Update 13Sep22

[ci skip]
diff --git a/CHANGES.md b/CHANGES.md
index aa2f153..0eebe8e 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1,26 +1,15 @@
 
 # **Linux Kernel CVE Changes**
 
-## Last Update - 09Sep22 15:34
+## Last Update - 13Sep22 15:29
 
 ### **New CVEs Added:**
 
-[CVE-2022-39842](cves/CVE-2022-39842)  
-[CVE-2022-40307](cves/CVE-2022-40307)  
-
-
-### **New Versions Checked:**
-
-[4.14.292](streams/4.14)  
-[4.19.257](streams/4.19)  
-[4.9.327](streams/4.9)  
-[5.10.142](streams/5.10)  
-[5.15.67](streams/5.15)  
-[5.19.8](streams/5.19)  
-[5.4.212](streams/5.4)  
+[CVE-2022-3077](cves/CVE-2022-3077)  
+[CVE-2022-3169](cves/CVE-2022-3169)  
+[CVE-2022-3170](cves/CVE-2022-3170)  
 
 
 ### **Updated CVEs:**
 
-[CVE-2022-2905](cves/CVE-2022-2905)  
-[CVE-2022-3028](cves/CVE-2022-3028)  
+[CVE-2022-40307](cves/CVE-2022-40307)  
diff --git a/data/3.12/3.12_CVEs.txt b/data/3.12/3.12_CVEs.txt
index 4da1028..d5fb175 100644
--- a/data/3.12/3.12_CVEs.txt
+++ b/data/3.12/3.12_CVEs.txt
@@ -1162,7 +1162,9 @@
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-33740: Fix not seen in stream
 CVE-2022-33741: Fix not seen in stream
diff --git a/data/3.12/3.12_security.txt b/data/3.12/3.12_security.txt
index 7c7675b..efb8b54 100644
--- a/data/3.12/3.12_security.txt
+++ b/data/3.12/3.12_security.txt
@@ -1300,7 +1300,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-33740: (unk) xen/netfront: fix leaking data in shared pages 
   CVE-2022-33741: (unk) xen/netfront: force data bouncing when backend is untrusted 
diff --git a/data/3.14/3.14_CVEs.txt b/data/3.14/3.14_CVEs.txt
index fac0ce6..87dcefe 100644
--- a/data/3.14/3.14_CVEs.txt
+++ b/data/3.14/3.14_CVEs.txt
@@ -1130,7 +1130,9 @@
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
 CVE-2022-33740: Fix not seen in stream
diff --git a/data/3.14/3.14_security.txt b/data/3.14/3.14_security.txt
index a386413..6ee5b2f 100644
--- a/data/3.14/3.14_security.txt
+++ b/data/3.14/3.14_security.txt
@@ -1264,7 +1264,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
   CVE-2022-33740: (unk) xen/netfront: fix leaking data in shared pages 
diff --git a/data/3.16/3.16_CVEs.txt b/data/3.16/3.16_CVEs.txt
index 8765766..2473999 100644
--- a/data/3.16/3.16_CVEs.txt
+++ b/data/3.16/3.16_CVEs.txt
@@ -1113,7 +1113,9 @@
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
 CVE-2022-33740: Fix not seen in stream
diff --git a/data/3.16/3.16_security.txt b/data/3.16/3.16_security.txt
index 3918439..e91d869 100644
--- a/data/3.16/3.16_security.txt
+++ b/data/3.16/3.16_security.txt
@@ -1219,7 +1219,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
   CVE-2022-33740: (unk) xen/netfront: fix leaking data in shared pages 
diff --git a/data/3.18/3.18_CVEs.txt b/data/3.18/3.18_CVEs.txt
index d8c7a83..d517d75 100644
--- a/data/3.18/3.18_CVEs.txt
+++ b/data/3.18/3.18_CVEs.txt
@@ -1098,7 +1098,9 @@
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
 CVE-2022-33740: Fix not seen in stream
diff --git a/data/3.18/3.18_security.txt b/data/3.18/3.18_security.txt
index fd7b6f4..351453b 100644
--- a/data/3.18/3.18_security.txt
+++ b/data/3.18/3.18_security.txt
@@ -1332,7 +1332,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
   CVE-2022-33740: (unk) xen/netfront: fix leaking data in shared pages 
diff --git a/data/3.2/3.2_CVEs.txt b/data/3.2/3.2_CVEs.txt
index fc61c2c..9d78ba9 100644
--- a/data/3.2/3.2_CVEs.txt
+++ b/data/3.2/3.2_CVEs.txt
@@ -1140,7 +1140,9 @@
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-33740: Fix not seen in stream
 CVE-2022-33741: Fix not seen in stream
diff --git a/data/3.2/3.2_security.txt b/data/3.2/3.2_security.txt
index e72b9a2..e105c48 100644
--- a/data/3.2/3.2_security.txt
+++ b/data/3.2/3.2_security.txt
@@ -1296,7 +1296,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-33740: (unk) xen/netfront: fix leaking data in shared pages 
   CVE-2022-33741: (unk) xen/netfront: force data bouncing when backend is untrusted 
diff --git a/data/4.1/4.1_CVEs.txt b/data/4.1/4.1_CVEs.txt
index dc5735f..7395cc7 100644
--- a/data/4.1/4.1_CVEs.txt
+++ b/data/4.1/4.1_CVEs.txt
@@ -1057,7 +1057,9 @@
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.1/4.1_security.txt b/data/4.1/4.1_security.txt
index 63aeebb..b80b090 100644
--- a/data/4.1/4.1_security.txt
+++ b/data/4.1/4.1_security.txt
@@ -1153,7 +1153,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.10/4.10_CVEs.txt b/data/4.10/4.10_CVEs.txt
index e5fb2d7..13c2be5 100644
--- a/data/4.10/4.10_CVEs.txt
+++ b/data/4.10/4.10_CVEs.txt
@@ -955,7 +955,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.10/4.10_security.txt b/data/4.10/4.10_security.txt
index d3ccc10..a6d062c 100644
--- a/data/4.10/4.10_security.txt
+++ b/data/4.10/4.10_security.txt
@@ -989,7 +989,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.11/4.11_CVEs.txt b/data/4.11/4.11_CVEs.txt
index 67c41ba..6adf818 100644
--- a/data/4.11/4.11_CVEs.txt
+++ b/data/4.11/4.11_CVEs.txt
@@ -927,7 +927,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.11/4.11_security.txt b/data/4.11/4.11_security.txt
index 6c01226..3696cf2 100644
--- a/data/4.11/4.11_security.txt
+++ b/data/4.11/4.11_security.txt
@@ -949,7 +949,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.12/4.12_CVEs.txt b/data/4.12/4.12_CVEs.txt
index b693ea7..5d8d727 100644
--- a/data/4.12/4.12_CVEs.txt
+++ b/data/4.12/4.12_CVEs.txt
@@ -909,7 +909,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.12/4.12_security.txt b/data/4.12/4.12_security.txt
index d0359f2..ff22354 100644
--- a/data/4.12/4.12_security.txt
+++ b/data/4.12/4.12_security.txt
@@ -935,7 +935,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.13/4.13_CVEs.txt b/data/4.13/4.13_CVEs.txt
index e0356a4..6bc3d44 100644
--- a/data/4.13/4.13_CVEs.txt
+++ b/data/4.13/4.13_CVEs.txt
@@ -892,7 +892,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.13/4.13_security.txt b/data/4.13/4.13_security.txt
index 7b175aa..4a93f5e 100644
--- a/data/4.13/4.13_security.txt
+++ b/data/4.13/4.13_security.txt
@@ -920,7 +920,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt
index 97efade..63d2aac 100644
--- a/data/4.14/4.14_CVEs.txt
+++ b/data/4.14/4.14_CVEs.txt
@@ -860,7 +860,9 @@
 CVE-2022-3028: Fixed with 4.14.292
 CVE-2022-30594: Fixed with 4.14.276
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 4.14.283
 CVE-2022-32296: Fixed with 4.14.285
 CVE-2022-32981: Fixed with 4.14.283
diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt
index ce954eb..d360119 100644
--- a/data/4.14/4.14_security.txt
+++ b/data/4.14/4.14_security.txt
@@ -1353,7 +1353,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-2991: (unk) remove the lightnvm subsystem 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-39189: (unk) KVM: x86: do not report a vCPU as preempted outside instruction boundaries 
diff --git a/data/4.15/4.15_CVEs.txt b/data/4.15/4.15_CVEs.txt
index cf713b9..f3f6ca4 100644
--- a/data/4.15/4.15_CVEs.txt
+++ b/data/4.15/4.15_CVEs.txt
@@ -810,7 +810,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.15/4.15_security.txt b/data/4.15/4.15_security.txt
index 8f6a293..b703dd4 100644
--- a/data/4.15/4.15_security.txt
+++ b/data/4.15/4.15_security.txt
@@ -842,7 +842,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.16/4.16_CVEs.txt b/data/4.16/4.16_CVEs.txt
index 0ae3260..d11ddf8 100644
--- a/data/4.16/4.16_CVEs.txt
+++ b/data/4.16/4.16_CVEs.txt
@@ -789,7 +789,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.16/4.16_security.txt b/data/4.16/4.16_security.txt
index cd50163..89f2252 100644
--- a/data/4.16/4.16_security.txt
+++ b/data/4.16/4.16_security.txt
@@ -821,7 +821,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.17/4.17_CVEs.txt b/data/4.17/4.17_CVEs.txt
index c250d51..29d0f40 100644
--- a/data/4.17/4.17_CVEs.txt
+++ b/data/4.17/4.17_CVEs.txt
@@ -769,7 +769,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.17/4.17_security.txt b/data/4.17/4.17_security.txt
index a9864c2..a7f1a01 100644
--- a/data/4.17/4.17_security.txt
+++ b/data/4.17/4.17_security.txt
@@ -801,7 +801,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.18/4.18_CVEs.txt b/data/4.18/4.18_CVEs.txt
index 63e6589..d485cba 100644
--- a/data/4.18/4.18_CVEs.txt
+++ b/data/4.18/4.18_CVEs.txt
@@ -747,7 +747,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.18/4.18_security.txt b/data/4.18/4.18_security.txt
index eb3bdf1..5b662ac 100644
--- a/data/4.18/4.18_security.txt
+++ b/data/4.18/4.18_security.txt
@@ -779,7 +779,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt
index 7d50e96..cef664f 100644
--- a/data/4.19/4.19_CVEs.txt
+++ b/data/4.19/4.19_CVEs.txt
@@ -722,7 +722,9 @@
 CVE-2022-3028: Fixed with 4.19.257
 CVE-2022-30594: Fixed with 4.19.238
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 4.19.247
 CVE-2022-32296: Fixed with 4.19.249
 CVE-2022-32981: Fixed with 4.19.247
diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt
index f5a263f..d7792cf 100644
--- a/data/4.19/4.19_security.txt
+++ b/data/4.19/4.19_security.txt
@@ -1143,7 +1143,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-2991: (unk) remove the lightnvm subsystem 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-39189: (unk) KVM: x86: do not report a vCPU as preempted outside instruction boundaries 
diff --git a/data/4.20/4.20_CVEs.txt b/data/4.20/4.20_CVEs.txt
index ff8a454..8e343d2 100644
--- a/data/4.20/4.20_CVEs.txt
+++ b/data/4.20/4.20_CVEs.txt
@@ -710,7 +710,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.20/4.20_security.txt b/data/4.20/4.20_security.txt
index 20391b3..66167a3 100644
--- a/data/4.20/4.20_security.txt
+++ b/data/4.20/4.20_security.txt
@@ -742,7 +742,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.3/4.3_CVEs.txt b/data/4.3/4.3_CVEs.txt
index 879b1eb..2432f4f 100644
--- a/data/4.3/4.3_CVEs.txt
+++ b/data/4.3/4.3_CVEs.txt
@@ -1054,7 +1054,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.3/4.3_security.txt b/data/4.3/4.3_security.txt
index 767c565..c35b91f 100644
--- a/data/4.3/4.3_security.txt
+++ b/data/4.3/4.3_security.txt
@@ -1070,7 +1070,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt
index c039da8..d648d22 100644
--- a/data/4.4/4.4_CVEs.txt
+++ b/data/4.4/4.4_CVEs.txt
@@ -1035,7 +1035,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt
index 1113480..8846997 100644
--- a/data/4.4/4.4_security.txt
+++ b/data/4.4/4.4_security.txt
@@ -1519,7 +1519,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.5/4.5_CVEs.txt b/data/4.5/4.5_CVEs.txt
index b0944a0..94c724e 100644
--- a/data/4.5/4.5_CVEs.txt
+++ b/data/4.5/4.5_CVEs.txt
@@ -1017,7 +1017,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.5/4.5_security.txt b/data/4.5/4.5_security.txt
index 182a5e9..e61dcfd 100644
--- a/data/4.5/4.5_security.txt
+++ b/data/4.5/4.5_security.txt
@@ -1033,7 +1033,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.6/4.6_CVEs.txt b/data/4.6/4.6_CVEs.txt
index 53b44ba..dbed391 100644
--- a/data/4.6/4.6_CVEs.txt
+++ b/data/4.6/4.6_CVEs.txt
@@ -989,7 +989,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.6/4.6_security.txt b/data/4.6/4.6_security.txt
index a74dc90..3c9c623 100644
--- a/data/4.6/4.6_security.txt
+++ b/data/4.6/4.6_security.txt
@@ -1007,7 +1007,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.7/4.7_CVEs.txt b/data/4.7/4.7_CVEs.txt
index e547050..1649ac6 100644
--- a/data/4.7/4.7_CVEs.txt
+++ b/data/4.7/4.7_CVEs.txt
@@ -971,7 +971,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.7/4.7_security.txt b/data/4.7/4.7_security.txt
index 330b569..4d985fe 100644
--- a/data/4.7/4.7_security.txt
+++ b/data/4.7/4.7_security.txt
@@ -991,7 +991,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.8/4.8_CVEs.txt b/data/4.8/4.8_CVEs.txt
index d7419cb..5151405 100644
--- a/data/4.8/4.8_CVEs.txt
+++ b/data/4.8/4.8_CVEs.txt
@@ -975,7 +975,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/4.8/4.8_security.txt b/data/4.8/4.8_security.txt
index 0d93bbc..05e8f79 100644
--- a/data/4.8/4.8_security.txt
+++ b/data/4.8/4.8_security.txt
@@ -1005,7 +1005,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt
index 5dc0ca6..5fadb44 100644
--- a/data/4.9/4.9_CVEs.txt
+++ b/data/4.9/4.9_CVEs.txt
@@ -974,7 +974,9 @@
 CVE-2022-3028: Fixed with 4.9.327
 CVE-2022-30594: Fixed with 4.9.311
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 4.9.318
 CVE-2022-32296: Fixed with 4.9.320
 CVE-2022-32981: Fixed with 4.9.318
diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt
index 12dfaef..e938679 100644
--- a/data/4.9/4.9_security.txt
+++ b/data/4.9/4.9_security.txt
@@ -1513,7 +1513,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-2991: (unk) remove the lightnvm subsystem 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-39189: (unk) KVM: x86: do not report a vCPU as preempted outside instruction boundaries 
diff --git a/data/5.0/5.0_CVEs.txt b/data/5.0/5.0_CVEs.txt
index 4a08a27..c5f2c38 100644
--- a/data/5.0/5.0_CVEs.txt
+++ b/data/5.0/5.0_CVEs.txt
@@ -689,7 +689,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.0/5.0_security.txt b/data/5.0/5.0_security.txt
index 20fd597..582967d 100644
--- a/data/5.0/5.0_security.txt
+++ b/data/5.0/5.0_security.txt
@@ -737,7 +737,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.1/5.1_CVEs.txt b/data/5.1/5.1_CVEs.txt
index 5cfc01b..ae79982 100644
--- a/data/5.1/5.1_CVEs.txt
+++ b/data/5.1/5.1_CVEs.txt
@@ -659,7 +659,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.1/5.1_security.txt b/data/5.1/5.1_security.txt
index b0bb678..e434291 100644
--- a/data/5.1/5.1_security.txt
+++ b/data/5.1/5.1_security.txt
@@ -695,7 +695,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt
index d9d4597..af3d08a 100644
--- a/data/5.10/5.10_CVEs.txt
+++ b/data/5.10/5.10_CVEs.txt
@@ -372,7 +372,9 @@
 CVE-2022-3028: Fixed with 5.10.140
 CVE-2022-30594: Fixed with 5.10.110
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fixed with 5.10.110
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 5.10.120
 CVE-2022-32296: Fixed with 5.10.125
 CVE-2022-32981: Fixed with 5.10.122
diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt
index 0c8b078..e4128c4 100644
--- a/data/5.10/5.10_security.txt
+++ b/data/5.10/5.10_security.txt
@@ -591,6 +591,8 @@
   CVE-2022-2978: (unk)  
   CVE-2022-2991: (unk) remove the lightnvm subsystem 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
+  CVE-2022-3169: (unk)  
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-39189: (unk) KVM: x86: do not report a vCPU as preempted outside instruction boundaries 
   CVE-2022-39842: (unk) video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write 
diff --git a/data/5.11/5.11_CVEs.txt b/data/5.11/5.11_CVEs.txt
index b600471..889fe68 100644
--- a/data/5.11/5.11_CVEs.txt
+++ b/data/5.11/5.11_CVEs.txt
@@ -362,7 +362,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.11/5.11_security.txt b/data/5.11/5.11_security.txt
index fe757bb..883b7cf 100644
--- a/data/5.11/5.11_security.txt
+++ b/data/5.11/5.11_security.txt
@@ -402,7 +402,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.12/5.12_CVEs.txt b/data/5.12/5.12_CVEs.txt
index 96aa372..815bf3d 100644
--- a/data/5.12/5.12_CVEs.txt
+++ b/data/5.12/5.12_CVEs.txt
@@ -316,7 +316,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.12/5.12_security.txt b/data/5.12/5.12_security.txt
index 0fefe85..b31c6db 100644
--- a/data/5.12/5.12_security.txt
+++ b/data/5.12/5.12_security.txt
@@ -348,7 +348,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.13/5.13_CVEs.txt b/data/5.13/5.13_CVEs.txt
index ce20794..097c5a6 100644
--- a/data/5.13/5.13_CVEs.txt
+++ b/data/5.13/5.13_CVEs.txt
@@ -280,7 +280,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.13/5.13_security.txt b/data/5.13/5.13_security.txt
index dffbd4d..8f2e37c 100644
--- a/data/5.13/5.13_security.txt
+++ b/data/5.13/5.13_security.txt
@@ -312,7 +312,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.14/5.14_CVEs.txt b/data/5.14/5.14_CVEs.txt
index 277b92e..487794d 100644
--- a/data/5.14/5.14_CVEs.txt
+++ b/data/5.14/5.14_CVEs.txt
@@ -253,7 +253,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.14/5.14_security.txt b/data/5.14/5.14_security.txt
index d040ee9..1ddfe11 100644
--- a/data/5.14/5.14_security.txt
+++ b/data/5.14/5.14_security.txt
@@ -287,7 +287,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt
index 6157244..91060d1 100644
--- a/data/5.15/5.15_CVEs.txt
+++ b/data/5.15/5.15_CVEs.txt
@@ -221,7 +221,9 @@
 CVE-2022-3028: Fixed with 5.15.64
 CVE-2022-30594: Fixed with 5.15.33
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fixed with 5.15.45
 CVE-2022-3078: Fixed with 5.15.33
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 5.15.45
 CVE-2022-32296: Fixed with 5.15.41
 CVE-2022-32981: Fixed with 5.15.47
diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt
index 1ec39b6..9a4e1d3 100644
--- a/data/5.15/5.15_security.txt
+++ b/data/5.15/5.15_security.txt
@@ -202,6 +202,7 @@
   CVE-2022-2503: 69712b170237ec5979f168149cd31e851a465853 dm verity: set DM_TARGET_IMMUTABLE feature flag
   CVE-2022-2873: 24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-2959: cf2fbc56c478a34a68ff1fa6ad08460054dfd499 pipe: Fix missing lock in pipe_resize_ring()
+  CVE-2022-3077: 24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-32250: f692bcffd1f2ce5488d24fbcb8eab5f351abf79d netfilter: nf_tables: disallow non-stateful expression in sets earlier
 
 CVEs fixed in 5.15.46:
@@ -337,6 +338,7 @@
   CVE-2022-2961: (unk)  
   CVE-2022-2978: (unk)  
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3169: (unk)  
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-39842: (unk) video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write 
   CVE-2022-40307: (unk) efi: capsule-loader: Fix use-after-free in efi_capsule_write 
diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt
index 68a8f93..4072f17 100644
--- a/data/5.16/5.16_CVEs.txt
+++ b/data/5.16/5.16_CVEs.txt
@@ -189,7 +189,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fixed with 5.16.19
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fixed with 5.16.19
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt
index e2b5e2d..8b9015a 100644
--- a/data/5.16/5.16_security.txt
+++ b/data/5.16/5.16_security.txt
@@ -226,6 +226,8 @@
   CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt
index 2fe1cf1..421deb2 100644
--- a/data/5.17/5.17_CVEs.txt
+++ b/data/5.17/5.17_CVEs.txt
@@ -135,7 +135,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fixed with 5.17.2
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fixed with 5.17.13
 CVE-2022-3078: Fixed with 5.17.2
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 5.17.13
 CVE-2022-32296: Fixed with 5.17.9
 CVE-2022-32981: Fixed with 5.17.15
diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt
index 02bde9a..9b923e9 100644
--- a/data/5.17/5.17_security.txt
+++ b/data/5.17/5.17_security.txt
@@ -70,6 +70,7 @@
   CVE-2022-2503: a40560bbf6228ecf754d45aa7b1c50b488fed519 dm verity: set DM_TARGET_IMMUTABLE feature flag
   CVE-2022-2873: fc2f9ee7568609adb68b1f55f0a4c182b09a47e7 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-2959: f0d6abaa98060c6892e42f44f61b1938d923ac6d pipe: Fix missing lock in pipe_resize_ring()
+  CVE-2022-3077: fc2f9ee7568609adb68b1f55f0a4c182b09a47e7 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-32250: d8db0465bcc4d4b54ecfb67b820ed26eb1440da7 netfilter: nf_tables: disallow non-stateful expression in sets earlier
 
 CVEs fixed in 5.17.14:
@@ -172,6 +173,7 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3169: (unk)  
   CVE-2022-33740: (unk) xen/netfront: fix leaking data in shared pages 
   CVE-2022-33741: (unk) xen/netfront: force data bouncing when backend is untrusted 
   CVE-2022-33742: (unk) xen/blkfront: force data bouncing when backend is untrusted 
diff --git a/data/5.18/5.18_CVEs.txt b/data/5.18/5.18_CVEs.txt
index 032bd88..71e21f3 100644
--- a/data/5.18/5.18_CVEs.txt
+++ b/data/5.18/5.18_CVEs.txt
@@ -98,6 +98,8 @@
 CVE-2022-29900: Fixed with 5.18.14
 CVE-2022-29901: Fixed with 5.18.14
 CVE-2022-3028: Fix not seen in stream
+CVE-2022-3077: Fixed with 5.18.2
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 5.18.2
 CVE-2022-32981: Fixed with 5.18.4
 CVE-2022-33740: Fixed with 5.18.10
diff --git a/data/5.18/5.18_security.txt b/data/5.18/5.18_security.txt
index 310c843..53ef28b 100644
--- a/data/5.18/5.18_security.txt
+++ b/data/5.18/5.18_security.txt
@@ -14,6 +14,7 @@
   CVE-2022-2503: 417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9 dm verity: set DM_TARGET_IMMUTABLE feature flag
   CVE-2022-2873: 2a81133304e8c10e6afa03e59f1b11beaccc7153 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-2959: 71c603806614c6715165eed06099e24c2e41ad58 pipe: Fix missing lock in pipe_resize_ring()
+  CVE-2022-3077: 2a81133304e8c10e6afa03e59f1b11beaccc7153 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-32250: 8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0 netfilter: nf_tables: disallow non-stateful expression in sets earlier
 
 CVEs fixed in 5.18.3:
@@ -144,6 +145,7 @@
   CVE-2022-2961: (unk)  
   CVE-2022-2978: (unk)  
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
+  CVE-2022-3169: (unk)  
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-39190: (unk) netfilter: nf_tables: disallow binding to already bound chain 
   CVE-2022-39842: (unk) video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write 
diff --git a/data/5.2/5.2_CVEs.txt b/data/5.2/5.2_CVEs.txt
index 196ab51..fddde20 100644
--- a/data/5.2/5.2_CVEs.txt
+++ b/data/5.2/5.2_CVEs.txt
@@ -620,7 +620,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.2/5.2_security.txt b/data/5.2/5.2_security.txt
index 3ff94eb..411bc2d 100644
--- a/data/5.2/5.2_security.txt
+++ b/data/5.2/5.2_security.txt
@@ -658,7 +658,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.3/5.3_CVEs.txt b/data/5.3/5.3_CVEs.txt
index 799ff6f..775ab8f 100644
--- a/data/5.3/5.3_CVEs.txt
+++ b/data/5.3/5.3_CVEs.txt
@@ -592,7 +592,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.3/5.3_security.txt b/data/5.3/5.3_security.txt
index 6a5bc84..bf761c1 100644
--- a/data/5.3/5.3_security.txt
+++ b/data/5.3/5.3_security.txt
@@ -628,7 +628,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt
index eaab88d..fac53ee 100644
--- a/data/5.4/5.4_CVEs.txt
+++ b/data/5.4/5.4_CVEs.txt
@@ -520,7 +520,9 @@
 CVE-2022-3028: Fixed with 5.4.212
 CVE-2022-30594: Fixed with 5.4.189
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fixed with 5.4.198
 CVE-2022-32296: Fixed with 5.4.201
 CVE-2022-32981: Fixed with 5.4.198
diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt
index fa69cfb..b6ccdee 100644
--- a/data/5.4/5.4_security.txt
+++ b/data/5.4/5.4_security.txt
@@ -853,7 +853,9 @@
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-2991: (unk) remove the lightnvm subsystem 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
   CVE-2022-39188: (unk) mmu_gather: Force tlb-flush VM_PFNMAP vmas 
   CVE-2022-39189: (unk) KVM: x86: do not report a vCPU as preempted outside instruction boundaries 
diff --git a/data/5.5/5.5_CVEs.txt b/data/5.5/5.5_CVEs.txt
index 81a36bd..c3dd048 100644
--- a/data/5.5/5.5_CVEs.txt
+++ b/data/5.5/5.5_CVEs.txt
@@ -480,7 +480,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.5/5.5_security.txt b/data/5.5/5.5_security.txt
index ab5e59a..50832a7 100644
--- a/data/5.5/5.5_security.txt
+++ b/data/5.5/5.5_security.txt
@@ -514,7 +514,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.6/5.6_CVEs.txt b/data/5.6/5.6_CVEs.txt
index 418108e..b3e1a1f 100644
--- a/data/5.6/5.6_CVEs.txt
+++ b/data/5.6/5.6_CVEs.txt
@@ -455,7 +455,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.6/5.6_security.txt b/data/5.6/5.6_security.txt
index 8ecd19f..0822b85 100644
--- a/data/5.6/5.6_security.txt
+++ b/data/5.6/5.6_security.txt
@@ -489,7 +489,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.7/5.7_CVEs.txt b/data/5.7/5.7_CVEs.txt
index 3c83953..bac7fa5 100644
--- a/data/5.7/5.7_CVEs.txt
+++ b/data/5.7/5.7_CVEs.txt
@@ -443,7 +443,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.7/5.7_security.txt b/data/5.7/5.7_security.txt
index dc13952..8df7b73 100644
--- a/data/5.7/5.7_security.txt
+++ b/data/5.7/5.7_security.txt
@@ -477,7 +477,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.8/5.8_CVEs.txt b/data/5.8/5.8_CVEs.txt
index 062846e..22345bd 100644
--- a/data/5.8/5.8_CVEs.txt
+++ b/data/5.8/5.8_CVEs.txt
@@ -425,7 +425,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.8/5.8_security.txt b/data/5.8/5.8_security.txt
index 94cf191..ca42ef1 100644
--- a/data/5.8/5.8_security.txt
+++ b/data/5.8/5.8_security.txt
@@ -459,7 +459,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/5.9/5.9_CVEs.txt b/data/5.9/5.9_CVEs.txt
index 839a814..0eda527 100644
--- a/data/5.9/5.9_CVEs.txt
+++ b/data/5.9/5.9_CVEs.txt
@@ -396,7 +396,9 @@
 CVE-2022-3028: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
 CVE-2022-3061: Fix not seen in stream
+CVE-2022-3077: Fix not seen in stream
 CVE-2022-3078: Fix not seen in stream
+CVE-2022-3169: Fix unknown
 CVE-2022-32250: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
 CVE-2022-32981: Fix not seen in stream
diff --git a/data/5.9/5.9_security.txt b/data/5.9/5.9_security.txt
index 6c78d65..acd1d19 100644
--- a/data/5.9/5.9_security.txt
+++ b/data/5.9/5.9_security.txt
@@ -426,7 +426,9 @@
   CVE-2022-3028: (unk) af_key: Do not call xfrm_probe_algs in parallel 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
   CVE-2022-3061: (unk) video: fbdev: i740fb: Error out if 'pixclock' equals zero 
+  CVE-2022-3077: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-3078: (unk) media: vidtv: Check for null return of vzalloc 
+  CVE-2022-3169: (unk)  
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
   CVE-2022-32981: (unk) powerpc/32: Fix overread/overwrite of thread_struct via ptrace 
diff --git a/data/CVEs.txt b/data/CVEs.txt
index 97d1d6d..b8a95b7 100644
--- a/data/CVEs.txt
+++ b/data/CVEs.txt
@@ -2111,7 +2111,10 @@
 CVE-2022-3028: (n/a) - ba953a9d89a00c078b85f4b190bc1dde66fe16b5 (unk to v6.0-rc3)
 CVE-2022-30594: 13c4a90119d28cfcb6b5bdd820c233b86c2b0237 - ee1fee900537b5d9560e9f937402de5ddc8412f3 (v4.3-rc1 to v5.18-rc1)
 CVE-2022-3061: (n/a) - 15cf0b82271b1823fb02ab8c377badba614d95d5 (unk to v5.18-rc5)
+CVE-2022-3077: (n/a) - 690b2549b19563ec5ad53e5c82f6a944d910086e (unk to v5.19-rc1)
 CVE-2022-3078: (n/a) - e6a21a14106d9718aa4f8e115b1e474888eeba44 (unk to v5.18-rc1)
+CVE-2022-3169: (n/a) - (n/a) (unk to unk)
+CVE-2022-3170: c27e1efb61c545f36c450ef60862df9251d239a4 - 6ab55ec0a938c7f943a4edba3d6514f775983887 (v6.0-rc1 to v6.0-rc4)
 CVE-2022-32250: 0b2d8a7b638b5034d2d68f6add8af94daaa1d4cd - 520778042ccca019f3ffa136dd0ca565c486cedd (v4.1-rc1 to v5.19-rc1)
 CVE-2022-32296: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5 (v2.6.12-rc2 to v5.18-rc6)
 CVE-2022-32981: 87fec0514f613f8ac43c01b0bc0bc7072c5d10ae - 8e1278444446fc97778a5e5c99bca1ce0bbc5ec9 (v3.13-rc1 to v5.19-rc2)
@@ -2131,4 +2134,4 @@
 CVE-2022-39189: (n/a) - 6cd88243c7e03845a450795e134b488fc2afb736 (unk to v5.19-rc2)
 CVE-2022-39190: (n/a) - e02f0d3970404bfea385b6edb86f2d936db0ea2b (unk to v6.0-rc3)
 CVE-2022-39842: (n/a) - a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7 (unk to v5.19-rc4)
-CVE-2022-40307: (n/a) - 9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95 (unk to unk)
+CVE-2022-40307: (n/a) - 9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95 (unk to v6.0-rc5)
diff --git a/data/cmts.json b/data/cmts.json
index a07534f..d9f0d03 100644
--- a/data/cmts.json
+++ b/data/cmts.json
@@ -1199,6 +1199,7 @@
     "6a53b7593233ab9e4f96873ebacc0f653a55c3e1": "v4.15-rc6", 
     "6a7228d90d42bcacfe38786756ba62762b91c20a": "v4.17-rc3", 
     "6a76f8c0ab19f215af2a3442870eeb5f0e81998d": "v3.9-rc7", 
+    "6ab55ec0a938c7f943a4edba3d6514f775983887": "v6.0-rc4", 
     "6ac93117ab009d3901ed5d3d0f79056eb5fc0afd": "v4.11-rc1", 
     "6acb47d1a318e5b3b7115354ebc4ea060c59d3a1": "v4.20-rc1", 
     "6aeb75e6adfaed16e58780309613a578fe1ee90b": "v4.12-rc2", 
@@ -1754,6 +1755,7 @@
     "9c6ba456711687b794dcf285856fc14e2c76074f": "v4.6-rc1", 
     "9c824b6a172c8d44a6b037946bae90127c969b1b": "v3.18-rc1", 
     "9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7": "v5.19-rc1", 
+    "9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95": "v6.0-rc5", 
     "9cbee358687edf0359e29ac683ec25835134f059": "v3.5-rc1", 
     "9cc02ede696272c5271a401e4f27c262359bc2f6": "v5.19-rc5", 
     "9d2231c5d74e13b2a0546fee6737ee4446017903": "v5.17-rc6", 
@@ -2185,6 +2187,7 @@
     "c278c253f3d992c6994d08aa0efb2b6806ca396f": "v4.5-rc6", 
     "c27927e372f0785f3303e8fad94b85945e2c97b7": "v4.13-rc5", 
     "c27a3e4d667fdcad3db7b104f75659478e0c68d8": "v3.17-rc5", 
+    "c27e1efb61c545f36c450ef60862df9251d239a4": "v6.0-rc1", 
     "c27eac48160de72dee33d42b5a33cc7b8a2eb1f5": "v4.17-rc1", 
     "c290f8358acaeffd8e0c551ddcc24d1206143376": "v3.2-rc1", 
     "c2955f270a84762343000f103e0640d29c7a96f3": "v5.4-rc8", 
diff --git a/data/kernel_cves.json b/data/kernel_cves.json
index 8613ac3..e475f5a 100644
--- a/data/kernel_cves.json
+++ b/data/kernel_cves.json
@@ -73117,6 +73117,14 @@
         "fixes": "15cf0b82271b1823fb02ab8c377badba614d95d5", 
         "last_modified": "2022-09-02"
     }, 
+    "CVE-2022-3077": {
+        "affected_versions": "unk to v5.19-rc1", 
+        "breaks": "", 
+        "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+        "fixes": "690b2549b19563ec5ad53e5c82f6a944d910086e", 
+        "last_affected_version": "5.18.1", 
+        "last_modified": "2022-09-13"
+    }, 
     "CVE-2022-3078": {
         "affected_versions": "unk to v5.18-rc1", 
         "breaks": "", 
@@ -73125,6 +73133,18 @@
         "last_affected_version": "5.17.1", 
         "last_modified": "2022-09-02"
     }, 
+    "CVE-2022-3169": {
+        "affected_versions": "unk to unk", 
+        "breaks": "", 
+        "fixes": "", 
+        "last_modified": "2022-09-13"
+    }, 
+    "CVE-2022-3170": {
+        "affected_versions": "v6.0-rc1 to v6.0-rc4", 
+        "breaks": "c27e1efb61c545f36c450ef60862df9251d239a4", 
+        "fixes": "6ab55ec0a938c7f943a4edba3d6514f775983887", 
+        "last_modified": "2022-09-13"
+    }, 
     "CVE-2022-32250": {
         "affected_versions": "v4.1-rc1 to v5.19-rc1", 
         "breaks": "0b2d8a7b638b5034d2d68f6add8af94daaa1d4cd", 
@@ -73660,10 +73680,10 @@
         "last_modified": "2022-09-09"
     }, 
     "CVE-2022-40307": {
-        "affected_versions": "unk to unk", 
+        "affected_versions": "unk to v6.0-rc5", 
         "breaks": "", 
         "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", 
         "fixes": "9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95", 
-        "last_modified": "2022-09-09"
+        "last_modified": "2022-09-13"
     }
 }
\ No newline at end of file
diff --git a/data/stream_data.json b/data/stream_data.json
index 2b50c6a..cae8879 100644
--- a/data/stream_data.json
+++ b/data/stream_data.json
@@ -3341,6 +3341,9 @@
             "CVE-2017-5967": {
                 "cmt_msg": "time: Remove CONFIG_TIMER_STATS"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -3659,6 +3662,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -6140,6 +6146,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -6578,6 +6587,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -9045,6 +9057,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -9444,6 +9459,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -11851,6 +11869,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -12268,6 +12289,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -14490,6 +14514,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -14862,6 +14889,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -18774,6 +18804,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-9986": {
                 "cmt_msg": "sound: Retire OSS"
             }, 
@@ -18963,6 +18996,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -20813,6 +20849,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -21155,6 +21194,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -23276,6 +23318,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -23642,6 +23687,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -26990,6 +27038,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-20177": {
                 "cmt_msg": "netfilter: add and use nf_hook_slow_list()"
             }, 
@@ -27146,6 +27197,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -28932,6 +28986,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -29259,6 +29316,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -32820,6 +32880,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -33171,6 +33234,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2018-10879": {
                 "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors"
             }, 
@@ -36532,6 +36598,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -36976,6 +37045,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -41069,6 +41141,9 @@
             "CVE-2017-5967": {
                 "cmt_msg": "time: Remove CONFIG_TIMER_STATS"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -41273,6 +41348,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-15116": {
                 "cmt_msg": "crypto: rng - Remove old low-level rng interface"
             }, 
@@ -45054,6 +45132,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -45327,6 +45408,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2018-10879": {
                 "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors"
             }, 
@@ -47951,6 +48035,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -48410,6 +48497,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2016-5412": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures"
             }, 
@@ -52954,6 +53044,9 @@
             "CVE-2020-12363": {
                 "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-33655": {
                 "cmt_msg": "fbcon: Disallow setting font bigger than screen size"
             }, 
@@ -53098,6 +53191,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -55384,6 +55480,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -55849,6 +55948,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -58464,6 +58566,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -58929,6 +59034,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2016-5412": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures"
             }, 
@@ -62253,6 +62361,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -62604,6 +62715,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -64145,6 +64259,9 @@
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -64334,6 +64451,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
@@ -66922,6 +67042,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2054": {
                 "cmt_msg": "arm/ptrace: run seccomp after ptrace"
             }, 
@@ -67399,6 +67522,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2016-5412": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures"
             }, 
@@ -68893,6 +69019,9 @@
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -69211,6 +69340,9 @@
             "CVE-2020-12888": {
                 "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-36946": {
                 "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
             }, 
@@ -70319,6 +70451,9 @@
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -70631,6 +70766,9 @@
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-36946": {
                 "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
             }, 
@@ -71660,6 +71798,9 @@
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -71948,6 +72089,9 @@
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-36946": {
                 "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
             }, 
@@ -76031,6 +76175,9 @@
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -76220,6 +76367,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -78897,6 +79047,9 @@
             "CVE-2019-15807": {
                 "cmt_msg": "scsi: libsas: delete sas port if expander discover failed"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-16913": {
                 "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input"
             }, 
@@ -78954,6 +79107,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -81459,6 +81615,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -81882,6 +82041,9 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -83936,6 +84098,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -84197,6 +84362,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -86067,6 +86235,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -86325,6 +86496,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -88127,6 +88301,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -88370,6 +88547,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -89454,6 +89634,9 @@
             "CVE-2021-39633": {
                 "cmt_msg": "ip_gre: add validation for csum_start"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-33655": {
                 "cmt_msg": "fbcon: Disallow setting font bigger than screen size"
             }, 
@@ -89610,6 +89793,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -90467,6 +90653,9 @@
             "CVE-2022-0185": {
                 "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-33655": {
                 "cmt_msg": "fbcon: Disallow setting font bigger than screen size"
             }, 
@@ -90608,6 +90797,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -92245,6 +92437,9 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -92368,6 +92563,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -93325,6 +93523,9 @@
             "CVE-2021-39633": {
                 "cmt_msg": "ip_gre: add validation for csum_start"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-33655": {
                 "cmt_msg": "fbcon: Disallow setting font bigger than screen size"
             }, 
@@ -93499,6 +93700,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -94171,6 +94375,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
@@ -94363,6 +94570,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -94625,6 +94835,10 @@
                 "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()", 
                 "cmt_id": "f0d6abaa98060c6892e42f44f61b1938d923ac6d"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+                "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7"
+            }, 
             "CVE-2022-32250": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
                 "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7"
@@ -94941,6 +95155,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -95421,6 +95638,9 @@
             "CVE-2022-28893": {
                 "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
@@ -95760,6 +95980,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -96472,6 +96695,10 @@
                 "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()", 
                 "cmt_id": "cf2fbc56c478a34a68ff1fa6ad08460054dfd499"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+                "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1"
+            }, 
             "CVE-2022-32250": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
                 "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d"
@@ -96702,6 +96929,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -98512,6 +98742,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -98785,6 +99018,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -101300,6 +101536,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-20177": {
                 "cmt_msg": "netfilter: add and use nf_hook_slow_list()"
             }, 
@@ -101450,6 +101689,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -101539,6 +101781,10 @@
                 "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()", 
                 "cmt_id": "71c603806614c6715165eed06099e24c2e41ad58"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+                "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153"
+            }, 
             "CVE-2022-32250": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
                 "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0"
@@ -101762,6 +102008,9 @@
             "CVE-2021-39800": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
@@ -103409,6 +103658,9 @@
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -103631,6 +103883,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-1280": {
                 "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
             }, 
@@ -104958,6 +105213,9 @@
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
@@ -105144,6 +105402,9 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3077": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
diff --git a/data/stream_fixes.json b/data/stream_fixes.json
index 316193c..795a122 100644
--- a/data/stream_fixes.json
+++ b/data/stream_fixes.json
@@ -33163,6 +33163,20 @@
             "fixed_version": "5.4.189"
         }
     }, 
+    "CVE-2022-3077": {
+        "5.15": {
+            "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1", 
+            "fixed_version": "5.15.45"
+        }, 
+        "5.17": {
+            "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7", 
+            "fixed_version": "5.17.13"
+        }, 
+        "5.18": {
+            "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153", 
+            "fixed_version": "5.18.2"
+        }
+    }, 
     "CVE-2022-3078": {
         "5.10": {
             "cmt_id": "663e7a72871f89f7a10cc8d7b2f17f27c64e071d",