39208b2ccf4": "v5.17-rc1", 
     "4e6c3df4d729f85997cbf276bfa8ffd8579b8e77": "v4.8-rc1", 
     "4e78921ba4dd0aca1cc89168f45039add4183f8e": "v5.2-rc3", 
     "4e7a5dcd1bbab6560fbc8ada29a840e7a20ed7bc": "v2.6.34-rc2", 
@@ -1131,6 +1137,7 @@
     "5146f95df782b0ac61abde36567e718692725c89": "v4.20", 
     "514c7dca85a0bf40be984dab0b477403a6db901f": "v4.19-rc1", 
     "515ad530795c118f012539ed76d02bacfd426d89": "v6.5-rc2", 
+    "517a281338322ff8293f988771c98aaa7205e457": "v6.4-rc3", 
     "5191955d6fc65e6d4efe8f4f10a6028298f57281": "v5.11-rc1", 
     "51aa68e7d57e3217192d88ce90fd5b8ef29ec94f": "v4.14-rc1", 
     "51ac8893a7a51b196501164e645583bf78138699": "v3.8-rc7", 
@@ -1214,6 +1221,7 @@
     "57be09c6e8747bf48704136d9e3f92bfb93f5725": "v5.4-rc2", 
     "57be1f3f3ec1ccab6432615ca161c4c9ece2a2aa": "v3.16-rc1", 
     "57bebf807e2abcf87d96b9de1266104ee2d8fc2f": "v6.3-rc1", 
+    "57d44a354a43edba4ef9963327d4657d12edbfbc": "v6.5-rc1", 
     "57e68e9cd65b4b8eb4045a1e0d0746458502554c": "v3.15-rc1", 
     "57ebd808a97d7c5b1e1afb937c2db22beba3c1f8": "v4.16-rc3", 
     "580077855a40741cf511766129702d97ff02f4d9": "v6.0-rc1", 
@@ -1290,6 +1298,7 @@
     "5de5b6ecf97a021f29403aa272cb4e03318ef586": "v5.9-rc1", 
     "5e2424708da7207087934c5c75211e8584d553a0": "v6.5-rc7", 
     "5e2f30b756a37bd80c5b0471d0e10d769ab2eb9a": "v4.14-rc1", 
+    "5e31275cc997f8ec5d9e8d65fe9840ebed89db19": "v6.4-rc1", 
     "5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920": "v2.6.27-rc1", 
     "5e3cc1ee1405a7eb3487ed24f786dec01b4cbe1f": "v5.1-rc1", 
     "5e6e3a92b9a4c9416b17f468fa5c7fa2233b8b4e": "v3.0-rc1", 
@@ -1478,6 +1487,7 @@
     "6bc235a2e24a5ef677daee3fd4f74f6cd643e23c": "v2.6.37-rc1", 
     "6bf92d70e690b7ff12b24f4bfff5e5434d019b82": "v5.18-rc2", 
     "6bf9e4bd6a277840d3fe8c5d5d530a1fbd3db592": "v5.2-rc1", 
+    "6c21e066f9256ea1df6f88768f6ae1080b7cf509": "v6.5-rc4", 
     "6c342ce2239c182c2428ce5a44cb32330434ae6e": "v5.17-rc5", 
     "6c389fc931bcda88940c809f752ada6d7799482c": "v4.8-rc5", 
     "6c3b047fa2d2286d5e438bcb470c7b1a49f415f6": "v4.15-rc1", 
@@ -1519,6 +1529,7 @@
     "6e8ab72a812396996035a37e5ca4b3b99b5d214b": "v4.18-rc4", 
     "6e977eaa8280e957b87904b536661550f2a6b3e8": "v5.18-rc1", 
     "6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91": "v4.15-rc2", 
+    "6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8": "v6.5-rc3", 
     "6ec82562ffc6f297d0de36d65776cff8e5704867": "v2.6.34", 
     "6ee50c8e262a0f0693dad264c3c99e30e6442a56": "v5.10-rc7", 
     "6f092343855a71e03b8d209815d8c45bf3a27fcd": "v3.13-rc1", 
@@ -1617,6 +1628,7 @@
     "76ca8da989c7d97a7f76c75d475fe95a584439d7": "v6.3-rc1", 
     "76cc404bfdc0d419c720de4daaf2584542734f42": "v4.4-rc8", 
     "76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2": "v4.19-rc1", 
+    "76e42ae831991c828cffa8c37736ebfb831ad5ec": "v6.5-rc5", 
     "76f9a820c8672ada12ffa0903652c9e6f2429462": "v2.6.34-rc1", 
     "7705dc8557973d8ad8f10840f61d8ec805695e9e": "v5.5-rc1", 
     "77131dfec6af114efd32610b4a6bbecd934e37d5": "v5.7-rc1", 
@@ -1837,6 +1849,7 @@
     "86741ec25462": "v4.10-rc1", 
     "86741ec25462e4c8cdce6df2f41ead05568c7d5e": "v4.10-rc1", 
     "869e76f7a918f010bd4518d58886969b1f642a04": "v5.15-rc1", 
+    "869e7c62486ec0e170a9771acaa251d1a33b5871": "v4.2-rc1", 
     "869f37d8e48f3911eb70f38a994feaa8f8380008": "v2.6.20-rc1", 
     "86acdca1b63e6890540fa19495cfc708beff3d8b": "v2.6.33-rc5", 
     "86cdf8e38792545161dbe3350a7eced558ba4d15": "v5.16-rc2", 
@@ -1946,6 +1959,7 @@
     "90cbed5247439a966b645b34eb0a2e037836ea8e": "v6.4-rc2", 
     "90db10434b163e46da413d34db8d0e77404cc645": "v4.11-rc5", 
     "90e33d45940793def6f773b2d528e9f3c84ffdc7": "v4.15-rc1", 
+    "90e5b3462efa37b8bba82d7c4e63683856e188af": "v6.5-rc7", 
     "90ed52ebe48181d3c5427b3bd1d24f659e7575ad": "v2.6.21-rc6", 
     "90f62cf30a78721641e08737bda787552428061e": "v3.15-rc5", 
     "91087dfa51a29b3c190e99339c4c32eb13646c51": "v2.6.24-rc1", 
@@ -2081,6 +2095,7 @@
     "9b00f1b78809309163dda2d044d9e94a3c0248a3": "v5.12-rc1-dontuse", 
     "9b02f419a7dbd956b2c293e5cb1790b6b687f367": "v2.6.30-rc1", 
     "9b0d4446b56904b59ae3809913b0ac760fa941a6": "v4.14-rc1", 
+    "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15": "v6.4-rc1", 
     "9b174d88c257150562b0101fcc6cb6c3cb74275c": "v4.0-rc1", 
     "9b1f2982360579cbdb3069fa026f6cfc31c4388b": "v5.3-rc1", 
     "9b3e617f3df53822345a8573b6d358f6b9e5ed87": "v3.9-rc7", 
@@ -2293,6 +2308,7 @@
     "aa93d1fee85c890a34f2510a310e55ee76a27848": "v4.7", 
     "aa9c2669626ca7e5e5bab28e6caeb583fd40099b": "v3.11-rc1", 
     "aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd": "v5.7-rc1", 
+    "aaa31047a6d25da0fa101da1ed544e1247949b40": "v5.13-rc1", 
     "aac453635549699c13a84ea1456d5b0e574ef855": "v4.6-rc1", 
     "aacff892cbd5c6b1904a3906219548a65018d750": "v3.8-rc1", 
     "ab33d5071de7a33616842882c11b5eb52a6c26a1": "v2.6.17-rc1", 
@@ -2424,6 +2440,7 @@
     "b46a0bf78ad7b150ef5910da83859f7f5a514ffd": "v5.0-rc5", 
     "b46acd6a6a627d876898e1c84d3f84902264b445": "v5.15-rc1", 
     "b4789b8e6be3151a955ade74872822f30e8cd914": "v3.13-rc1", 
+    "b48c24c2d710cf34810c555dcef883a3d35a9c08": "v5.14-rc1", 
     "b49a0e69a7b1a68c8d3f64097d06dabb770fec96": "v5.15-rc1", 
     "b4a1b4f5047e4f54e194681125c74c0aa64d637d": "v4.4-rc8", 
     "b4b10061ef98c583bcf82a4200703fbaa98c18dc": "v5.8-rc1", 
@@ -2463,6 +2480,7 @@
     "b7c81f80246fac44077166f3e07103affe6db8ff": "v5.18-rc6", 
     "b7cc176c9eb3aa6989ac099efd8bdd6d0eaa784a": "v2.6.24-rc1", 
     "b805d78d300bcf2c83d6df7da0c818b0fee41427": "v5.1", 
+    "b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8": "v6.5-rc5", 
     "b844f0ecbc5626ec26cfc70cb144a4c9b85dc3f2": "v4.6-rc1", 
     "b854b4ee66437e6e1622fda90529c814978cb4ca": "v6.1-rc1", 
     "b858c331cdf402853be2c48c8f4f77173ef04da8": "v3.9-rc1", 
@@ -3026,6 +3044,7 @@
     "e3219ce6a775468368fb270fae3eb82a6787b436": "v4.6-rc1", 
     "e34438c903b653daca2b2a7de95aed46226f8ed3": "v4.19-rc1", 
     "e34ecee2ae791df674dfb466ce40692ca6218e43": "v3.13-rc1", 
+    "e35a8ee5993ba81fd6c092f6827458c60406255b": "v3.18-rc1", 
     "e362359ace6f87c201531872486ff295df306d13": "v6.0-rc1", 
     "e368fdb61d8e7c67ac70791b23345b26d7bbc661": "v4.20-rc1", 
     "e37e43a497d5a8b7c0cc1736d56986f432c394c9": "v4.9-rc1", 
diff --git a/data/kernel_cves.json b/data/kernel_cves.json
index 07a4d78..72d1c25 100644
--- a/data/kernel_cves.json
+++ b/data/kernel_cves.json
@@ -58127,8 +58127,20 @@
     "CVE-2020-27418": {
         "affected_versions": "unk to unk",
         "breaks": "",
+        "cvss3": {
+            "Attack Complexity": "Low",
+            "Attack Vector": "Network",
+            "Availability": "None",
+            "Confidentiality": "High",
+            "Integrity": "None",
+            "Privileges Required": "None",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+            "score": 7.5
+        },
         "fixes": "",
-        "last_modified": "2023-08-25",
+        "last_modified": "2023-09-10",
         "nvd_text": "A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-27418",
@@ -78745,8 +78757,9 @@
         }
     },
     "CVE-2022-44032": {
-        "affected_versions": "unk to unk",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to v6.4-rc1",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
+        "cmt_msg": "char: pcmcia: remove all the drivers",
         "cvss3": {
             "Attack Complexity": "High",
             "Attack Vector": "Physical",
@@ -78760,8 +78773,8 @@
             "score": 6.4
         },
         "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
-        "fixes": "",
-        "last_modified": "2023-01-02",
+        "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15",
+        "last_modified": "2023-09-10",
         "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44032",
@@ -78773,8 +78786,9 @@
         }
     },
     "CVE-2022-44033": {
-        "affected_versions": "unk to unk",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to v6.4-rc1",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
+        "cmt_msg": "char: pcmcia: remove all the drivers",
         "cvss3": {
             "Attack Complexity": "High",
             "Attack Vector": "Physical",
@@ -78788,8 +78802,8 @@
             "score": 6.4
         },
         "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
-        "fixes": "",
-        "last_modified": "2023-01-02",
+        "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15",
+        "last_modified": "2023-09-10",
         "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44033",
@@ -78943,8 +78957,9 @@
         }
     },
     "CVE-2022-45886": {
-        "affected_versions": "unk to unk",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to v6.4-rc3",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
+        "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net",
         "cvss3": {
             "Attack Complexity": "High",
             "Attack Vector": "Local",
@@ -78958,8 +78973,9 @@
             "score": 7.0
         },
         "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
-        "fixes": "",
-        "last_modified": "2023-01-02",
+        "fixes": "4172385b0c9ac366dcab78eda48c26814b87ed1a",
+        "last_affected_version": "6.3.6",
+        "last_modified": "2023-09-10",
         "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45886",
@@ -78971,8 +78987,9 @@
         }
     },
     "CVE-2022-45887": {
-        "affected_versions": "unk to unk",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to v6.4-rc3",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
+        "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()",
         "cvss3": {
             "Attack Complexity": "High",
             "Attack Vector": "Local",
@@ -78986,8 +79003,9 @@
             "score": 4.7
         },
         "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
-        "fixes": "",
-        "last_modified": "2023-01-02",
+        "fixes": "517a281338322ff8293f988771c98aaa7205e457",
+        "last_affected_version": "6.3.6",
+        "last_modified": "2023-09-10",
         "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45887",
@@ -79028,8 +79046,9 @@
         }
     },
     "CVE-2022-45919": {
-        "affected_versions": "unk to unk",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to v6.4-rc3",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
+        "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221",
         "cvss3": {
             "Attack Complexity": "High",
             "Attack Vector": "Local",
@@ -79043,8 +79062,9 @@
             "score": 7.0
         },
         "cwe": "Use After Free",
-        "fixes": "",
-        "last_modified": "2023-01-02",
+        "fixes": "280a8ab81733da8bc442253c700a52c4c0886ffd",
+        "last_affected_version": "6.3.6",
+        "last_modified": "2023-09-10",
         "nvd_text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45919",
@@ -80369,7 +80389,7 @@
         },
         "fixes": "7c4a5b89a0b5a57a64b601775b296abf77a9fe97",
         "last_affected_version": "6.2.2",
-        "last_modified": "2023-04-07",
+        "last_modified": "2023-09-10",
         "nvd_text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1077",
@@ -81382,8 +81402,8 @@
         }
     },
     "CVE-2023-20569": {
-        "affected_versions": "unk to v6.5-rc6",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to v6.5-rc6",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
         "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s",
         "cvss3": {
             "Attack Complexity": "Low",
@@ -81399,7 +81419,7 @@
         },
         "fixes": "0e52740ffd10c6c316837c6c128f460f1aaba1ea",
         "last_affected_version": "6.4.8",
-        "last_modified": "2023-08-25",
+        "last_modified": "2023-09-10",
         "nvd_text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20569",
@@ -82555,7 +82575,8 @@
             "score": 5.5
         },
         "fixes": "e12d7a46f65ae4b7d58a5e0c1cbfa825cf8d830d",
-        "last_modified": "2023-08-11",
+        "last_affected_version": "6.1.49",
+        "last_modified": "2023-09-10",
         "nvd_text": "A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2430",
@@ -82642,6 +82663,35 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2023-2513"
         }
     },
+    "CVE-2023-25775": {
+        "affected_versions": "v5.14-rc1 to unk",
+        "breaks": "b48c24c2d710cf34810c555dcef883a3d35a9c08",
+        "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration",
+        "cvss3": {
+            "Attack Complexity": "Low",
+            "Attack Vector": "Network",
+            "Availability": "High",
+            "Confidentiality": "High",
+            "Integrity": "High",
+            "Privileges Required": "None",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+            "score": 9.8
+        },
+        "cwe": "Unspecified",
+        "fixes": "bb6d73d9add68ad270888db327514384dfa44958",
+        "last_modified": "2023-09-10",
+        "nvd_text": "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-25775",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-25775",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-25775",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-25775",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-25775",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-25775"
+        }
+    },
     "CVE-2023-2598": {
         "affected_versions": "v6.3-rc1 to v6.4-rc1",
         "breaks": "57bebf807e2abcf87d96b9de1266104ee2d8fc2f",
@@ -83413,8 +83463,9 @@
         }
     },
     "CVE-2023-31083": {
-        "affected_versions": "unk to unk",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to unk",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
+        "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO",
         "cvss3": {
             "Attack Complexity": "High",
             "Attack Vector": "Local",
@@ -83427,8 +83478,8 @@
             "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
             "score": 4.7
         },
-        "fixes": "",
-        "last_modified": "2023-05-06",
+        "fixes": "9c33663af9ad115f90c076a1828129a3fbadea98",
+        "last_modified": "2023-09-10",
         "nvd_text": "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31083",
@@ -85017,8 +85068,9 @@
         }
     },
     "CVE-2023-37453": {
-        "affected_versions": "unk to unk",
-        "breaks": "",
+        "affected_versions": "v6.3-rc1 to unk",
+        "breaks": "45bf39f8df7f05efb83b302c65ae3b9bc92b7065",
+        "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()",
         "cvss3": {
             "Attack Complexity": "Low",
             "Attack Vector": "Physical",
@@ -85031,8 +85083,8 @@
             "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
             "score": 4.6
         },
-        "fixes": "",
-        "last_modified": "2023-07-19",
+        "fixes": "ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b",
+        "last_modified": "2023-09-10",
         "nvd_text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-37453",
@@ -85059,8 +85111,8 @@
             "score": 5.5
         },
         "fixes": "",
-        "last_modified": "2023-07-19",
-        "nvd_text": "An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c.",
+        "last_modified": "2023-09-10",
+        "nvd_text": "An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c. NOTE: the suse.com reference has a different perspective about this.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-37454",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-37454",
@@ -85071,8 +85123,8 @@
         }
     },
     "CVE-2023-3772": {
-        "affected_versions": "unk to v6.5-rc7",
-        "breaks": "",
+        "affected_versions": "v2.6.39-rc1 to v6.5-rc7",
+        "breaks": "d8647b79c3b7e223ac051439d165bc8e7bbb832f",
         "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params",
         "cvss3": {
             "Attack Complexity": "Low",
@@ -85088,7 +85140,7 @@
         },
         "fixes": "00374d9b6d9f932802b55181be9831aa948e5b7c",
         "last_affected_version": "6.4.11",
-        "last_modified": "2023-08-25",
+        "last_modified": "2023-09-10",
         "nvd_text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3772",
@@ -85100,8 +85152,8 @@
         }
     },
     "CVE-2023-3773": {
-        "affected_versions": "unk to v6.5-rc7",
-        "breaks": "",
+        "affected_versions": "v5.17-rc1 to v6.5-rc7",
+        "breaks": "4e484b3e969b52effd95c17f7a86f39208b2ccf4",
         "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH",
         "cvss3": {
             "Attack Complexity": "Low",
@@ -85117,7 +85169,7 @@
         },
         "fixes": "5e2424708da7207087934c5c75211e8584d553a0",
         "last_affected_version": "6.4.11",
-        "last_modified": "2023-08-25",
+        "last_modified": "2023-09-10",
         "nvd_text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3773",
@@ -85157,6 +85209,23 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2023-3776"
         }
     },
+    "CVE-2023-3777": {
+        "affected_versions": "v5.9-rc1 to v6.5-rc3",
+        "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87",
+        "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush",
+        "fixes": "6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8",
+        "last_affected_version": "6.4.6",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.\n\n",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3777",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3777",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3777",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3777",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-3777",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-3777"
+        }
+    },
     "CVE-2023-3812": {
         "affected_versions": "v4.15-rc1 to v6.1-rc4",
         "breaks": "90e33d45940793def6f773b2d528e9f3c84ffdc7",
@@ -85504,6 +85573,23 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2023-4010"
         }
     },
+    "CVE-2023-4015": {
+        "affected_versions": "v5.9-rc1 to v6.5-rc4",
+        "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87",
+        "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR",
+        "fixes": "0a771f7b266b02d262900c75f1e175c7fe76fec2",
+        "last_affected_version": "6.4.7",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nOn an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used.\n\nWe recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.\n\n",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4015",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4015",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4015",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4015",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4015",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4015"
+        }
+    },
     "CVE-2023-40283": {
         "affected_versions": "v2.6.12-rc2 to v6.5-rc1",
         "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
@@ -85710,6 +85796,57 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2023-4194"
         }
     },
+    "CVE-2023-4206": {
+        "affected_versions": "v3.18-rc1 to v6.5-rc5",
+        "breaks": "1109c00547fc66df45b9ff923544be4c1e1bec13",
+        "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free",
+        "fixes": "b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
+        "last_affected_version": "6.4.9",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.\n\nWhen route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.\n\n",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4206",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4206",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4206",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4206",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4206",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4206"
+        }
+    },
+    "CVE-2023-4207": {
+        "affected_versions": "v3.18-rc1 to v6.5-rc5",
+        "breaks": "e35a8ee5993ba81fd6c092f6827458c60406255b",
+        "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free",
+        "fixes": "76e42ae831991c828cffa8c37736ebfb831ad5ec",
+        "last_affected_version": "6.4.9",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nWhen fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.\n\n",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4207",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4207",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4207",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4207",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4207",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4207"
+        }
+    },
+    "CVE-2023-4208": {
+        "affected_versions": "v3.18-rc1 to v6.5-rc5",
+        "breaks": "de5df63228fcfbd5bb7fd883774c18fec9e61f12",
+        "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free",
+        "fixes": "3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
+        "last_affected_version": "6.4.9",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nWhen u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.\n\n",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4208",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4208",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4208",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4208",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4208",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4208"
+        }
+    },
     "CVE-2023-4273": {
         "affected_versions": "v5.7-rc1 to v6.5-rc5",
         "breaks": "ca06197382bde0a3bc20215595d1c9ce20c6e341",
@@ -85728,7 +85865,7 @@
         },
         "fixes": "d42334578eba1390859012ebb91e1e556d51db49",
         "last_affected_version": "6.4.9",
-        "last_modified": "2023-08-25",
+        "last_modified": "2023-09-10",
         "nvd_text": "A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4273",
@@ -85883,5 +86020,111 @@
             "SUSE": "https://www.suse.com/security/cve/CVE-2023-4459",
             "Ubuntu": "https://ubuntu.com/security/CVE-2023-4459"
         }
+    },
+    "CVE-2023-4563": {
+        "affected_versions": "v5.6-rc1 to v6.5-rc6",
+        "breaks": "3c4287f62044a90e73a561aa05fc46e62da173da",
+        "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk",
+        "fixes": "24138933b97b055d486e8064b4a1721702442a9b",
+        "last_affected_version": "6.4.10",
+        "last_modified": "2023-09-10",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4563",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4563",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4563",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4563",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4563",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4563"
+        }
+    },
+    "CVE-2023-4569": {
+        "affected_versions": "v5.13-rc1 to v6.5-rc7",
+        "breaks": "aaa31047a6d25da0fa101da1ed544e1247949b40",
+        "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation",
+        "cvss3": {
+            "Attack Complexity": "Low",
+            "Attack Vector": "Local",
+            "Availability": "High",
+            "Confidentiality": "None",
+            "Integrity": "None",
+            "Privileges Required": "Low",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+            "score": 5.5
+        },
+        "fixes": "90e5b3462efa37b8bba82d7c4e63683856e188af",
+        "last_affected_version": "6.4.11",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause a double-deactivations of catchall elements, which results in a memory leak.",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4569",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4569",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4569",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4569",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4569",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4569"
+        }
+    },
+    "CVE-2023-4611": {
+        "affected_versions": "v6.4-rc1 to v6.5-rc4",
+        "breaks": "5e31275cc997f8ec5d9e8d65fe9840ebed89db19",
+        "cmt_msg": "mm/mempolicy: Take VMA lock before replacing policy",
+        "cvss3": {
+            "Attack Complexity": "High",
+            "Attack Vector": "Local",
+            "Availability": "High",
+            "Confidentiality": "High",
+            "Integrity": "None",
+            "Privileges Required": "Low",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
+            "score": 6.3
+        },
+        "fixes": "6c21e066f9256ea1df6f88768f6ae1080b7cf509",
+        "last_affected_version": "6.4.7",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free flaw was found in mm/mempolicy.c in the memory management subsystem in the Linux Kernel. This issue is caused by a race between mbind() and VMA-locked page fault, and may allow a local attacker to crash the system or lead to a kernel information leak.",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4611",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4611",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4611",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4611",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4611",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4611"
+        }
+    },
+    "CVE-2023-4622": {
+        "affected_versions": "v4.2-rc1 to v6.5-rc1",
+        "breaks": "869e7c62486ec0e170a9771acaa251d1a33b5871",
+        "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES",
+        "fixes": "57d44a354a43edba4ef9963327d4657d12edbfbc",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.\n\nThe unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.\n\nWe recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.\n\n",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4622",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4622",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4622",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4622",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4622",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4622"
+        }
+    },
+    "CVE-2023-4623": {
+        "affected_versions": "v2.6.12-rc2 to unk",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
+        "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve",
+        "fixes": "b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
+        "last_modified": "2023-09-10",
+        "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4623",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4623",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4623",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4623",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-4623",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-4623"
+        }
     }
 }
\ No newline at end of file
diff --git a/data/stream_data.json b/data/stream_data.json
index f4fb986..8c01bba 100644
--- a/data/stream_data.json
+++ b/data/stream_data.json
@@ -2069,6 +2069,9 @@
             "CVE-2022-3522": {
                 "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3636": {
                 "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()"
             }, 
@@ -2387,9 +2390,6 @@
             "CVE-2018-12126": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -2838,7 +2838,7 @@
                 "cmt_msg": "xen-blkback: don't leak stack data via response ring"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -3165,7 +3165,7 @@
                 "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -3443,9 +3443,6 @@
             "CVE-2017-9986": {
                 "cmt_msg": "sound: Retire OSS"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -3788,9 +3785,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2015-3332": {
                 "cmt_msg": "tcp: Fix crash in TCP Fast Open"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2015-3339": {
                 "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables"
             }, 
@@ -4086,7 +4092,7 @@
                 "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2017-0786": {
                 "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()"
@@ -4323,10 +4329,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -4428,7 +4434,7 @@
                 "cmt_msg": "inet: switch IP ID generator to siphash"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -5769,7 +5775,7 @@
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -6225,7 +6231,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -6377,6 +6383,9 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -6422,6 +6431,9 @@
             "CVE-2021-4203": {
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -7067,12 +7079,21 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2017-1000379": {
                 "cmt_msg": "mm: larger stack guard gap, between vmas"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -7239,7 +7260,7 @@
                 "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -7475,9 +7496,6 @@
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
@@ -7503,7 +7521,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2017-0786": {
                 "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()"
@@ -7806,7 +7824,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2019-10220": {
                 "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()"
@@ -7826,9 +7844,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -7944,7 +7959,7 @@
                 "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -8988,9 +9003,6 @@
             "CVE-2022-1974": {
                 "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
             }, 
@@ -9310,7 +9322,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -9715,7 +9727,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -9849,6 +9861,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -9900,6 +9915,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -10068,9 +10086,6 @@
             "CVE-2017-9986": {
                 "cmt_msg": "sound: Retire OSS"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -10491,9 +10506,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -10648,7 +10672,7 @@
                 "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -10897,7 +10921,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -11191,7 +11215,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -11305,7 +11329,7 @@
                 "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -12244,9 +12268,6 @@
             "CVE-2022-1974": {
                 "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2017-16526": {
                 "cmt_msg": "uwb: properly check kthread_run return value"
             }, 
@@ -12587,7 +12608,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -13013,7 +13034,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -13162,6 +13183,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -13207,6 +13231,9 @@
             "CVE-2021-4203": {
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -13393,9 +13420,6 @@
             "CVE-2017-9986": {
                 "cmt_msg": "sound: Retire OSS"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -13831,9 +13855,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -13991,7 +14024,7 @@
                 "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -14249,7 +14282,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2017-0786": {
                 "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()"
@@ -14555,7 +14588,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2019-10220": {
                 "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()"
@@ -14681,7 +14714,7 @@
                 "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -15068,7 +15101,7 @@
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2018-3646": {
                 "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled"
@@ -15589,9 +15622,6 @@
             "CVE-2022-1974": {
                 "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
             }, 
@@ -16286,7 +16316,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -16405,6 +16435,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -16450,6 +16483,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -16612,9 +16648,6 @@
             "CVE-2019-2025": {
                 "cmt_msg": "binder: fix race that allows malicious free of live buffer"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -17029,9 +17062,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -17177,7 +17219,7 @@
                 "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -17414,7 +17456,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -17690,7 +17732,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-0590": {
                 "cmt_msg": "net: sched: fix race condition in qdisc_graft()"
@@ -17801,7 +17843,7 @@
                 "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -21646,6 +21688,14 @@
             "CVE-2023-1838": {
                 "cmt_msg": "Fix double fget() in vhost_net_set_backend()", 
                 "cmt_id": "d1bcb0ab20980c6da663708c9a47c322703f9fc3"
+            }, 
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", 
+                "cmt_id": "cf412b0543b77d01f74ae2303d7f8a97e6bff686"
+            }, 
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", 
+                "cmt_id": "66e262ad9b35615b2a1b1cad4751e93e1de90634"
             }
         }, 
         "4.14.318": {
@@ -21667,6 +21717,10 @@
             }
         }, 
         "4.14.322": {
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "226d84d54a9339b7045aff36c8f56d6ee9270476"
+            }, 
             "CVE-2023-3390": {
                 "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", 
                 "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d"
@@ -21691,6 +21745,10 @@
                 "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", 
                 "cmt_id": "a7f178f8439e939efdd12d190783eb0fabf5990d"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079"
+            }, 
             "CVE-2023-35001": {
                 "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", 
                 "cmt_id": "185a79c8be264720b0b89ce2cc42ca2582dbce6f"
@@ -21712,6 +21770,12 @@
                 "cmt_id": "45224862e49e1fde86cbd26c7612f029b4e2e662"
             }
         }, 
+        "4.14.324": {
+            "CVE-2023-3772": {
+                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", 
+                "cmt_id": "ed1cba039309c80b49719fcff3e3d7cdddb73d96"
+            }
+        }, 
         "outstanding": {
             "CVE-2023-20593": {
                 "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix"
@@ -21926,9 +21990,6 @@
             "CVE-2023-20941": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45919": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -21965,11 +22026,11 @@
             "CVE-2017-9986": {
                 "cmt_msg": "sound: Retire OSS"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
-            "CVE-2023-3772": {
-                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
             }, 
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
@@ -22050,7 +22111,7 @@
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -22071,7 +22132,7 @@
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-3344": {
                 "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use"
@@ -22145,9 +22206,6 @@
             "CVE-2020-12364": {
                 "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -22247,11 +22305,8 @@
             "CVE-2019-12381": {
                 "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()"
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
@@ -22326,7 +22381,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -22346,6 +22401,9 @@
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-1280": {
                 "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
             }, 
@@ -23266,9 +23324,6 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1419": {
                 "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
             }, 
@@ -23564,7 +23619,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -23948,7 +24003,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -24052,6 +24107,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -24091,6 +24149,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -24247,9 +24308,6 @@
             "CVE-2019-2025": {
                 "cmt_msg": "binder: fix race that allows malicious free of live buffer"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -24640,9 +24698,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -24791,7 +24858,7 @@
                 "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -25007,7 +25074,7 @@
                 "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -25280,7 +25347,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -25382,7 +25449,7 @@
                 "cmt_msg": "inet: switch IP ID generator to siphash"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -25754,7 +25821,7 @@
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2018-3646": {
                 "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled"
@@ -26272,9 +26339,6 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1419": {
                 "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
             }, 
@@ -26966,7 +27030,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -27082,6 +27146,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -27121,6 +27188,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -27280,9 +27350,6 @@
             "CVE-2019-2025": {
                 "cmt_msg": "binder: fix race that allows malicious free of live buffer"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -27682,9 +27749,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -27833,7 +27909,7 @@
                 "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2020-13143": {
                 "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC"
@@ -28064,7 +28140,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -28337,7 +28413,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -28439,7 +28515,7 @@
                 "cmt_msg": "inet: switch IP ID generator to siphash"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -31793,9 +31869,21 @@
             }
         }, 
         "4.19.285": {
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", 
+                "cmt_id": "3e5af0745a4702ab0df2f880bfe0431eb30f9164"
+            }, 
+            "CVE-2022-45886": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", 
+                "cmt_id": "7bb9c6e05efcecb15b0354d574efbc36ca321d75"
+            }, 
             "CVE-2023-35788": {
                 "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", 
                 "cmt_id": "59a27414bb00e48c4153a8b794fb4e69910a6a1b"
+            }, 
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", 
+                "cmt_id": "8624c7e048fa9ba584b7ba43715090ab1aed765c"
             }
         }, 
         "4.19.286": {
@@ -31823,6 +31911,10 @@
             }
         }, 
         "4.19.291": {
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "ad8f36f96696a7f1d191da66637c415959bab6d8"
+            }, 
             "CVE-2023-3390": {
                 "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", 
                 "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8"
@@ -31847,6 +31939,10 @@
                 "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", 
                 "cmt_id": "8ffaf24a377519e4396f03da5ccda082edae1ac9"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243"
+            }, 
             "CVE-2023-35001": {
                 "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", 
                 "cmt_id": "025fd7efe2639773540a5e425b7bc0dc10b6b023"
@@ -31868,6 +31964,16 @@
                 "cmt_id": "54073c46cbbd2c0c03d6f7d481540cb95cf181a1"
             }
         }, 
+        "4.19.293": {
+            "CVE-2023-1077": {
+                "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", 
+                "cmt_id": "84d90fb72a053c034b018fcc3cfaa6f606faf1c6"
+            }, 
+            "CVE-2023-3772": {
+                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", 
+                "cmt_id": "44f69c96f8a147413c23c68cda4d6fb5e23137cd"
+            }
+        }, 
         "outstanding": {
             "CVE-2021-0929": {
                 "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
@@ -32064,9 +32170,6 @@
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45919": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2007": {
                 "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver"
             }, 
@@ -32091,17 +32194,14 @@
             "CVE-2023-1076": {
                 "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid"
             }, 
-            "CVE-2023-1077": {
-                "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry"
-            }, 
             "CVE-2020-27418": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
-            "CVE-2023-3772": {
-                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
             }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
@@ -32185,7 +32285,7 @@
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -32203,7 +32303,7 @@
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-3303": {
                 "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC"
@@ -32265,9 +32365,6 @@
             "CVE-2020-12364": {
                 "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-45885": {
                 "cmt_msg": ""
             }, 
@@ -32370,12 +32467,6 @@
             "CVE-2019-12381": {
                 "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()"
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
@@ -32443,7 +32534,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -32484,6 +32575,9 @@
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }
@@ -33337,9 +33431,6 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1419": {
                 "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
             }, 
@@ -33629,7 +33720,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -34016,7 +34107,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -34117,6 +34208,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -34156,6 +34250,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -34297,9 +34394,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -34696,9 +34790,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -34838,7 +34941,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -35042,7 +35145,7 @@
                 "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -35312,7 +35415,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -35414,7 +35517,7 @@
                 "cmt_msg": "inet: switch IP ID generator to siphash"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -37112,6 +37215,9 @@
             "CVE-2020-15802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2017-18270": {
                 "cmt_msg": "KEYS: prevent creating a different user's keyrings"
             }, 
@@ -37302,7 +37408,7 @@
                 "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
@@ -37436,9 +37542,6 @@
             "CVE-2018-12126": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2017-9077": {
                 "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent"
             }, 
@@ -37932,7 +38035,7 @@
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -39410,9 +39513,6 @@
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2018-1000028": {
                 "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled"
             }, 
@@ -39435,7 +39535,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2017-0786": {
                 "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()"
@@ -39711,10 +39811,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2019-15807": {
                 "cmt_msg": "scsi: libsas: delete sas port if expander discover failed"
@@ -39840,7 +39940,7 @@
                 "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -41261,7 +41361,7 @@
                 "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
@@ -41404,9 +41504,6 @@
             "CVE-2018-12126": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2017-9077": {
                 "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent"
             }, 
@@ -41945,7 +42042,7 @@
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -42589,6 +42686,9 @@
             "CVE-2014-9730": {
                 "cmt_msg": "udf: Check component length before reading it"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2015-8830": {
                 "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()"
             }, 
@@ -43157,7 +43257,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-38160": {
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
@@ -43570,9 +43670,6 @@
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2018-1000028": {
                 "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled"
             }, 
@@ -43595,7 +43692,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2017-0786": {
                 "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()"
@@ -43907,7 +44004,7 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-23039": {
                 "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()"
@@ -44045,7 +44142,7 @@
                 "cmt_msg": "ext4: add more inode number paranoia checks"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -46887,6 +46984,9 @@
             "CVE-2020-15802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3636": {
                 "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()"
             }, 
@@ -47035,7 +47135,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -47112,9 +47212,6 @@
             "CVE-2018-12126": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -47455,7 +47552,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-2248": {
                 "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
@@ -47710,7 +47807,7 @@
                 "cmt_msg": "f2fs: do more integrity verification for superblock"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -47814,9 +47911,6 @@
             "CVE-2020-0427": {
                 "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2017-9984": {
                 "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops"
             }, 
@@ -48373,7 +48467,7 @@
                 "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2018-12130": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
@@ -48577,10 +48671,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -48720,12 +48814,20 @@
             }
         }, 
         "6.4.7": {
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", 
+                "cmt_id": "ab87c6b43822a56ae0aadc715364b5f8d4a96037"
+            }, 
             "CVE-2023-4004": {
                 "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", 
                 "cmt_id": "48dbb5d24c667bf26bc2fea8caa7fe51fcc6aa62"
             }
         }, 
         "6.4.8": {
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", 
+                "cmt_id": "027d00132487bcf2a4ee7493bb8de9d6331d48e3"
+            }, 
             "CVE-2023-4147": {
                 "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", 
                 "cmt_id": "14448359681062bf51d9c67e0264869548b79853"
@@ -48733,6 +48835,10 @@
             "CVE-2023-1206": {
                 "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", 
                 "cmt_id": "1e50c11ed44e28a57c6215a5e7643ae85c6297fa"
+            }, 
+            "CVE-2023-4611": {
+                "cmt_msg": "mm/mempolicy: Take VMA lock before replacing policy", 
+                "cmt_id": "e872d6b6ea4947fb87f0d6ea1ef814019dbed89e"
             }
         }, 
         "6.4.9": {
@@ -48750,6 +48856,10 @@
             }
         }, 
         "6.4.10": {
+            "CVE-2023-20588": {
+                "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", 
+                "cmt_id": "c9c0b889e2d33d49b06bb716b95a192ed3449173"
+            }, 
             "CVE-2023-4194": {
                 "cmt_msg": "net: tun_chr_open(): set sk_uid from current_fsuid()", 
                 "cmt_id": "36161e7d40e7293d7f213e16d881042d15c8a53a"
@@ -48758,14 +48868,22 @@
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
                 "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "a836184b670f59e24d3a0f7c07115ec6e6ce6900"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "7d848d718aeb3b482e177b682dd04e76dd413afb"
+            }, 
             "CVE-2023-4273": {
                 "cmt_msg": "exfat: check if filename entries exceeds max filename length", 
                 "cmt_id": "e1a73ba43cf883cb37f6331aca5a4c5be6350982"
             }, 
-            "CVE-2023-20588": {
-                "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", 
-                "cmt_id": "c9c0b889e2d33d49b06bb716b95a192ed3449173"
-            }, 
             "CVE-2023-40283": {
                 "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", 
                 "cmt_id": "10426afe65c8bf7b24dd0c7be4dcc65f86fc99f9"
@@ -48775,9 +48893,17 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once", 
                 "cmt_id": "ab8e9a874574ce511eca21caa5d7ef5426963a54"
+            }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", 
+                "cmt_id": "bd156ce9553dcaf2d6ee2c825d1a5a1718e86524"
             }
         }, 
         "6.4.12": {
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", 
+                "cmt_id": "83ff16e449a675e215125d97a2c4a7f097d291d0"
+            }, 
             "CVE-2023-3773": {
                 "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", 
                 "cmt_id": "a9020514f175ef15bb68eea9345782abfd9afea3"
@@ -48842,9 +48968,6 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-37454": {
-                "cmt_msg": ""
-            }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
             }, 
@@ -48863,10 +48986,10 @@
             "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-20941": {
-                "cmt_msg": ""
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
             }, 
-            "CVE-2022-45919": {
+            "CVE-2023-20941": {
                 "cmt_msg": ""
             }, 
             "CVE-2023-21400": {
@@ -48890,6 +49013,12 @@
             "CVE-2020-27418": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
             }, 
@@ -48924,7 +49053,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -48963,7 +49092,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2023-37453": {
-                "cmt_msg": ""
+                "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()"
             }, 
             "CVE-2023-26242": {
                 "cmt_msg": ""
@@ -49016,12 +49145,6 @@
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -49055,10 +49178,7 @@
             "CVE-2022-44034": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-44033": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-44032": {
+            "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-3847": {
@@ -51379,6 +51499,9 @@
             "CVE-2020-15802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2019-3460": {
                 "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt"
             }, 
@@ -51551,7 +51674,7 @@
                 "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
@@ -51664,9 +51787,6 @@
             "CVE-2018-12126": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -52040,7 +52160,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -52504,8 +52624,8 @@
             "CVE-2019-9458": {
                 "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            "CVE-2023-40283": {
+                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb"
             }, 
             "CVE-2019-13272": {
                 "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME"
@@ -52531,9 +52651,6 @@
             "CVE-2008-4609": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-40283": {
-                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb"
-            }, 
             "CVE-2018-19824": {
                 "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c"
             }, 
@@ -53216,7 +53333,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2017-0786": {
                 "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()"
@@ -53456,10 +53573,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2017-16646": {
                 "cmt_msg": "media: dib0700: fix invalid dvb_detach argument"
@@ -53558,7 +53675,7 @@
                 "cmt_msg": "fs: Add a missing permission check to do_umount"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -53865,6 +53982,9 @@
             "CVE-2020-26557": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -53985,11 +54105,14 @@
             "CVE-2023-3863": {
                 "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
             }, 
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
+            }, 
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
@@ -54012,6 +54135,9 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2023-3776": {
                 "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free"
             }, 
@@ -54024,6 +54150,12 @@
             "CVE-2023-3772": {
                 "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
             }, 
@@ -54076,7 +54208,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -54205,10 +54337,13 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
+            }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -54216,8 +54351,8 @@
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
             }, 
             "CVE-2023-34255": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -54256,14 +54391,17 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2023-21264": {
                 "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
             }, 
@@ -54282,9 +54420,15 @@
             "CVE-2023-23039": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-35001": {
                 "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }
@@ -54812,10 +54956,22 @@
             }
         }, 
         "6.1.33": {
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", 
+                "cmt_id": "ea2938c27b0212aaab6702c16b7385e073b35643"
+            }, 
+            "CVE-2022-45886": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", 
+                "cmt_id": "93b5dfebcb1821dde466e29404fcf1fb919f4c72"
+            }, 
             "CVE-2023-35788": {
                 "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", 
                 "cmt_id": "eac615ed3c6d91f1196f16f0a0599fff479cb220"
             }, 
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", 
+                "cmt_id": "d5d61f747e3f1ff9042db66896f2f90afa5f3197"
+            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay", 
                 "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289"
@@ -54924,12 +55080,20 @@
             }
         }, 
         "6.1.42": {
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", 
+                "cmt_id": "e18922ce3e3169eb97838d1dcba2d679bcca446c"
+            }, 
             "CVE-2023-4004": {
                 "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", 
                 "cmt_id": "90c3955beb858bb52a9e5c4380ed0e520e3730d1"
             }
         }, 
         "6.1.43": {
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", 
+                "cmt_id": "4237462a073e24f71c700f3e5929f07b6ee1bcaa"
+            }, 
             "CVE-2023-4147": {
                 "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", 
                 "cmt_id": "268cb07ef3ee17b5454a7c4b23376802c5b00c79"
@@ -54954,18 +55118,30 @@
             }
         }, 
         "6.1.45": {
+            "CVE-2023-20588": {
+                "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", 
+                "cmt_id": "f2615bb47be4f53be92c81a6a8aa286c92ef04d9"
+            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
                 "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "d4d3b53a4c66004e8e864fea744b3a2b86a73b62"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "7f691439b29be0aae68f83ad5eecfddc11007724"
+            }, 
             "CVE-2023-4273": {
                 "cmt_msg": "exfat: check if filename entries exceeds max filename length", 
                 "cmt_id": "c2fdf827f8fc6a571e1b7cc38a61041f0321adf5"
             }, 
-            "CVE-2023-20588": {
-                "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", 
-                "cmt_id": "f2615bb47be4f53be92c81a6a8aa286c92ef04d9"
-            }, 
             "CVE-2023-40283": {
                 "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", 
                 "cmt_id": "29fac18499332211b2615ade356e2bd8b3269f98"
@@ -54978,6 +55154,10 @@
             }
         }, 
         "6.1.47": {
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", 
+                "cmt_id": "00ea7eb1c69eec91cdf9259f0e427c56e7999fcd"
+            }, 
             "CVE-2023-3773": {
                 "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", 
                 "cmt_id": "a442cd17019385c53bbddf3bb92d91474081916b"
@@ -54987,6 +55167,12 @@
                 "cmt_id": "87b655f4936b6fc01f3658aa88a22c923b379ebd"
             }
         }, 
+        "6.1.50": {
+            "CVE-2023-2430": {
+                "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL", 
+                "cmt_id": "22a406b3629a10979916ea7cace47858410117b5"
+            }
+        }, 
         "outstanding": {
             "CVE-2020-26556": {
                 "cmt_msg": ""
@@ -55015,9 +55201,6 @@
             "CVE-2023-23005": {
                 "cmt_msg": "mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init"
             }, 
-            "CVE-2023-2430": {
-                "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
-            }, 
             "CVE-2020-24503": {
                 "cmt_msg": ""
             }, 
@@ -55072,10 +55255,10 @@
             "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-20941": {
-                "cmt_msg": ""
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
             }, 
-            "CVE-2022-45919": {
+            "CVE-2023-20941": {
                 "cmt_msg": ""
             }, 
             "CVE-2023-21400": {
@@ -55099,6 +55282,12 @@
             "CVE-2020-27418": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
             }, 
@@ -55139,7 +55328,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -55183,9 +55372,6 @@
             "CVE-2023-4134": {
                 "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-26242": {
                 "cmt_msg": ""
             }, 
@@ -55237,11 +55423,8 @@
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
             }, 
             "CVE-2022-45888": {
                 "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition"
@@ -55280,10 +55463,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2023-21264": {
                 "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host"
@@ -55665,6 +55848,9 @@
             "CVE-2023-21102": {
                 "cmt_msg": "efi: rt-wrapper: Add missing include"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -55710,6 +55896,9 @@
             "CVE-2023-4273": {
                 "cmt_msg": "exfat: check if filename entries exceeds max filename length"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-38428": {
                 "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
             }, 
@@ -55815,6 +56004,9 @@
             "CVE-2023-1583": {
                 "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-15802": {
                 "cmt_msg": ""
             }, 
@@ -55845,14 +56037,14 @@
             "CVE-2023-3863": {
                 "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
             }, 
-            "CVE-2023-37454": {
-                "cmt_msg": ""
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
             }, 
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-32258": {
                 "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel"
@@ -55905,6 +56097,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
             }, 
@@ -55962,6 +56157,9 @@
             "CVE-2023-2176": {
                 "cmt_msg": "RDMA/core: Refactor rdma_bind_addr"
             }, 
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
+            }, 
             "CVE-2023-33952": {
                 "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon"
             }, 
@@ -55990,7 +56188,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -56076,9 +56274,6 @@
             "CVE-2023-3567": {
                 "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2163": {
                 "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
             }, 
@@ -56208,6 +56403,9 @@
             "CVE-2022-4269": {
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -56221,10 +56419,13 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
+            }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -56317,10 +56518,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2023-21264": {
                 "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host"
@@ -56355,15 +56556,24 @@
             "CVE-2023-38409": {
                 "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-48502": {
                 "cmt_msg": "fs/ntfs3: Check fields while reading"
             }, 
             "CVE-2023-32252": {
                 "cmt_msg": "ksmbd: fix racy issue from session setup and logoff"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-2002": {
                 "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()"
             }, 
+            "CVE-2023-37454": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-3609": {
                 "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow"
             }
@@ -57060,7 +57270,7 @@
                 "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2016-3857": {
                 "cmt_msg": "arm: oabi compat: add missing access checks"
@@ -57729,7 +57939,7 @@
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -58385,6 +58595,9 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -58430,6 +58643,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -59070,7 +59286,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-38160": {
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
@@ -59123,9 +59339,18 @@
             "CVE-2016-1583": {
                 "cmt_msg": "proc: prevent stacking filesystems on top"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2017-1000379": {
                 "cmt_msg": "mm: larger stack guard gap, between vmas"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -59525,9 +59750,6 @@
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
@@ -59541,7 +59763,7 @@
                 "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -59859,7 +60081,7 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-0330": {
                 "cmt_msg": "drm/i915: Flush TLBs before releasing backing store"
@@ -59885,9 +60107,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -59997,7 +60216,7 @@
                 "cmt_msg": "ext4: add more inode number paranoia checks"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -63833,9 +64052,6 @@
             "CVE-2018-12126": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -64068,7 +64284,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-2248": {
                 "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
@@ -64263,10 +64479,10 @@
                 "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2018-10322": {
                 "cmt_msg": "xfs: enhance dinode verifier"
@@ -64295,6 +64511,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26541": {
                 "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries"
             }, 
@@ -64367,9 +64586,6 @@
             "CVE-2017-9986": {
                 "cmt_msg": "sound: Retire OSS"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-3772": {
                 "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
             }, 
@@ -64562,6 +64778,15 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -64694,6 +64919,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -64863,10 +65091,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -64917,7 +65145,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -65520,7 +65748,7 @@
                 "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-8648": {
                 "cmt_msg": "vt: selection, close sel_buffer race"
@@ -66180,7 +66408,7 @@
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -66809,6 +67037,9 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -66857,6 +67088,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -67476,7 +67710,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-38160": {
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
@@ -67526,12 +67760,21 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2017-1000379": {
                 "cmt_msg": "mm: larger stack guard gap, between vmas"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -67937,9 +68180,6 @@
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
@@ -67956,7 +68196,7 @@
                 "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -68271,7 +68511,7 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-0330": {
                 "cmt_msg": "drm/i915: Flush TLBs before releasing backing store"
@@ -68297,9 +68537,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -68412,7 +68649,7 @@
                 "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -69083,7 +69320,7 @@
                 "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-8648": {
                 "cmt_msg": "vt: selection, close sel_buffer race"
@@ -69740,7 +69977,7 @@
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -70378,6 +70615,9 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -70426,6 +70666,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -71045,7 +71288,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-38160": {
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
@@ -71095,12 +71338,21 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2017-1000379": {
                 "cmt_msg": "mm: larger stack guard gap, between vmas"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -71509,9 +71761,6 @@
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
@@ -71525,7 +71774,7 @@
                 "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -71837,7 +72086,7 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-0330": {
                 "cmt_msg": "drm/i915: Flush TLBs before releasing backing store"
@@ -71863,9 +72112,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -71978,7 +72224,7 @@
                 "cmt_msg": "ext4: add more inode number paranoia checks"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -73499,6 +73745,9 @@
             "CVE-2022-3522": {
                 "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2019-3460": {
                 "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt"
             }, 
@@ -73695,7 +73944,7 @@
                 "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
@@ -74298,7 +74547,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -74948,9 +75197,6 @@
             "CVE-2017-9986": {
                 "cmt_msg": "sound: Retire OSS"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -75341,6 +75587,15 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -75678,7 +75933,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -75960,10 +76215,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -75977,9 +76232,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -76080,7 +76332,7 @@
                 "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -76616,7 +76868,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -76678,9 +76930,6 @@
             "CVE-2023-2430": {
                 "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -77009,7 +77258,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2020-36312": {
                 "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()"
@@ -77306,10 +77555,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-10781": {
                 "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\""
@@ -77359,6 +77608,9 @@
             "CVE-2020-15852": {
                 "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -77392,6 +77644,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -77491,9 +77746,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -77774,7 +78026,7 @@
                 "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2020-10708": {
                 "cmt_msg": ""
@@ -77806,9 +78058,18 @@
             "CVE-2020-29374": {
                 "cmt_msg": "gup: document and work around \"COW can break either way\" issue"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -78272,7 +78533,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -78994,7 +79255,7 @@
                 "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
@@ -79063,7 +79324,7 @@
                 "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2016-3857": {
                 "cmt_msg": "arm: oabi compat: add missing access checks"
@@ -79750,7 +80011,7 @@
                 "cmt_msg": "atl2: Disable unimplemented scatter/gather feature"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -80430,6 +80691,9 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -80478,6 +80742,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -81130,7 +81397,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-38160": {
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
@@ -81183,9 +81450,18 @@
             "CVE-2016-1583": {
                 "cmt_msg": "proc: prevent stacking filesystems on top"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2017-1000379": {
                 "cmt_msg": "mm: larger stack guard gap, between vmas"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -81600,9 +81876,6 @@
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
@@ -81946,7 +82219,7 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-0330": {
                 "cmt_msg": "drm/i915: Flush TLBs before releasing backing store"
@@ -81972,9 +82245,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -82090,7 +82360,7 @@
                 "cmt_msg": "ext4: add more inode number paranoia checks"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -82618,7 +82888,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -82674,9 +82944,6 @@
             "CVE-2023-2430": {
                 "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -82984,7 +83251,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2020-36312": {
                 "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()"
@@ -83272,14 +83539,17 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -83319,6 +83589,9 @@
             "CVE-2023-1078": {
                 "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -83352,6 +83625,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -83457,9 +83733,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -83694,6 +83967,9 @@
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -83763,12 +84039,18 @@
             "CVE-2020-27152": {
                 "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -84214,10 +84496,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -84840,7 +85122,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -84896,9 +85178,6 @@
             "CVE-2023-2430": {
                 "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -85194,7 +85473,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
@@ -85467,14 +85746,17 @@
                 "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -85517,6 +85799,9 @@
             "CVE-2023-1078": {
                 "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -85547,6 +85832,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -85637,9 +85925,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -85862,6 +86147,9 @@
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -85931,12 +86219,18 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -86373,10 +86667,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
@@ -86949,7 +87243,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -87005,9 +87299,6 @@
             "CVE-2023-2430": {
                 "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -87083,6 +87374,9 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2021-3573": {
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
@@ -87303,7 +87597,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
@@ -87570,14 +87864,17 @@
                 "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -87650,6 +87947,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -87731,12 +88031,12 @@
             "CVE-2021-3347": {
                 "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -87962,6 +88262,9 @@
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -88022,12 +88325,18 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -88046,6 +88355,9 @@
             "CVE-2022-43750": {
                 "cmt_msg": "usb: mon: make mmapped memory read only"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-0047": {
                 "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF"
             }, 
@@ -88446,10 +88758,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
@@ -92541,6 +92853,9 @@
             "CVE-2019-19449": {
                 "cmt_msg": "f2fs: fix to do sanity check on segment/section count"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26140": {
                 "cmt_msg": ""
             }, 
@@ -92607,6 +92922,9 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
@@ -92643,8 +92961,8 @@
             "CVE-2023-3141": {
                 "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            "CVE-2023-40283": {
+                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb"
             }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
@@ -92688,9 +93006,6 @@
             "CVE-2020-8834": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm"
             }, 
-            "CVE-2023-40283": {
-                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb"
-            }, 
             "CVE-2022-47929": {
                 "cmt_msg": "net: sched: disallow noqueue for qdisc classes"
             }, 
@@ -92740,7 +93055,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2020-0435": {
                 "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize"
@@ -92905,7 +93220,7 @@
                 "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2023-30456": {
                 "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4"
@@ -92941,7 +93256,7 @@
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -92974,7 +93289,7 @@
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-4159": {
                 "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()"
@@ -93072,9 +93387,6 @@
             "CVE-2018-12126": {
                 "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2018-20509": {
                 "cmt_msg": "binder: refactor binder ref inc/dec for thread safety"
             }, 
@@ -93241,7 +93553,7 @@
                 "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
@@ -93316,7 +93628,7 @@
                 "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2018-20449": {
                 "cmt_msg": "printk: hash addresses printed with %p"
@@ -93348,6 +93660,9 @@
             "CVE-2019-19039": {
                 "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
             }, 
@@ -93360,6 +93675,9 @@
             "CVE-2022-20369": {
                 "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-1280": {
                 "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
             }, 
@@ -93387,6 +93705,9 @@
             "CVE-2020-27835": {
                 "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3903": {
                 "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines"
             }, 
@@ -93757,6 +94078,9 @@
             "CVE-2020-15802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2017-18270": {
                 "cmt_msg": "KEYS: prevent creating a different user's keyrings"
             }, 
@@ -94043,7 +94367,7 @@
                 "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-8648": {
                 "cmt_msg": "vt: selection, close sel_buffer race"
@@ -94700,7 +95024,7 @@
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -95156,7 +95480,7 @@
                 "cmt_msg": "Remove DECnet support from kernel"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -95320,6 +95644,9 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -95981,7 +96308,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-38160": {
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
@@ -96031,12 +96358,21 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2017-1000379": {
                 "cmt_msg": "mm: larger stack guard gap, between vmas"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -96445,9 +96781,6 @@
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
@@ -96773,7 +97106,7 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-23039": {
                 "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()"
@@ -96799,9 +97132,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -96920,7 +97250,7 @@
                 "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -98216,7 +98546,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -98642,7 +98972,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -98791,6 +99121,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -98836,6 +99169,9 @@
             "CVE-2021-4203": {
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -99475,9 +99811,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -99638,7 +99983,7 @@
                 "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -99871,9 +100216,6 @@
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-4128": {
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
@@ -99896,7 +100238,7 @@
                 "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2017-0786": {
                 "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()"
@@ -100205,7 +100547,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2019-10220": {
                 "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()"
@@ -100222,9 +100564,6 @@
             "CVE-2019-15505": {
                 "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2513": {
                 "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry"
             }, 
@@ -100337,7 +100676,7 @@
                 "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -101250,9 +101589,6 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1419": {
                 "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
             }, 
@@ -101536,7 +101872,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -101878,7 +102214,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -101967,6 +102303,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -102009,6 +102348,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -102144,9 +102486,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -102531,9 +102870,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -102673,7 +103021,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -102856,7 +103204,7 @@
                 "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -103099,7 +103447,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -103201,7 +103549,7 @@
                 "cmt_msg": "scsi: libsas: delete sas port if expander discover failed"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-14284": {
                 "cmt_msg": "floppy: fix div-by-zero in setup_format_params"
@@ -103820,7 +104168,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -104056,9 +104404,6 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1419": {
                 "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
             }, 
@@ -104333,7 +104678,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -104681,10 +105026,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-10781": {
                 "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\""
@@ -104773,6 +105118,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -104815,6 +105163,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2023-1076": {
                 "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid"
             }, 
@@ -104935,9 +105286,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -105325,9 +105673,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2020-29373": {
                 "cmt_msg": "io_uring: grab ->fs as part of async preparation"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -105887,10 +106244,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -106609,7 +106966,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -106827,9 +107184,6 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1419": {
                 "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
             }, 
@@ -107080,7 +107434,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2020-36312": {
                 "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()"
@@ -107419,10 +107773,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-10781": {
                 "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\""
@@ -107499,6 +107853,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -107532,6 +107889,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2023-1076": {
                 "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid"
             }, 
@@ -107649,9 +108009,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -108036,9 +108393,18 @@
             "CVE-2020-29374": {
                 "cmt_msg": "gup: document and work around \"COW can break either way\" issue"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2020-29373": {
                 "cmt_msg": "io_uring: grab ->fs as part of async preparation"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -108565,10 +108931,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -109186,7 +109552,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -109323,9 +109689,6 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1836": {
                 "cmt_msg": "floppy: disable FDRAWCMD by default"
             }, 
@@ -109489,7 +109852,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
@@ -109711,14 +110074,17 @@
                 "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-0847": {
                 "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer"
             }, 
@@ -109755,6 +110121,9 @@
             "CVE-2023-1872": {
                 "cmt_msg": "io_uring: propagate issue_flags state down to file assignment"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2023-1079": {
                 "cmt_msg": "HID: asus: use spinlock to safely schedule workers"
             }, 
@@ -109845,12 +110214,12 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-3772": {
                 "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
             }, 
@@ -110046,6 +110415,9 @@
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2022-26365": {
                 "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
@@ -110100,12 +110472,18 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -110124,6 +110502,9 @@
             "CVE-2022-43750": {
                 "cmt_msg": "usb: mon: make mmapped memory read only"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-0047": {
                 "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF"
             }, 
@@ -110262,6 +110643,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-29156": {
                 "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
             }, 
@@ -110461,10 +110845,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
@@ -110987,7 +111371,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -111121,9 +111505,6 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1836": {
                 "cmt_msg": "floppy: disable FDRAWCMD by default"
             }, 
@@ -111287,7 +111668,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
@@ -111497,10 +111878,10 @@
                 "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
@@ -111538,6 +111919,9 @@
             "CVE-2023-1872": {
                 "cmt_msg": "io_uring: propagate issue_flags state down to file assignment"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2023-1079": {
                 "cmt_msg": "HID: asus: use spinlock to safely schedule workers"
             }, 
@@ -111628,12 +112012,12 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-3772": {
                 "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
             }, 
@@ -111823,6 +112207,9 @@
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
+            }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
@@ -111832,6 +112219,9 @@
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2022-26365": {
                 "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
@@ -111883,12 +112273,21 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -111904,6 +112303,9 @@
             "CVE-2022-43750": {
                 "cmt_msg": "usb: mon: make mmapped memory read only"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-0047": {
                 "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF"
             }, 
@@ -112039,6 +112441,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-29156": {
                 "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
             }, 
@@ -112229,10 +112634,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
@@ -114486,9 +114891,21 @@
                 "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", 
                 "cmt_id": "7c5c67aa294444b53f697dc3ddce61b33ff8badd"
             }, 
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", 
+                "cmt_id": "eb37fef417a246fe54530901a3ea9c0abc914fc2"
+            }, 
+            "CVE-2022-45886": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", 
+                "cmt_id": "2ea7d26ed851db7176e4bfa8174c8a1380255bbe"
+            }, 
             "CVE-2023-3212": {
                 "cmt_msg": "gfs2: Don't deref jdesc in evict", 
                 "cmt_id": "d03d31d3a206093b9b8759dddf0ba9bd843606ba"
+            }, 
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", 
+                "cmt_id": "76169f7490899d74aad4b0e2c4c1b9d4904dd01f"
             }
         }, 
         "5.10.184": {
@@ -114546,6 +114963,10 @@
                 "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", 
                 "cmt_id": "8359ee85fd6dabc5c134ed69fb22faadd8a44071"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", 
+                "cmt_id": "30e5460d69e631c0e84db37dba2d8f98648778d4"
+            }, 
             "CVE-2023-4132": {
                 "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", 
                 "cmt_id": "d87ef4e857b790f1616809eccda6b4d0c9c3da11"
@@ -114582,6 +115003,10 @@
                 "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", 
                 "cmt_id": "308a43f1521d5b7220693d0865b23e8dad3ed137"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", 
+                "cmt_id": "ab5a97a94b57324df76d659686ac2d30494170e6"
+            }, 
             "CVE-2023-20588": {
                 "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", 
                 "cmt_id": "b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7"
@@ -114594,6 +115019,18 @@
                 "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
                 "cmt_id": "b4256c99a7116c9514224847e8aaee2ecf110a0a"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "b4256c99a7116c9514224847e8aaee2ecf110a0a"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "aaa71c4e8ad98828ed50dde3eec8e0d545a117f7"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "a8d478200b104ff356f51e1f63499fe46ba8c9b8"
+            }, 
             "CVE-2023-4273": {
                 "cmt_msg": "exfat: check if filename entries exceeds max filename length", 
                 "cmt_id": "381f7df0f3c3bd7dceb3e2b2b64c2f6247e2ac19"
@@ -114603,6 +115040,12 @@
                 "cmt_id": "06f87c96216bc5cd1094c23492274f77f1d5dd3b"
             }
         }, 
+        "5.10.192": {
+            "CVE-2023-3772": {
+                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", 
+                "cmt_id": "bd30aa9c7febb6e709670cd5154194189ca3b7b5"
+            }
+        }, 
         "outstanding": {
             "CVE-2020-26556": {
                 "cmt_msg": ""
@@ -114745,9 +115188,6 @@
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45919": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
             }, 
@@ -114775,11 +115215,11 @@
             "CVE-2020-27418": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
-            "CVE-2023-3772": {
-                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
             }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
@@ -114842,7 +115282,7 @@
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -114907,9 +115347,6 @@
             "CVE-2022-0500": {
                 "cmt_msg": "bpf: Introduce MEM_RDONLY flag"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -114979,18 +115416,15 @@
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -115028,10 +115462,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
@@ -115649,7 +116083,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -115789,9 +116223,6 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1836": {
                 "cmt_msg": "floppy: disable FDRAWCMD by default"
             }, 
@@ -115979,7 +116410,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
@@ -116219,14 +116650,17 @@
                 "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -116269,6 +116703,9 @@
             "CVE-2023-1078": {
                 "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -116371,12 +116808,12 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -116581,6 +117018,9 @@
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2022-26365": {
                 "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
@@ -116635,12 +117075,18 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -116659,6 +117105,9 @@
             "CVE-2022-43750": {
                 "cmt_msg": "usb: mon: make mmapped memory read only"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-0047": {
                 "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF"
             }, 
@@ -116800,6 +117249,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -117008,10 +117460,10 @@
                 "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
@@ -117699,7 +118151,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -117743,9 +118195,6 @@
             "CVE-2023-4134": {
                 "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -117930,7 +118379,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2013-7445": {
                 "cmt_msg": ""
@@ -118098,10 +118547,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-48502": {
                 "cmt_msg": "fs/ntfs3: Check fields while reading"
@@ -118136,6 +118585,9 @@
             "CVE-2023-1872": {
                 "cmt_msg": "io_uring: propagate issue_flags state down to file assignment"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2023-38428": {
                 "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
             }, 
@@ -118217,12 +118669,12 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-3772": {
                 "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
             }, 
@@ -118358,12 +118810,18 @@
             "CVE-2022-36280": {
                 "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor"
             }, 
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
+            }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2022-26365": {
                 "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
@@ -118385,6 +118843,9 @@
             "CVE-2018-12928": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
+            }, 
             "CVE-2023-32258": {
                 "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel"
             }, 
@@ -118418,12 +118879,21 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -118439,6 +118909,9 @@
             "CVE-2022-43750": {
                 "cmt_msg": "usb: mon: make mmapped memory read only"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-0045": {
                 "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()"
             }, 
@@ -118553,6 +119026,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3577": {
                 "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
             }, 
@@ -118695,10 +119171,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
@@ -119295,7 +119771,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -119330,9 +119806,6 @@
             "CVE-2023-4134": {
                 "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -119493,7 +119966,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-2248": {
                 "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
@@ -119655,10 +120128,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-48502": {
                 "cmt_msg": "fs/ntfs3: Check fields while reading"
@@ -119690,6 +120163,9 @@
             "CVE-2023-2430": {
                 "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2023-38428": {
                 "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
             }, 
@@ -119759,6 +120235,9 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2023-3776": {
                 "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free"
             }, 
@@ -119894,12 +120373,18 @@
             "CVE-2022-36280": {
                 "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor"
             }, 
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
+            }, 
             "CVE-2023-22997": {
                 "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page"
             }, 
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2022-26365": {
                 "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
@@ -119921,6 +120406,9 @@
             "CVE-2018-12928": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
+            }, 
             "CVE-2023-32258": {
                 "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel"
             }, 
@@ -119951,12 +120439,21 @@
             "CVE-2022-25265": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -119972,6 +120469,9 @@
             "CVE-2022-43750": {
                 "cmt_msg": "usb: mon: make mmapped memory read only"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-0045": {
                 "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()"
             }, 
@@ -120071,6 +120571,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2023-1193": {
                 "cmt_msg": ""
             }, 
@@ -120189,10 +120692,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -120701,7 +121204,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -120748,9 +121251,6 @@
             "CVE-2023-2430": {
                 "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -120998,7 +121498,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
@@ -121202,10 +121702,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-0847": {
                 "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer"
@@ -121240,6 +121740,9 @@
             "CVE-2023-1872": {
                 "cmt_msg": "io_uring: propagate issue_flags state down to file assignment"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2023-1079": {
                 "cmt_msg": "HID: asus: use spinlock to safely schedule workers"
             }, 
@@ -121324,12 +121827,12 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2023-3772": {
                 "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
             }, 
@@ -121486,6 +121989,9 @@
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
+            }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
@@ -121495,6 +122001,9 @@
             "CVE-2023-22998": {
                 "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2022-26365": {
                 "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
@@ -121519,6 +122028,9 @@
             "CVE-2021-4202": {
                 "cmt_msg": "NFC: reorganize the functions in nci_request"
             }, 
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
+            }, 
             "CVE-2020-10708": {
                 "cmt_msg": ""
             }, 
@@ -121540,12 +122052,21 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-47519": {
                 "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
             }, 
             "CVE-2022-47518": {
                 "cmt_msg": "wifi: wilc1000: validate number of channels"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -121561,6 +122082,9 @@
             "CVE-2022-43750": {
                 "cmt_msg": "usb: mon: make mmapped memory read only"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-0045": {
                 "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()"
             }, 
@@ -121687,6 +122211,9 @@
             "CVE-2023-0266": {
                 "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-29156": {
                 "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
             }, 
@@ -121862,10 +122389,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
@@ -123654,9 +124181,21 @@
                 "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", 
                 "cmt_id": "45f47d2cf1142fbfe5d6fc39ad78f4aac058907c"
             }, 
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", 
+                "cmt_id": "d6c47b23599253d7d866e1e8d60cd410855c1be5"
+            }, 
+            "CVE-2022-45886": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", 
+                "cmt_id": "50831747cb3a880dd4bdebe3fc3c81de9e21582d"
+            }, 
             "CVE-2023-3212": {
                 "cmt_msg": "gfs2: Don't deref jdesc in evict", 
                 "cmt_id": "fd8b4e28f400a067e6ef84569816967be1f0642b"
+            }, 
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", 
+                "cmt_id": "42624bc8c30c463a9155286bb716223ad04dd2a7"
             }
         }, 
         "5.15.117": {
@@ -123738,12 +124277,20 @@
             }
         }, 
         "5.15.123": {
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", 
+                "cmt_id": "10013f764ad2957de08968bd02870b6b7683e3f6"
+            }, 
             "CVE-2023-4004": {
                 "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", 
                 "cmt_id": "706ce3c81b5c8e262a8bcf116ea689d0710c3a13"
             }
         }, 
         "5.15.124": {
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", 
+                "cmt_id": "98bcfcaecc76c4be288278c213b47d36292f40fa"
+            }, 
             "CVE-2023-4147": {
                 "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", 
                 "cmt_id": "5bee91121ccea8d69cea51632e9a1dd348ee49a1"
@@ -123764,19 +124311,45 @@
             }
         }, 
         "5.15.126": {
-            "CVE-2023-4128": {
-                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
-                "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc"
-            }, 
             "CVE-2023-20588": {
                 "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", 
                 "cmt_id": "a74878207b02060c5feaf88b5566208ed08eb78d"
             }, 
+            "CVE-2023-4128": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc"
+            }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "79c3d81c9ad140957b081c91908d7e2964dc603f"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "9edf7955025a602ab6bcc94d923c436e160a10e3"
+            }, 
             "CVE-2023-40283": {
                 "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", 
                 "cmt_id": "fbe5a2fed8156cc19eb3b956602b0a1dd46a302d"
             }
         }, 
+        "5.15.128": {
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", 
+                "cmt_id": "1adaec4758d1cefbf348a291ad9b752aaa10f8d3"
+            }, 
+            "CVE-2023-4273": {
+                "cmt_msg": "exfat: check if filename entries exceeds max filename length", 
+                "cmt_id": "6b64974e02ea82d0bae917f1fa79495a1a59b5bf"
+            }, 
+            "CVE-2023-3772": {
+                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", 
+                "cmt_id": "075448a2eb753f813fe873cfa52853e9fef8eedb"
+            }
+        }, 
         "outstanding": {
             "CVE-2020-26556": {
                 "cmt_msg": ""
@@ -123826,9 +124399,6 @@
             "CVE-2020-24502": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-4273": {
-                "cmt_msg": "exfat: check if filename entries exceeds max filename length"
-            }, 
             "CVE-2023-38431": {
                 "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop"
             }, 
@@ -123901,10 +124471,10 @@
             "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2961": {
-                "cmt_msg": ""
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
             }, 
-            "CVE-2022-45919": {
+            "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
             "CVE-2023-32258": {
@@ -123937,11 +124507,11 @@
             "CVE-2020-27418": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
-            "CVE-2023-3772": {
-                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
             }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
@@ -123992,7 +124562,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -124039,9 +124609,6 @@
             "CVE-2023-4134": {
                 "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-26242": {
                 "cmt_msg": ""
             }, 
@@ -124102,18 +124669,15 @@
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2022-45888": {
                 "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition"
             }, 
@@ -124166,10 +124730,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
@@ -125021,9 +125585,6 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1419": {
                 "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
             }, 
@@ -125310,7 +125871,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2019-19319": {
                 "cmt_msg": "ext4: protect journal inode's blocks using block_validity"
@@ -125673,7 +126234,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -125765,6 +126326,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -125807,6 +126371,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -125948,9 +126515,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -126353,9 +126917,18 @@
             "CVE-2020-25284": {
                 "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -126501,7 +127074,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
@@ -126696,7 +127269,7 @@
                 "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-28972": {
                 "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions"
@@ -126951,7 +127524,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -127056,7 +127629,7 @@
                 "cmt_msg": "inet: switch IP ID generator to siphash"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2019-5489": {
                 "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
@@ -129733,9 +130306,21 @@
             }
         }, 
         "5.4.246": {
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", 
+                "cmt_id": "08b20cb8e5b9d69bb3b83c1ad30a702767a9f0ef"
+            }, 
+            "CVE-2022-45886": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", 
+                "cmt_id": "ed47886a73dbc0477ae09a4a979e27317cf2b52d"
+            }, 
             "CVE-2023-35788": {
                 "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", 
                 "cmt_id": "94a00f1142c581fe01d17d7beca314592f85e83a"
+            }, 
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", 
+                "cmt_id": "353fd22693a672efb337d399e610898c64f57b17"
             }
         }, 
         "5.4.247": {
@@ -129831,11 +130416,29 @@
                 "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", 
                 "cmt_id": "cf8ecd6ea68099a38e94e9b82cf58f6fd4cdf3c9"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "be785808db32b595728c4042d002c83d0dd4b66f"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "1c8262f31fd2d23d1cfd2539715d976c2a99e582"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", 
+                "cmt_id": "83e3d4b0ae373dcba30c68bf28f8d179191a297a"
+            }, 
             "CVE-2023-40283": {
                 "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", 
                 "cmt_id": "a2da00d1ea1abfb04f846638e210b5b5166e3c9c"
             }
         }, 
+        "5.4.255": {
+            "CVE-2023-3772": {
+                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", 
+                "cmt_id": "8046beb890ebc83c5820188c650073e1c6066e67"
+            }
+        }, 
         "outstanding": {
             "CVE-2021-0929": {
                 "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
@@ -130002,9 +130605,6 @@
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45919": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-21400": {
                 "cmt_msg": ""
             }, 
@@ -130032,11 +130632,11 @@
             "CVE-2020-27418": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
-            "CVE-2023-3772": {
-                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
             }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
@@ -130102,7 +130702,7 @@
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -130170,9 +130770,6 @@
             "CVE-2022-3176": {
                 "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -130263,12 +130860,6 @@
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
@@ -130315,10 +130906,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
@@ -130672,263 +131263,53 @@
             }
         }, 
         "outstanding": {
-            "CVE-2023-20593": {
-                "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix"
-            }, 
-            "CVE-2023-0160": {
-                "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap"
-            }, 
-            "CVE-2020-26556": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-26557": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3910": {
-                "cmt_msg": "io_uring/msg_ring: check file type before putting"
-            }, 
-            "CVE-2022-43750": {
-                "cmt_msg": "usb: mon: make mmapped memory read only"
-            }, 
-            "CVE-2023-38426": {
-                "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals"
-            }, 
-            "CVE-2019-20794": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-26559": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-35501": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-4010": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-38457": {
-                "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources"
-            }, 
-            "CVE-2023-1078": {
-                "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
-            }, 
-            "CVE-2023-1990": {
-                "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition"
-            }, 
-            "CVE-2023-21400": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-23454": {
-                "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
-            "CVE-2022-3619": {
-                "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write"
-            }, 
-            "CVE-2018-1121": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-1380": {
-                "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
-            }, 
-            "CVE-2023-0615": {
-                "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases"
-            }, 
-            "CVE-2023-38427": {
-                "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()"
-            }, 
-            "CVE-2019-19378": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-2785": {
-                "cmt_msg": "bpf: Disallow bpf programs call prog_run command."
-            }, 
-            "CVE-2022-3586": {
-                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
-            }, 
-            "CVE-2023-2176": {
-                "cmt_msg": "RDMA/core: Refactor rdma_bind_addr"
-            }, 
-            "CVE-2022-43945": {
-                "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR"
+            "CVE-2023-2248": {
+                "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
             }, 
             "CVE-2022-47520": {
                 "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets"
             }, 
-            "CVE-2022-45934": {
-                "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow"
-            }, 
-            "CVE-2022-2663": {
-                "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic"
-            }, 
-            "CVE-2022-3344": {
-                "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use"
-            }, 
-            "CVE-2023-23004": {
-                "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking"
-            }, 
-            "CVE-2023-31081": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-0394": {
-                "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames"
-            }, 
-            "CVE-2023-1670": {
-                "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach"
-            }, 
-            "CVE-2020-24503": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-24502": {
-                "cmt_msg": ""
+            "CVE-2022-47521": {
+                "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute"
             }, 
             "CVE-2023-4273": {
                 "cmt_msg": "exfat: check if filename entries exceeds max filename length"
             }, 
-            "CVE-2023-31085": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-26607": {
-                "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()"
-            }, 
-            "CVE-2023-1079": {
-                "cmt_msg": "HID: asus: use spinlock to safely schedule workers"
-            }, 
-            "CVE-2022-39842": {
-                "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write"
-            }, 
-            "CVE-2023-3357": {
-                "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent"
-            }, 
-            "CVE-2020-11725": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-0045": {
-                "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()"
-            }, 
-            "CVE-2023-3812": {
-                "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled"
-            }, 
             "CVE-2022-23825": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3111": {
-                "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()"
-            }, 
-            "CVE-2023-30456": {
-                "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4"
-            }, 
-            "CVE-2023-32233": {
-                "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase"
+            "CVE-2023-4004": {
+                "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal"
             }, 
             "CVE-2023-0179": {
                 "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits"
             }, 
-            "CVE-2023-31436": {
-                "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
-            }, 
-            "CVE-2023-3389": {
-                "cmt_msg": "io_uring: mutex locked poll hashing"
-            }, 
-            "CVE-2022-3521": {
-                "cmt_msg": "kcm: avoid potential race in kcm_tx_work"
-            }, 
-            "CVE-2023-40283": {
-                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb"
-            }, 
-            "CVE-2022-47929": {
-                "cmt_msg": "net: sched: disallow noqueue for qdisc classes"
-            }, 
-            "CVE-2021-3864": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3606": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2019-19814": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-2162": {
-                "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
-            }, 
-            "CVE-2022-2209": {
-                "cmt_msg": ""
+            "CVE-2023-2163": {
+                "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
             }, 
             "CVE-2023-4394": {
                 "cmt_msg": "btrfs: fix possible memory leak in btrfs_get_dev_args_from_path()"
             }, 
-            "CVE-2023-26606": {
-                "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs"
-            }, 
             "CVE-2023-28466": {
                 "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()"
             }, 
             "CVE-2022-40307": {
                 "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write"
             }, 
-            "CVE-2023-3390": {
-                "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE"
-            }, 
-            "CVE-2022-38096": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-2978": {
-                "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy"
-            }, 
-            "CVE-2022-3594": {
-                "cmt_msg": "r8152: Rate limit overflow messages"
-            }, 
-            "CVE-2022-3595": {
-                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
-            }, 
-            "CVE-2021-26934": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3114": {
-                "cmt_msg": "clk: imx: Add check for kcalloc"
-            }, 
-            "CVE-2023-20569": {
-                "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s"
-            }, 
             "CVE-2023-0459": {
                 "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()"
             }, 
             "CVE-2023-0458": {
                 "cmt_msg": "prlimit: do_prlimit needs to have a speculation check"
             }, 
-            "CVE-2023-3141": {
-                "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition"
-            }, 
-            "CVE-2023-32247": {
-                "cmt_msg": "ksmbd: destroy expired sessions"
-            }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
-            "CVE-2016-8660": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-0210": {
-                "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob"
-            }, 
-            "CVE-2023-2156": {
-                "cmt_msg": "net: rpl: fix rpl header size calculation"
-            }, 
             "CVE-2023-0597": {
                 "cmt_msg": "x86/mm: Randomize per-cpu entry area"
             }, 
-            "CVE-2023-3397": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-42432": {
-                "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()"
-            }, 
-            "CVE-2018-12929": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3524": {
-                "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()."
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-15802": {
                 "cmt_msg": ""
@@ -130936,9 +131317,6 @@
             "CVE-2022-2590": {
                 "cmt_msg": "mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW"
             }, 
-            "CVE-2008-2544": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2483": {
                 "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition"
             }, 
@@ -130951,50 +131329,11 @@
             "CVE-2022-3633": {
                 "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs"
             }, 
-            "CVE-2023-21255": {
-                "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup"
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
             }, 
-            "CVE-2023-3776": {
-                "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free"
-            }, 
-            "CVE-2023-2248": {
-                "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
-            }, 
-            "CVE-2022-2196": {
-                "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS"
-            }, 
-            "CVE-2019-15239": {
-                "cmt_msg": "unknown"
-            }, 
-            "CVE-2023-3358": {
-                "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map"
-            }, 
-            "CVE-2007-3719": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-3863": {
-                "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
-            }, 
-            "CVE-2023-37454": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-0590": {
-                "cmt_msg": "net: sched: fix race condition in qdisc_graft()"
-            }, 
-            "CVE-2022-2961": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-4095": {
-                "cmt_msg": "staging: rtl8712: fix use after free bugs"
-            }, 
-            "CVE-2023-2194": {
-                "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()"
-            }, 
-            "CVE-2022-45919": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-32258": {
-                "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel"
+            "CVE-2023-2002": {
+                "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()"
             }, 
             "CVE-2023-2006": {
                 "cmt_msg": "rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975]"
@@ -131002,14 +131341,11 @@
             "CVE-2023-2007": {
                 "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver"
             }, 
-            "CVE-2022-40133": {
-                "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources"
+            "CVE-2023-1078": {
+                "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
             }, 
-            "CVE-2010-4563": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-26140": {
-                "cmt_msg": ""
+            "CVE-2023-1079": {
+                "cmt_msg": "HID: asus: use spinlock to safely schedule workers"
             }, 
             "CVE-2020-26143": {
                 "cmt_msg": ""
@@ -131017,8 +131353,8 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-39190": {
-                "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
+            "CVE-2023-1074": {
+                "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope"
             }, 
             "CVE-2023-1075": {
                 "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry"
@@ -131032,21 +131368,459 @@
             "CVE-2020-27418": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-2166": {
-                "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter"
-            }, 
-            "CVE-2023-0266": {
-                "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
+            "CVE-2023-40283": {
+                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb"
             }, 
             "CVE-2023-1073": {
                 "cmt_msg": "HID: check empty report_list in hid_validate_values()"
             }, 
+            "CVE-2023-3006": {
+                "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list"
+            }, 
+            "CVE-2023-1652": {
+                "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()"
+            }, 
+            "CVE-2022-3707": {
+                "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry"
+            }, 
+            "CVE-2023-2176": {
+                "cmt_msg": "RDMA/core: Refactor rdma_bind_addr"
+            }, 
+            "CVE-2022-39188": {
+                "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
+            }, 
+            "CVE-2022-4139": {
+                "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines"
+            }, 
+            "CVE-2005-3660": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-31085": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-31084": {
+                "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
+            }, 
+            "CVE-2023-31083": {
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
+            }, 
+            "CVE-2023-31082": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-31081": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-4543": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3028": {
+                "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel"
+            }, 
+            "CVE-2020-14304": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3610": {
+                "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic"
+            }, 
+            "CVE-2023-3611": {
+                "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue"
+            }, 
+            "CVE-2023-4132": {
+                "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer"
+            }, 
+            "CVE-2023-4133": {
+                "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem"
+            }, 
+            "CVE-2020-26560": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-4134": {
+                "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()"
+            }, 
+            "CVE-2023-37454": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-42703": {
+                "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse"
+            }, 
+            "CVE-2023-33288": {
+                "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition"
+            }, 
+            "CVE-2022-36402": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-35829": {
+                "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove"
+            }, 
+            "CVE-2023-35828": {
+                "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition"
+            }, 
+            "CVE-2022-1116": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-35823": {
+                "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition"
+            }, 
+            "CVE-2023-35824": {
+                "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition"
+            }, 
+            "CVE-2023-35827": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-35826": {
+                "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition"
+            }, 
+            "CVE-2023-38432": {
+                "cmt_msg": "ksmbd: validate command payload size"
+            }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu"
+            }, 
+            "CVE-2022-4269": {
+                "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
+            }, 
+            "CVE-2023-30772": {
+                "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition"
+            }, 
+            "CVE-2023-1611": {
+                "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls"
+            }, 
+            "CVE-2013-7445": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-35001": {
+                "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval"
+            }, 
+            "CVE-2020-26556": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26557": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-20794": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26559": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3397": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-1121": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3344": {
+                "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use"
+            }, 
+            "CVE-2023-23004": {
+                "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking"
+            }, 
+            "CVE-2023-23559": {
+                "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid"
+            }, 
+            "CVE-2022-39842": {
+                "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write"
+            }, 
+            "CVE-2023-3812": {
+                "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled"
+            }, 
+            "CVE-2019-19814": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-26934": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3114": {
+                "cmt_msg": "clk: imx: Add check for kcalloc"
+            }, 
+            "CVE-2023-3141": {
+                "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition"
+            }, 
+            "CVE-2023-0210": {
+                "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob"
+            }, 
+            "CVE-2022-3524": {
+                "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()."
+            }, 
+            "CVE-2022-3523": {
+                "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
+            }, 
+            "CVE-2022-3522": {
+                "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check"
+            }, 
+            "CVE-2022-3521": {
+                "cmt_msg": "kcm: avoid potential race in kcm_tx_work"
+            }, 
+            "CVE-2022-2196": {
+                "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS"
+            }, 
+            "CVE-2007-3719": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3863": {
+                "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
+            }, 
+            "CVE-2023-0590": {
+                "cmt_msg": "net: sched: fix race condition in qdisc_graft()"
+            }, 
+            "CVE-2022-4095": {
+                "cmt_msg": "staging: rtl8712: fix use after free bugs"
+            }, 
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
+            }, 
+            "CVE-2023-21400": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-3628": {
                 "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()"
             }, 
             "CVE-2022-3629": {
                 "cmt_msg": "vsock: Fix memory leak in vsock_connect()"
             }, 
+            "CVE-2022-1247": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3621": {
+                "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()"
+            }, 
+            "CVE-2022-3623": {
+                "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page"
+            }, 
+            "CVE-2022-3624": {
+                "cmt_msg": "bonding: fix reference count leak in balance-alb mode"
+            }, 
+            "CVE-2022-3625": {
+                "cmt_msg": "devlink: Fix use-after-free after a failed reload"
+            }, 
+            "CVE-2023-3090": {
+                "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb"
+            }, 
+            "CVE-2022-3238": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-1829": {
+                "cmt_msg": "net/sched: Retire tcindex classifier"
+            }, 
+            "CVE-2022-2905": {
+                "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors"
+            }, 
+            "CVE-2022-48423": {
+                "cmt_msg": "fs/ntfs3: Validate resident attribute name"
+            }, 
+            "CVE-2022-48424": {
+                "cmt_msg": "fs/ntfs3: Validate attribute name offset"
+            }, 
+            "CVE-2022-48425": {
+                "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs"
+            }, 
+            "CVE-2023-31248": {
+                "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id"
+            }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3303": {
+                "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC"
+            }, 
+            "CVE-2022-45869": {
+                "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault"
+            }, 
+            "CVE-2023-23455": {
+                "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop"
+            }, 
+            "CVE-2023-23454": {
+                "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop"
+            }, 
+            "CVE-2023-2898": {
+                "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()"
+            }, 
+            "CVE-2022-4129": {
+                "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock"
+            }, 
+            "CVE-2023-33203": {
+                "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition"
+            }, 
+            "CVE-2023-26544": {
+                "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack"
+            }, 
+            "CVE-2023-26545": {
+                "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename"
+            }, 
+            "CVE-2021-3892": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-15290": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3212": {
+                "cmt_msg": "gfs2: Don't deref jdesc in evict"
+            }, 
+            "CVE-2023-28866": {
+                "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds"
+            }, 
+            "CVE-2022-26878": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12930": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-25012": {
+                "cmt_msg": "HID: bigben: use spinlock to safely schedule workers"
+            }, 
+            "CVE-2023-1990": {
+                "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition"
+            }, 
+            "CVE-2023-32248": {
+                "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()"
+            }, 
+            "CVE-2022-4662": {
+                "cmt_msg": "USB: core: Prevent nested device-reset calls"
+            }, 
+            "CVE-2022-2308": {
+                "cmt_msg": "vduse: prevent uninitialized memory accesses"
+            }, 
+            "CVE-2022-3903": {
+                "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines"
+            }, 
+            "CVE-2023-1195": {
+                "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`"
+            }, 
+            "CVE-2023-1194": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-20588": {
+                "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0"
+            }, 
+            "CVE-2023-1192": {
+                "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs"
+            }, 
+            "CVE-2022-4379": {
+                "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()"
+            }, 
+            "CVE-2022-44034": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-44033": {
+                "cmt_msg": "char: pcmcia: remove all the drivers"
+            }, 
+            "CVE-2022-44032": {
+                "cmt_msg": "char: pcmcia: remove all the drivers"
+            }, 
+            "CVE-2022-48502": {
+                "cmt_msg": "fs/ntfs3: Check fields while reading"
+            }, 
+            "CVE-2022-3977": {
+                "cmt_msg": "mctp: prevent double key removal and unref"
+            }, 
+            "CVE-2023-21102": {
+                "cmt_msg": "efi: rt-wrapper: Add missing include"
+            }, 
+            "CVE-2022-3619": {
+                "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write"
+            }, 
+            "CVE-2023-38426": {
+                "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals"
+            }, 
+            "CVE-2023-0615": {
+                "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases"
+            }, 
+            "CVE-2023-38427": {
+                "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()"
+            }, 
+            "CVE-2022-2785": {
+                "cmt_msg": "bpf: Disallow bpf programs call prog_run command."
+            }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
+            "CVE-2022-43945": {
+                "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR"
+            }, 
+            "CVE-2023-2430": {
+                "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
+            }, 
+            "CVE-2023-38428": {
+                "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
+            }, 
+            "CVE-2020-26140": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-38431": {
+                "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop"
+            }, 
+            "CVE-2023-38430": {
+                "cmt_msg": "ksmbd: validate smb request protocol id"
+            }, 
+            "CVE-2023-3390": {
+                "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE"
+            }, 
+            "CVE-2023-3389": {
+                "cmt_msg": "io_uring: mutex locked poll hashing"
+            }, 
+            "CVE-2021-3864": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-1670": {
+                "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach"
+            }, 
+            "CVE-2023-38429": {
+                "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]"
+            }, 
+            "CVE-2022-2978": {
+                "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy"
+            }, 
+            "CVE-2023-20569": {
+                "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s"
+            }, 
+            "CVE-2016-8660": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-2156": {
+                "cmt_msg": "net: rpl: fix rpl header size calculation"
+            }, 
+            "CVE-2022-42432": {
+                "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()"
+            }, 
+            "CVE-2008-4609": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-26607": {
+                "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()"
+            }, 
+            "CVE-2023-26606": {
+                "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs"
+            }, 
+            "CVE-2019-15239": {
+                "cmt_msg": "unknown"
+            }, 
+            "CVE-2023-20941": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-4155": {
+                "cmt_msg": "KVM: SEV: only access GHCB fields once"
+            }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
+            "CVE-2023-3776": {
+                "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free"
+            }, 
+            "CVE-2023-3773": {
+                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
+            }, 
+            "CVE-2023-3772": {
+                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
+            }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
             }, 
@@ -131056,75 +131830,24 @@
             "CVE-2022-3535": {
                 "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
             }, 
-            "CVE-2023-38430": {
-                "cmt_msg": "ksmbd: validate smb request protocol id"
-            }, 
-            "CVE-2022-1247": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-48425": {
-                "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs"
-            }, 
-            "CVE-2022-3621": {
-                "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()"
-            }, 
-            "CVE-2023-3611": {
-                "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue"
-            }, 
-            "CVE-2022-3623": {
-                "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page"
-            }, 
             "CVE-2022-3435": {
                 "cmt_msg": "ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference"
             }, 
-            "CVE-2022-3625": {
-                "cmt_msg": "devlink: Fix use-after-free after a failed reload"
-            }, 
             "CVE-2022-4842": {
                 "cmt_msg": "fs/ntfs3: Fix attr_punch_hole() null pointer derenference"
             }, 
-            "CVE-2023-3090": {
-                "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb"
-            }, 
-            "CVE-2023-38431": {
-                "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop"
-            }, 
-            "CVE-2023-21102": {
-                "cmt_msg": "efi: rt-wrapper: Add missing include"
-            }, 
-            "CVE-2020-10708": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-1652": {
-                "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()"
+            "CVE-2023-28328": {
+                "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()"
             }, 
             "CVE-2023-0386": {
                 "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up"
             }, 
-            "CVE-2023-38428": {
-                "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
-            }, 
-            "CVE-2022-3238": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3707": {
-                "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry"
-            }, 
-            "CVE-2023-3772": {
-                "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
+            "CVE-2023-28327": {
+                "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()."
             }, 
             "CVE-2017-13693": {
                 "cmt_msg": ""
             }, 
-            "CVE-2021-0399": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-23455": {
-                "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop"
-            }, 
-            "CVE-2023-1829": {
-                "cmt_msg": "net/sched: Retire tcindex classifier"
-            }, 
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
@@ -131137,231 +131860,54 @@
             "CVE-2022-42722": {
                 "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
             }, 
-            "CVE-2012-4542": {
-                "cmt_msg": ""
+            "CVE-2022-42896": {
+                "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM"
             }, 
             "CVE-2022-42895": {
                 "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory"
             }, 
-            "CVE-2023-4128": {
-                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
-            }, 
-            "CVE-2022-42329": {
-                "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled"
-            }, 
-            "CVE-2022-44034": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-2269": {
-                "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern"
-            }, 
             "CVE-2023-33952": {
                 "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon"
             }, 
             "CVE-2023-33951": {
                 "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon"
             }, 
-            "CVE-2023-32257": {
-                "cmt_msg": "ksmbd: fix racy issue from session setup and logoff"
-            }, 
             "CVE-2022-4382": {
                 "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting"
             }, 
-            "CVE-2023-28328": {
-                "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()"
-            }, 
-            "CVE-2022-48423": {
-                "cmt_msg": "fs/ntfs3: Validate resident attribute name"
-            }, 
-            "CVE-2022-2602": {
-                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
-            }, 
-            "CVE-2013-7445": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-32269": {
-                "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket"
-            }, 
-            "CVE-2022-39188": {
-                "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
-            }, 
-            "CVE-2022-4139": {
-                "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines"
-            }, 
-            "CVE-2023-31248": {
-                "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id"
-            }, 
-            "CVE-2023-26242": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-34255": {
-                "cmt_msg": "xfs: verify buffer contents when we skip log replay"
-            }, 
-            "CVE-2022-3624": {
-                "cmt_msg": "bonding: fix reference count leak in balance-alb mode"
-            }, 
-            "CVE-2005-3660": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-32248": {
-                "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()"
-            }, 
-            "CVE-2023-28327": {
-                "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()."
-            }, 
-            "CVE-2023-31084": {
-                "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
-            }, 
-            "CVE-2023-31083": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-31082": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3424": {
-                "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os"
-            }, 
-            "CVE-2022-47521": {
-                "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute"
-            }, 
             "CVE-2022-3545": {
                 "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
             }, 
             "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2022-3543": {
                 "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
             }, 
             "CVE-2022-3542": {
                 "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
             }, 
-            "CVE-2023-35788": {
-                "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()"
-            }, 
-            "CVE-2022-3523": {
-                "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
-            }, 
-            "CVE-2022-3303": {
-                "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC"
-            }, 
-            "CVE-2022-3522": {
-                "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check"
-            }, 
-            "CVE-2022-45869": {
-                "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault"
-            }, 
-            "CVE-2022-4543": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2008-4609": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3028": {
-                "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel"
-            }, 
-            "CVE-2022-2905": {
-                "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors"
-            }, 
             "CVE-2023-1382": {
                 "cmt_msg": "tipc: set con sock in tipc_conn_alloc"
             }, 
-            "CVE-2020-14304": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-2898": {
-                "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()"
-            }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
+            "CVE-2023-1380": {
+                "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()"
             }, 
             "CVE-2020-0347": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-0461": {
-                "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status"
-            }, 
-            "CVE-2023-3610": {
-                "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic"
-            }, 
-            "CVE-2022-42328": {
-                "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled"
-            }, 
-            "CVE-2021-3714": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-0468": {
-                "cmt_msg": "io_uring: make poll refs more robust"
-            }, 
-            "CVE-2023-4133": {
-                "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem"
-            }, 
             "CVE-2019-12456": {
                 "cmt_msg": ""
             }, 
-            "CVE-2020-26560": {
+            "CVE-2018-12931": {
                 "cmt_msg": ""
             }, 
-            "CVE-2021-3892": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-35823": {
-                "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition"
-            }, 
-            "CVE-2023-4134": {
-                "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()"
-            }, 
-            "CVE-2023-2430": {
-                "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
-            }, 
-            "CVE-2023-4147": {
-                "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID"
-            }, 
-            "CVE-2022-4129": {
-                "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock"
-            }, 
-            "CVE-2023-3117": {
-                "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE"
-            }, 
-            "CVE-2023-3567": {
-                "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF"
-            }, 
-            "CVE-2023-2860": {
-                "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data."
-            }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-2163": {
-                "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
-            }, 
-            "CVE-2023-33203": {
-                "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition"
-            }, 
             "CVE-2023-1206": {
                 "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()."
             }, 
             "CVE-2022-41850": {
                 "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()"
             }, 
-            "CVE-2023-4155": {
-                "cmt_msg": "KVM: SEV: only access GHCB fields once"
-            }, 
-            "CVE-2023-2235": {
-                "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()"
-            }, 
-            "CVE-2023-4132": {
-                "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer"
-            }, 
-            "CVE-2023-26544": {
-                "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack"
-            }, 
-            "CVE-2023-26545": {
-                "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename"
-            }, 
             "CVE-2023-2985": {
                 "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super"
             }, 
@@ -131371,235 +131917,91 @@
             "CVE-2022-3646": {
                 "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure"
             }, 
-            "CVE-2023-4004": {
-                "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal"
-            }, 
-            "CVE-2023-35826": {
-                "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition"
-            }, 
             "CVE-2022-3642": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-3643": {
                 "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area"
             }, 
-            "CVE-2023-20588": {
-                "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0"
-            }, 
-            "CVE-2022-42703": {
-                "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse"
+            "CVE-2023-3357": {
+                "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent"
             }, 
             "CVE-2023-3355": {
                 "cmt_msg": "drm/msm/gem: Add check for kmalloc"
             }, 
-            "CVE-2022-41218": {
-                "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing"
-            }, 
-            "CVE-2011-4917": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-30772": {
-                "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
             "CVE-2023-3359": {
                 "cmt_msg": "nvmem: brcm_nvram: Add check for kzalloc"
             }, 
-            "CVE-2023-33288": {
-                "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition"
-            }, 
-            "CVE-2022-36402": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-38429": {
-                "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]"
-            }, 
-            "CVE-2019-15290": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-3212": {
-                "cmt_msg": "gfs2: Don't deref jdesc in evict"
-            }, 
-            "CVE-2023-3161": {
-                "cmt_msg": "fbcon: Check font dimension limits"
-            }, 
-            "CVE-2022-3567": {
-                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
-            }, 
-            "CVE-2023-1118": {
-                "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()"
-            }, 
-            "CVE-2023-25012": {
-                "cmt_msg": "HID: bigben: use spinlock to safely schedule workers"
-            }, 
-            "CVE-2023-28866": {
-                "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds"
-            }, 
-            "CVE-2022-3566": {
-                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
-            }, 
-            "CVE-2023-35829": {
-                "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove"
-            }, 
-            "CVE-2023-35828": {
-                "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition"
+            "CVE-2023-3358": {
+                "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map"
             }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-26878": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-41849": {
-                "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()"
-            }, 
-            "CVE-2022-3565": {
-                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
-            }, 
-            "CVE-2022-1116": {
-                "cmt_msg": ""
-            }, 
             "CVE-2010-5321": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3640": {
-                "cmt_msg": ""
+            "CVE-2023-32247": {
+                "cmt_msg": "ksmbd: destroy expired sessions"
             }, 
-            "CVE-2022-40982": {
-                "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation"
-            }, 
-            "CVE-2018-12930": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2018-12931": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-35824": {
-                "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition"
-            }, 
-            "CVE-2023-35827": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-42896": {
-                "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM"
-            }, 
-            "CVE-2022-4269": {
-                "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
-            }, 
-            "CVE-2023-38432": {
-                "cmt_msg": "ksmbd: validate command payload size"
-            }, 
-            "CVE-2021-39801": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2021-39800": {
-                "cmt_msg": ""
+            "CVE-2023-4147": {
+                "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID"
             }, 
             "CVE-2022-3169": {
                 "cmt_msg": "nvme: ensure subsystem reset is single threaded"
             }, 
-            "CVE-2022-3564": {
-                "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu"
-            }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-36280": {
                 "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor"
             }, 
-            "CVE-2023-1074": {
-                "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope"
-            }, 
-            "CVE-2023-3338": {
-                "cmt_msg": "Remove DECnet support from kernel"
-            }, 
-            "CVE-2022-45885": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45884": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
             }, 
             "CVE-2023-22997": {
                 "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page"
             }, 
-            "CVE-2023-2124": {
-                "cmt_msg": "xfs: verify buffer contents when we skip log replay"
-            }, 
-            "CVE-2022-45888": {
-                "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition"
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
             }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-1281": {
-                "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu"
-            }, 
             "CVE-2023-3220": {
                 "cmt_msg": "drm/msm/dpu: Add check for pstates"
             }, 
-            "CVE-2023-1859": {
-                "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition"
+            "CVE-2023-34255": {
+                "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
-            "CVE-2023-23559": {
-                "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid"
-            }, 
-            "CVE-2023-1855": {
-                "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition"
-            }, 
-            "CVE-2022-27672": {
-                "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions"
-            }, 
-            "CVE-2023-3268": {
-                "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read"
-            }, 
-            "CVE-2023-32254": {
-                "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect"
+            "CVE-2023-32233": {
+                "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase"
             }, 
             "CVE-2023-34256": {
                 "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum"
             }, 
-            "CVE-2022-2308": {
-                "cmt_msg": "vduse: prevent uninitialized memory accesses"
+            "CVE-2018-12929": {
+                "cmt_msg": ""
             }, 
             "CVE-2018-12928": {
                 "cmt_msg": ""
             }, 
-            "CVE-2020-25220": {
-                "cmt_msg": ""
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
             }, 
-            "CVE-2022-3903": {
-                "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines"
+            "CVE-2023-32258": {
+                "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel"
             }, 
-            "CVE-2015-2877": {
-                "cmt_msg": ""
+            "CVE-2023-32257": {
+                "cmt_msg": "ksmbd: fix racy issue from session setup and logoff"
             }, 
-            "CVE-2023-3006": {
-                "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list"
+            "CVE-2023-32254": {
+                "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect"
             }, 
-            "CVE-2023-1611": {
-                "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls"
+            "CVE-2023-32252": {
+                "cmt_msg": "ksmbd: fix racy issue from session setup and logoff"
             }, 
-            "CVE-2023-1195": {
-                "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`"
-            }, 
-            "CVE-2023-1194": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-1193": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2023-1192": {
-                "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs"
-            }, 
-            "CVE-2019-16089": {
+            "CVE-2020-10708": {
                 "cmt_msg": ""
             }, 
             "CVE-2023-32250": {
@@ -131608,16 +132010,265 @@
             "CVE-2022-0400": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-4379": {
-                "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()"
+            "CVE-2023-2235": {
+                "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()"
+            }, 
+            "CVE-2023-1989": {
+                "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
+            }, 
+            "CVE-2022-25265": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2022-47519": {
+                "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
+            }, 
+            "CVE-2022-47518": {
+                "cmt_msg": "wifi: wilc1000: validate number of channels"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-3640": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-20593": {
+                "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix"
+            }, 
+            "CVE-2023-0160": {
+                "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap"
+            }, 
+            "CVE-2022-2663": {
+                "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic"
+            }, 
+            "CVE-2022-3910": {
+                "cmt_msg": "io_uring/msg_ring: check file type before putting"
+            }, 
+            "CVE-2022-43750": {
+                "cmt_msg": "usb: mon: make mmapped memory read only"
+            }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
+            "CVE-2023-0045": {
+                "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()"
+            }, 
+            "CVE-2023-4010": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-38457": {
+                "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources"
+            }, 
+            "CVE-2022-20421": {
+                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
+            }, 
+            "CVE-2019-19378": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45934": {
+                "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow"
+            }, 
+            "CVE-2022-41674": {
+                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
+            }, 
+            "CVE-2020-24503": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-24502": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-1118": {
+                "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()"
+            }, 
+            "CVE-2020-11725": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-30456": {
+                "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4"
+            }, 
+            "CVE-2023-31436": {
+                "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
+            }, 
+            "CVE-2022-47929": {
+                "cmt_msg": "net: sched: disallow noqueue for qdisc classes"
+            }, 
+            "CVE-2022-3606": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-2209": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
+            "CVE-2022-42329": {
+                "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled"
+            }, 
+            "CVE-2022-42328": {
+                "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled"
+            }, 
+            "CVE-2023-21255": {
+                "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup"
+            }, 
+            "CVE-2022-2961": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3268": {
+                "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read"
+            }, 
+            "CVE-2022-40133": {
+                "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources"
+            }, 
+            "CVE-2010-4563": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-39190": {
+                "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
+            }, 
+            "CVE-2023-2162": {
+                "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
+            }, 
+            "CVE-2023-2166": {
+                "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter"
+            }, 
+            "CVE-2023-0266": {
+                "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF"
+            }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
+            "CVE-2023-1193": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-0399": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3161": {
+                "cmt_msg": "fbcon: Check font dimension limits"
+            }, 
+            "CVE-2012-4542": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-4128": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
             }, 
             "CVE-2022-4378": {
                 "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings"
             }, 
-            "CVE-2022-44033": {
+            "CVE-2023-3609": {
+                "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow"
+            }, 
+            "CVE-2022-3424": {
+                "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os"
+            }, 
+            "CVE-2023-2269": {
+                "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern"
+            }, 
+            "CVE-2023-0394": {
+                "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames"
+            }, 
+            "CVE-2023-32269": {
+                "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket"
+            }, 
+            "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-44032": {
+            "CVE-2022-42719": {
+                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
+            }, 
+            "CVE-2023-0461": {
+                "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status"
+            }, 
+            "CVE-2021-3714": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-0468": {
+                "cmt_msg": "io_uring: make poll refs more robust"
+            }, 
+            "CVE-2023-3117": {
+                "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE"
+            }, 
+            "CVE-2023-3111": {
+                "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()"
+            }, 
+            "CVE-2023-35788": {
+                "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()"
+            }, 
+            "CVE-2023-3567": {
+                "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF"
+            }, 
+            "CVE-2023-2860": {
+                "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data."
+            }, 
+            "CVE-2023-2194": {
+                "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()"
+            }, 
+            "CVE-2022-41218": {
+                "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing"
+            }, 
+            "CVE-2022-41849": {
+                "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()"
+            }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-40982": {
+                "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation"
+            }, 
+            "CVE-2021-39801": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39800": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45885": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45884": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
+            }, 
+            "CVE-2022-45886": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
+            }, 
+            "CVE-2023-2124": {
+                "cmt_msg": "xfs: verify buffer contents when we skip log replay"
+            }, 
+            "CVE-2022-45888": {
+                "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition"
+            }, 
+            "CVE-2023-1281": {
+                "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu"
+            }, 
+            "CVE-2023-1859": {
+                "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition"
+            }, 
+            "CVE-2023-1855": {
+                "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition"
+            }, 
+            "CVE-2022-27672": {
+                "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions"
+            }, 
+            "CVE-2020-25220": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2015-2877": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-26242": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-16089": {
                 "cmt_msg": ""
             }, 
             "CVE-2023-21264": {
@@ -131626,56 +132277,23 @@
             "CVE-2023-1513": {
                 "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace"
             }, 
-            "CVE-2023-1989": {
-                "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
-            }, 
-            "CVE-2023-35001": {
-                "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval"
-            }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-20941": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-40768": {
                 "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure"
             }, 
-            "CVE-2022-25265": {
+            "CVE-2011-4917": {
                 "cmt_msg": ""
             }, 
             "CVE-2011-4916": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-48424": {
-                "cmt_msg": "fs/ntfs3: Validate attribute name offset"
-            }, 
-            "CVE-2022-4662": {
-                "cmt_msg": "USB: core: Prevent nested device-reset calls"
-            }, 
             "CVE-2023-23039": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-48502": {
-                "cmt_msg": "fs/ntfs3: Check fields while reading"
-            }, 
-            "CVE-2022-3977": {
-                "cmt_msg": "mctp: prevent double key removal and unref"
-            }, 
-            "CVE-2022-47519": {
-                "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute"
-            }, 
-            "CVE-2022-47518": {
-                "cmt_msg": "wifi: wilc1000: validate number of channels"
-            }, 
-            "CVE-2023-32252": {
-                "cmt_msg": "ksmbd: fix racy issue from session setup and logoff"
-            }, 
-            "CVE-2023-2002": {
-                "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()"
-            }, 
-            "CVE-2023-3609": {
-                "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow"
+            "CVE-2023-3338": {
+                "cmt_msg": "Remove DECnet support from kernel"
             }
         }
     }, 
@@ -131985,6 +132603,9 @@
             "CVE-2022-3344": {
                 "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use"
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2023-31081": {
                 "cmt_msg": ""
             }, 
@@ -132009,6 +132630,12 @@
             "CVE-2023-4273": {
                 "cmt_msg": "exfat: check if filename entries exceeds max filename length"
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2023-31085": {
                 "cmt_msg": ""
             }, 
@@ -132078,6 +132705,9 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2023-26606": {
                 "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs"
             }, 
@@ -132186,8 +132816,8 @@
             "CVE-2023-3863": {
                 "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
             }, 
-            "CVE-2023-37454": {
-                "cmt_msg": ""
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
             }, 
             "CVE-2023-0590": {
                 "cmt_msg": "net: sched: fix race condition in qdisc_graft()"
@@ -132199,7 +132829,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2023-32258": {
                 "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel"
@@ -132351,6 +132981,9 @@
             "CVE-2022-4382": {
                 "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2022-48423": {
                 "cmt_msg": "fs/ntfs3: Validate resident attribute name"
             }, 
@@ -132382,7 +133015,7 @@
                 "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -132501,9 +133134,6 @@
             "CVE-2023-2860": {
                 "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data."
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-2163": {
                 "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
             }, 
@@ -132682,14 +133312,17 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-22997": {
                 "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -132781,10 +133414,10 @@
                 "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings"
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2023-21264": {
                 "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host"
@@ -132804,6 +133437,9 @@
             "CVE-2023-20941": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
+            }, 
             "CVE-2022-25265": {
                 "cmt_msg": ""
             }, 
@@ -132825,6 +133461,9 @@
             "CVE-2023-38409": {
                 "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-48502": {
                 "cmt_msg": "fs/ntfs3: Check fields while reading"
             }, 
@@ -132840,9 +133479,15 @@
             "CVE-2023-32252": {
                 "cmt_msg": "ksmbd: fix racy issue from session setup and logoff"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-2002": {
                 "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()"
             }, 
+            "CVE-2023-37454": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-3609": {
                 "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow"
             }
@@ -133543,7 +134188,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -133617,9 +134262,6 @@
             "CVE-2022-0185": {
                 "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -133990,7 +134632,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2020-36312": {
                 "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()"
@@ -134308,10 +134950,10 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-10781": {
                 "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\""
@@ -134379,6 +135021,9 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -134412,6 +135057,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -134523,9 +135171,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -134848,7 +135493,7 @@
                 "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2020-10708": {
                 "cmt_msg": ""
@@ -134883,9 +135528,18 @@
             "CVE-2020-29374": {
                 "cmt_msg": "gup: document and work around \"COW can break either way\" issue"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }, 
@@ -135379,7 +136033,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -135959,7 +136613,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -136021,9 +136675,6 @@
             "CVE-2023-2430": {
                 "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL"
             }, 
-            "CVE-2023-37453": {
-                "cmt_msg": ""
-            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -136334,7 +136985,7 @@
                 "cmt_msg": "staging: rtl8712: fix use after free bugs"
             }, 
             "CVE-2022-45919": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221"
             }, 
             "CVE-2020-36312": {
                 "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()"
@@ -136619,14 +137270,17 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2020-10781": {
                 "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\""
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -136669,6 +137323,9 @@
             "CVE-2020-15852": {
                 "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -136702,6 +137359,9 @@
             "CVE-2022-1652": {
                 "cmt_msg": "floppy: use a statically allocated error counter"
             }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2020-29568": {
                 "cmt_msg": "xen/xenbus: Allow watches discard events before queueing"
             }, 
@@ -136801,9 +137461,6 @@
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
-            "CVE-2023-3773": {
-                "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH"
-            }, 
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
@@ -137038,6 +137695,9 @@
             "CVE-2023-22995": {
                 "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core"
             }, 
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
+            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -137081,7 +137741,7 @@
                 "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg"
             }, 
             "CVE-2022-45887": {
-                "cmt_msg": ""
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()"
             }, 
             "CVE-2020-10708": {
                 "cmt_msg": ""
@@ -137110,9 +137770,15 @@
             "CVE-2020-27152": {
                 "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI"
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-3606": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -137576,7 +138242,7 @@
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
             "CVE-2022-45886": {
-                "cmt_msg": ""
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
@@ -137818,13 +138484,21 @@
             }
         }, 
         "6.3.7": {
+            "CVE-2022-45887": {
+                "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", 
+                "cmt_id": "dbef7d1ffea0ccc95446c5383e0be65babedf667"
+            }, 
+            "CVE-2022-45886": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", 
+                "cmt_id": "8bade849b15b3ecb62893f328b2cc4cdc65ac0c6"
+            }, 
             "CVE-2023-35788": {
                 "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", 
                 "cmt_id": "900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a"
             }, 
-            "CVE-2023-34255": {
-                "cmt_msg": "xfs: verify buffer contents when we skip log replay", 
-                "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a"
+            "CVE-2022-45919": {
+                "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", 
+                "cmt_id": "59918dd7a6d1ad098550ca6fcf154c1ae6842bc7"
             }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay", 
@@ -137837,6 +138511,10 @@
             "CVE-2023-21264": {
                 "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host", 
                 "cmt_id": "c3cd33abe63f0ea32c3966ae67a7efc48e86c3e0"
+            }, 
+            "CVE-2023-34255": {
+                "cmt_msg": "xfs: verify buffer contents when we skip log replay", 
+                "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a"
             }
         }, 
         "6.3.8": {
@@ -137907,6 +138585,9 @@
             "CVE-2020-26557": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4015": {
+                "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -137994,10 +138675,10 @@
             "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2961": {
-                "cmt_msg": ""
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration"
             }, 
-            "CVE-2022-45919": {
+            "CVE-2023-20941": {
                 "cmt_msg": ""
             }, 
             "CVE-2023-21400": {
@@ -138021,6 +138702,9 @@
             "CVE-2023-4155": {
                 "cmt_msg": "KVM: SEV: only access GHCB fields once"
             }, 
+            "CVE-2023-3777": {
+                "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush"
+            }, 
             "CVE-2023-3776": {
                 "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free"
             }, 
@@ -138033,6 +138717,12 @@
             "CVE-2023-3772": {
                 "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params"
             }, 
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
+            }, 
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve"
+            }, 
             "CVE-2022-3533": {
                 "cmt_msg": ""
             }, 
@@ -138079,7 +138769,7 @@
                 "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
             }, 
             "CVE-2023-31083": {
-                "cmt_msg": ""
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
             }, 
             "CVE-2023-31082": {
                 "cmt_msg": ""
@@ -138186,17 +138876,17 @@
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-45887": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-45886": {
-                "cmt_msg": ""
+            "CVE-2023-4563": {
+                "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk"
             }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4569": {
+                "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation"
+            }, 
             "CVE-2023-37453": {
-                "cmt_msg": ""
+                "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()"
             }, 
             "CVE-2018-12929": {
                 "cmt_msg": ""
@@ -138229,15 +138919,18 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-44033": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
             }, 
             "CVE-2022-44032": {
-                "cmt_msg": ""
+                "cmt_msg": "char: pcmcia: remove all the drivers"
+            }, 
+            "CVE-2023-4206": {
+                "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free"
             }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-20941": {
+            "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-25265": {
@@ -138249,9 +138942,15 @@
             "CVE-2023-23039": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-4208": {
+                "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-35001": {
                 "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval"
             }, 
+            "CVE-2023-4207": {
+                "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free"
+            }, 
             "CVE-2023-3640": {
                 "cmt_msg": ""
             }
diff --git a/data/stream_fixes.json b/data/stream_fixes.json
index f6c82ac..9452109 100644
--- a/data/stream_fixes.json
+++ b/data/stream_fixes.json
@@ -35973,6 +35973,92 @@
             "fixed_version": "6.0.11"
         }
     }, 
+    "CVE-2022-45886": {
+        "4.19": {
+            "cmt_id": "7bb9c6e05efcecb15b0354d574efbc36ca321d75", 
+            "fixed_version": "4.19.285"
+        }, 
+        "5.10": {
+            "cmt_id": "2ea7d26ed851db7176e4bfa8174c8a1380255bbe", 
+            "fixed_version": "5.10.183"
+        }, 
+        "5.15": {
+            "cmt_id": "50831747cb3a880dd4bdebe3fc3c81de9e21582d", 
+            "fixed_version": "5.15.116"
+        }, 
+        "5.4": {
+            "cmt_id": "ed47886a73dbc0477ae09a4a979e27317cf2b52d", 
+            "fixed_version": "5.4.246"
+        }, 
+        "6.1": {
+            "cmt_id": "93b5dfebcb1821dde466e29404fcf1fb919f4c72", 
+            "fixed_version": "6.1.33"
+        }, 
+        "6.3": {
+            "cmt_id": "8bade849b15b3ecb62893f328b2cc4cdc65ac0c6", 
+            "fixed_version": "6.3.7"
+        }
+    }, 
+    "CVE-2022-45887": {
+        "4.14": {
+            "cmt_id": "cf412b0543b77d01f74ae2303d7f8a97e6bff686", 
+            "fixed_version": "4.14.317"
+        }, 
+        "4.19": {
+            "cmt_id": "3e5af0745a4702ab0df2f880bfe0431eb30f9164", 
+            "fixed_version": "4.19.285"
+        }, 
+        "5.10": {
+            "cmt_id": "eb37fef417a246fe54530901a3ea9c0abc914fc2", 
+            "fixed_version": "5.10.183"
+        }, 
+        "5.15": {
+            "cmt_id": "d6c47b23599253d7d866e1e8d60cd410855c1be5", 
+            "fixed_version": "5.15.116"
+        }, 
+        "5.4": {
+            "cmt_id": "08b20cb8e5b9d69bb3b83c1ad30a702767a9f0ef", 
+            "fixed_version": "5.4.246"
+        }, 
+        "6.1": {
+            "cmt_id": "ea2938c27b0212aaab6702c16b7385e073b35643", 
+            "fixed_version": "6.1.33"
+        }, 
+        "6.3": {
+            "cmt_id": "dbef7d1ffea0ccc95446c5383e0be65babedf667", 
+            "fixed_version": "6.3.7"
+        }
+    }, 
+    "CVE-2022-45919": {
+        "4.14": {
+            "cmt_id": "66e262ad9b35615b2a1b1cad4751e93e1de90634", 
+            "fixed_version": "4.14.317"
+        }, 
+        "4.19": {
+            "cmt_id": "8624c7e048fa9ba584b7ba43715090ab1aed765c", 
+            "fixed_version": "4.19.285"
+        }, 
+        "5.10": {
+            "cmt_id": "76169f7490899d74aad4b0e2c4c1b9d4904dd01f", 
+            "fixed_version": "5.10.183"
+        }, 
+        "5.15": {
+            "cmt_id": "42624bc8c30c463a9155286bb716223ad04dd2a7", 
+            "fixed_version": "5.15.116"
+        }, 
+        "5.4": {
+            "cmt_id": "353fd22693a672efb337d399e610898c64f57b17", 
+            "fixed_version": "5.4.246"
+        }, 
+        "6.1": {
+            "cmt_id": "d5d61f747e3f1ff9042db66896f2f90afa5f3197", 
+            "fixed_version": "6.1.33"
+        }, 
+        "6.3": {
+            "cmt_id": "59918dd7a6d1ad098550ca6fcf154c1ae6842bc7", 
+            "fixed_version": "6.3.7"
+        }
+    }, 
     "CVE-2022-45934": {
         "4.14": {
             "cmt_id": "95f1847a361c7b4bf7d74c06ecb6968455082c1a", 
@@ -36680,6 +36766,10 @@
         }
     }, 
     "CVE-2023-1077": {
+        "4.19": {
+            "cmt_id": "84d90fb72a053c034b018fcc3cfaa6f606faf1c6", 
+            "fixed_version": "4.19.293"
+        }, 
         "5.10": {
             "cmt_id": "80a1751730b302d8ab63a084b2fa52c820ad0273", 
             "fixed_version": "5.10.173"
@@ -37971,6 +38061,12 @@
             "fixed_version": "6.1.9"
         }
     }, 
+    "CVE-2023-2430": {
+        "6.1": {
+            "cmt_id": "22a406b3629a10979916ea7cace47858410117b5", 
+            "fixed_version": "6.1.50"
+        }
+    }, 
     "CVE-2023-2483": {
         "4.14": {
             "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f", 
@@ -39528,6 +39624,26 @@
         }
     }, 
     "CVE-2023-3772": {
+        "4.14": {
+            "cmt_id": "ed1cba039309c80b49719fcff3e3d7cdddb73d96", 
+            "fixed_version": "4.14.324"
+        }, 
+        "4.19": {
+            "cmt_id": "44f69c96f8a147413c23c68cda4d6fb5e23137cd", 
+            "fixed_version": "4.19.293"
+        }, 
+        "5.10": {
+            "cmt_id": "bd30aa9c7febb6e709670cd5154194189ca3b7b5", 
+            "fixed_version": "5.10.192"
+        }, 
+        "5.15": {
+            "cmt_id": "075448a2eb753f813fe873cfa52853e9fef8eedb", 
+            "fixed_version": "5.15.128"
+        }, 
+        "5.4": {
+            "cmt_id": "8046beb890ebc83c5820188c650073e1c6066e67", 
+            "fixed_version": "5.4.255"
+        }, 
         "6.1": {
             "cmt_id": "87b655f4936b6fc01f3658aa88a22c923b379ebd", 
             "fixed_version": "6.1.47"
@@ -39577,6 +39693,24 @@
             "fixed_version": "6.4.5"
         }
     }, 
+    "CVE-2023-3777": {
+        "5.10": {
+            "cmt_id": "30e5460d69e631c0e84db37dba2d8f98648778d4", 
+            "fixed_version": "5.10.188"
+        }, 
+        "5.15": {
+            "cmt_id": "10013f764ad2957de08968bd02870b6b7683e3f6", 
+            "fixed_version": "5.15.123"
+        }, 
+        "6.1": {
+            "cmt_id": "e18922ce3e3169eb97838d1dcba2d679bcca446c", 
+            "fixed_version": "6.1.42"
+        }, 
+        "6.4": {
+            "cmt_id": "ab87c6b43822a56ae0aadc715364b5f8d4a96037", 
+            "fixed_version": "6.4.7"
+        }
+    }, 
     "CVE-2023-3812": {
         "4.19": {
             "cmt_id": "aa815bf32acf560dad63c3dc46bc7b98ca9a9672", 
@@ -39743,6 +39877,24 @@
             "fixed_version": "6.4.7"
         }
     }, 
+    "CVE-2023-4015": {
+        "5.10": {
+            "cmt_id": "ab5a97a94b57324df76d659686ac2d30494170e6", 
+            "fixed_version": "5.10.190"
+        }, 
+        "5.15": {
+            "cmt_id": "98bcfcaecc76c4be288278c213b47d36292f40fa", 
+            "fixed_version": "5.15.124"
+        }, 
+        "6.1": {
+            "cmt_id": "4237462a073e24f71c700f3e5929f07b6ee1bcaa", 
+            "fixed_version": "6.1.43"
+        }, 
+        "6.4": {
+            "cmt_id": "027d00132487bcf2a4ee7493bb8de9d6331d48e3", 
+            "fixed_version": "6.4.8"
+        }
+    }, 
     "CVE-2023-40283": {
         "4.14": {
             "cmt_id": "51822644a047eac2310fab0799b64e3430b5a111", 
@@ -39887,11 +40039,97 @@
             "fixed_version": "6.4.10"
         }
     }, 
+    "CVE-2023-4206": {
+        "4.14": {
+            "cmt_id": "226d84d54a9339b7045aff36c8f56d6ee9270476", 
+            "fixed_version": "4.14.322"
+        }, 
+        "4.19": {
+            "cmt_id": "ad8f36f96696a7f1d191da66637c415959bab6d8", 
+            "fixed_version": "4.19.291"
+        }, 
+        "5.10": {
+            "cmt_id": "aaa71c4e8ad98828ed50dde3eec8e0d545a117f7", 
+            "fixed_version": "5.10.190"
+        }, 
+        "5.15": {
+            "cmt_id": "79c3d81c9ad140957b081c91908d7e2964dc603f", 
+            "fixed_version": "5.15.126"
+        }, 
+        "5.4": {
+            "cmt_id": "1c8262f31fd2d23d1cfd2539715d976c2a99e582", 
+            "fixed_version": "5.4.253"
+        }, 
+        "6.1": {
+            "cmt_id": "d4d3b53a4c66004e8e864fea744b3a2b86a73b62", 
+            "fixed_version": "6.1.45"
+        }, 
+        "6.4": {
+            "cmt_id": "a836184b670f59e24d3a0f7c07115ec6e6ce6900", 
+            "fixed_version": "6.4.10"
+        }
+    }, 
+    "CVE-2023-4207": {
+        "5.10": {
+            "cmt_id": "a8d478200b104ff356f51e1f63499fe46ba8c9b8", 
+            "fixed_version": "5.10.190"
+        }, 
+        "5.15": {
+            "cmt_id": "9edf7955025a602ab6bcc94d923c436e160a10e3", 
+            "fixed_version": "5.15.126"
+        }, 
+        "5.4": {
+            "cmt_id": "83e3d4b0ae373dcba30c68bf28f8d179191a297a", 
+            "fixed_version": "5.4.253"
+        }, 
+        "6.1": {
+            "cmt_id": "7f691439b29be0aae68f83ad5eecfddc11007724", 
+            "fixed_version": "6.1.45"
+        }, 
+        "6.4": {
+            "cmt_id": "7d848d718aeb3b482e177b682dd04e76dd413afb", 
+            "fixed_version": "6.4.10"
+        }
+    }, 
+    "CVE-2023-4208": {
+        "4.14": {
+            "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079", 
+            "fixed_version": "4.14.322"
+        }, 
+        "4.19": {
+            "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243", 
+            "fixed_version": "4.19.291"
+        }, 
+        "5.10": {
+            "cmt_id": "b4256c99a7116c9514224847e8aaee2ecf110a0a", 
+            "fixed_version": "5.10.190"
+        }, 
+        "5.15": {
+            "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc", 
+            "fixed_version": "5.15.126"
+        }, 
+        "5.4": {
+            "cmt_id": "be785808db32b595728c4042d002c83d0dd4b66f", 
+            "fixed_version": "5.4.253"
+        }, 
+        "6.1": {
+            "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db", 
+            "fixed_version": "6.1.45"
+        }, 
+        "6.4": {
+            "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710", 
+            "fixed_version": "6.4.10"
+        }
+    }, 
     "CVE-2023-4273": {
         "5.10": {
             "cmt_id": "381f7df0f3c3bd7dceb3e2b2b64c2f6247e2ac19", 
             "fixed_version": "5.10.190"
         }, 
+        "5.15": {
+            "cmt_id": "6b64974e02ea82d0bae917f1fa79495a1a59b5bf", 
+            "fixed_version": "5.15.128"
+        }, 
         "6.1": {
             "cmt_id": "c2fdf827f8fc6a571e1b7cc38a61041f0321adf5", 
             "fixed_version": "6.1.45"
@@ -40022,5 +40260,31 @@
             "cmt_id": "dc64e8874e87dc1c1c723a1c6da7efc3305c18da", 
             "fixed_version": "5.4.196"
         }
+    }, 
+    "CVE-2023-4563": {
+        "6.4": {
+            "cmt_id": "bd156ce9553dcaf2d6ee2c825d1a5a1718e86524", 
+            "fixed_version": "6.4.11"
+        }
+    }, 
+    "CVE-2023-4569": {
+        "5.15": {
+            "cmt_id": "1adaec4758d1cefbf348a291ad9b752aaa10f8d3", 
+            "fixed_version": "5.15.128"
+        }, 
+        "6.1": {
+            "cmt_id": "00ea7eb1c69eec91cdf9259f0e427c56e7999fcd", 
+            "fixed_version": "6.1.47"
+        }, 
+        "6.4": {
+            "cmt_id": "83ff16e449a675e215125d97a2c4a7f097d291d0", 
+            "fixed_version": "6.4.12"
+        }
+    }, 
+    "CVE-2023-4611": {
+        "6.4": {
+            "cmt_id": "e872d6b6ea4947fb87f0d6ea1ef814019dbed89e", 
+            "fixed_version": "6.4.8"
+        }
     }
 }
\ No newline at end of file