Update 8Nov23

[ci skip]
diff --git a/CHANGES.md b/CHANGES.md
index 58766e7..1adc369 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1,37 +1,137 @@
 
 # **Linux Kernel CVE Changes**
 
-## Last Update - 31Oct23 02:36
+## Last Update - 08Nov23 13:05
 
 ### **New CVEs Added:**
 
-[CVE-2023-46813](cves/CVE-2023-46813)  
-[CVE-2023-46862](cves/CVE-2023-46862)  
-[CVE-2023-5090](cves/CVE-2023-5090)  
-[CVE-2023-5178](cves/CVE-2023-5178)  
-[CVE-2023-5633](cves/CVE-2023-5633)  
-[CVE-2023-5717](cves/CVE-2023-5717)  
+[CVE-2023-47233](cves/CVE-2023-47233)  
 
 
 ### **New Versions Checked:**
 
-[4.14.328](streams/4.14)  
-[4.19.297](streams/4.19)  
-[5.10.199](streams/5.10)  
-[5.15.137](streams/5.15)  
-[5.4.259](streams/5.4)  
-[6.1.60](streams/6.1)  
+[4.14.329](streams/4.14)  
+[4.19.298](streams/4.19)  
+[5.4.260](streams/5.4)  
+[6.1.61](streams/6.1)  
+[6.5.10](streams/6.5)  
+[6.6.1](streams/6.6)  
 
 
 ### **Updated CVEs:**
 
-[CVE-2017-1000405](cves/CVE-2017-1000405)  
-[CVE-2022-3629](cves/CVE-2022-3629)  
-[CVE-2023-1193](cves/CVE-2023-1193)  
+[CVE-2021-44879](cves/CVE-2021-44879)  
+[CVE-2023-25775](cves/CVE-2023-25775)  
+[CVE-2023-31085](cves/CVE-2023-31085)  
 [CVE-2023-34324](cves/CVE-2023-34324)  
+[CVE-2023-3567](cves/CVE-2023-3567)  
 [CVE-2023-35827](cves/CVE-2023-35827)  
+[CVE-2023-37453](cves/CVE-2023-37453)  
 [CVE-2023-39189](cves/CVE-2023-39189)  
+[CVE-2023-39191](cves/CVE-2023-39191)  
+[CVE-2023-39192](cves/CVE-2023-39192)  
+[CVE-2023-39193](cves/CVE-2023-39193)  
+[CVE-2023-40791](cves/CVE-2023-40791)  
+[CVE-2023-42752](cves/CVE-2023-42752)  
+[CVE-2023-42753](cves/CVE-2023-42753)  
+[CVE-2023-42754](cves/CVE-2023-42754)  
+[CVE-2023-42756](cves/CVE-2023-42756)  
+[CVE-2023-45862](cves/CVE-2023-45862)  
+[CVE-2023-45863](cves/CVE-2023-45863)  
+[CVE-2023-45871](cves/CVE-2023-45871)  
 [CVE-2023-45898](cves/CVE-2023-45898)  
-[CVE-2023-4610](cves/CVE-2023-4610)  
-[CVE-2023-4732](cves/CVE-2023-4732)  
+[CVE-2023-4623](cves/CVE-2023-4623)  
+[CVE-2023-46813](cves/CVE-2023-46813)  
+[CVE-2023-46862](cves/CVE-2023-46862)  
+[CVE-2023-4881](cves/CVE-2023-4881)  
+[CVE-2023-4921](cves/CVE-2023-4921)  
+[CVE-2023-5090](cves/CVE-2023-5090)  
 [CVE-2023-5158](cves/CVE-2023-5158)  
+[CVE-2023-5178](cves/CVE-2023-5178)  
+[CVE-2023-5197](cves/CVE-2023-5197)  
+[CVE-2023-5345](cves/CVE-2023-5345)  
+[CVE-2023-5633](cves/CVE-2023-5633)  
+[CVE-2023-5717](cves/CVE-2023-5717)  
+[CVE-2015-2877](cves/CVE-2015-2877)  
+[CVE-2015-5257](cves/CVE-2015-5257)  
+[CVE-2015-8709](cves/CVE-2015-8709)  
+[CVE-2016-10723](cves/CVE-2016-10723)  
+[CVE-2017-0605](cves/CVE-2017-0605)  
+[CVE-2017-1000](cves/CVE-2017-1000)  
+[CVE-2018-1000204](cves/CVE-2018-1000204)  
+[CVE-2018-10021](cves/CVE-2018-10021)  
+[CVE-2018-7995](cves/CVE-2018-7995)  
+[CVE-2019-10124](cves/CVE-2019-10124)  
+[CVE-2019-11191](cves/CVE-2019-11191)  
+[CVE-2019-12378](cves/CVE-2019-12378)  
+[CVE-2019-12379](cves/CVE-2019-12379)  
+[CVE-2019-12381](cves/CVE-2019-12381)  
+[CVE-2019-12382](cves/CVE-2019-12382)  
+[CVE-2019-12454](cves/CVE-2019-12454)  
+[CVE-2019-12455](cves/CVE-2019-12455)  
+[CVE-2019-12456](cves/CVE-2019-12456)  
+[CVE-2019-15290](cves/CVE-2019-15290)  
+[CVE-2019-16229](cves/CVE-2019-16229)  
+[CVE-2019-16230](cves/CVE-2019-16230)  
+[CVE-2019-19039](cves/CVE-2019-19039)  
+[CVE-2019-19046](cves/CVE-2019-19046)  
+[CVE-2019-19049](cves/CVE-2019-19049)  
+[CVE-2019-19055](cves/CVE-2019-19055)  
+[CVE-2019-19064](cves/CVE-2019-19064)  
+[CVE-2019-19065](cves/CVE-2019-19065)  
+[CVE-2019-19067](cves/CVE-2019-19067)  
+[CVE-2019-19070](cves/CVE-2019-19070)  
+[CVE-2019-19076](cves/CVE-2019-19076)  
+[CVE-2019-19770](cves/CVE-2019-19770)  
+[CVE-2019-3892](cves/CVE-2019-3892)  
+[CVE-2019-9457](cves/CVE-2019-9457)  
+[CVE-2019-9466](cves/CVE-2019-9466)  
+[CVE-2020-0255](cves/CVE-2020-0255)  
+[CVE-2020-0435](cves/CVE-2020-0435)  
+[CVE-2020-10708](cves/CVE-2020-10708)  
+[CVE-2020-11565](cves/CVE-2020-11565)  
+[CVE-2020-11725](cves/CVE-2020-11725)  
+[CVE-2020-12656](cves/CVE-2020-12656)  
+[CVE-2020-12768](cves/CVE-2020-12768)  
+[CVE-2020-14353](cves/CVE-2020-14353)  
+[CVE-2021-3178](cves/CVE-2021-3178)  
+[CVE-2021-3542](cves/CVE-2021-3542)  
+[CVE-2021-3587](cves/CVE-2021-3587)  
+[CVE-2021-38160](cves/CVE-2021-38160)  
+[CVE-2021-3892](cves/CVE-2021-3892)  
+[CVE-2021-3894](cves/CVE-2021-3894)  
+[CVE-2021-3896](cves/CVE-2021-3896)  
+[CVE-2022-0644](cves/CVE-2022-0644)  
+[CVE-2022-1836](cves/CVE-2022-1836)  
+[CVE-2022-1966](cves/CVE-2022-1966)  
+[CVE-2022-1972](cves/CVE-2022-1972)  
+[CVE-2022-20424](cves/CVE-2022-20424)  
+[CVE-2022-2209](cves/CVE-2022-2209)  
+[CVE-2022-23816](cves/CVE-2022-23816)  
+[CVE-2022-27672](cves/CVE-2022-27672)  
+[CVE-2022-3522](cves/CVE-2022-3522)  
+[CVE-2022-3531](cves/CVE-2022-3531)  
+[CVE-2022-3532](cves/CVE-2022-3532)  
+[CVE-2022-3535](cves/CVE-2022-3535)  
+[CVE-2022-3542](cves/CVE-2022-3542)  
+[CVE-2022-3642](cves/CVE-2022-3642)  
+[CVE-2022-3910](cves/CVE-2022-3910)  
+[CVE-2022-39842](cves/CVE-2022-39842)  
+[CVE-2022-42895](cves/CVE-2022-42895)  
+[CVE-2022-42896](cves/CVE-2022-42896)  
+[CVE-2022-4696](cves/CVE-2022-4696)  
+[CVE-2023-0047](cves/CVE-2023-0047)  
+[CVE-2023-0240](cves/CVE-2023-0240)  
+[CVE-2023-1192](cves/CVE-2023-1192)  
+[CVE-2023-1193](cves/CVE-2023-1193)  
+[CVE-2023-1194](cves/CVE-2023-1194)  
+[CVE-2023-2248](cves/CVE-2023-2248)  
+[CVE-2023-23005](cves/CVE-2023-23005)  
+[CVE-2023-23586](cves/CVE-2023-23586)  
+[CVE-2023-2483](cves/CVE-2023-2483)  
+[CVE-2023-3117](cves/CVE-2023-3117)  
+[CVE-2023-3397](cves/CVE-2023-3397)  
+[CVE-2023-34255](cves/CVE-2023-34255)  
+[CVE-2023-34256](cves/CVE-2023-34256)  
+[CVE-2023-4563](cves/CVE-2023-4563)  
+[CVE-2023-4610](cves/CVE-2023-4610)  
diff --git a/data/3.12/3.12_CVEs.txt b/data/3.12/3.12_CVEs.txt
index fe5298c..0056712 100644
--- a/data/3.12/3.12_CVEs.txt
+++ b/data/3.12/3.12_CVEs.txt
@@ -1309,12 +1309,10 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-42752: Fix not seen in stream
 CVE-2023-42755: Fix not seen in stream
@@ -1326,9 +1324,7 @@
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
-CVE-2023-5717: Fix not seen in stream
diff --git a/data/3.12/3.12_security.txt b/data/3.12/3.12_security.txt
index 0ba776f..b2a8166 100644
--- a/data/3.12/3.12_security.txt
+++ b/data/3.12/3.12_security.txt
@@ -1447,12 +1447,10 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-42752: (unk) igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU 
   CVE-2023-42755: (unk) net/sched: Retire rsvp classifier 
@@ -1464,9 +1462,7 @@
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
-  CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/3.14/3.14_CVEs.txt b/data/3.14/3.14_CVEs.txt
index 9e112e8..8ded72b 100644
--- a/data/3.14/3.14_CVEs.txt
+++ b/data/3.14/3.14_CVEs.txt
@@ -1279,12 +1279,10 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-42752: Fix not seen in stream
 CVE-2023-42755: Fix not seen in stream
@@ -1296,9 +1294,7 @@
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
-CVE-2023-5717: Fix not seen in stream
diff --git a/data/3.14/3.14_security.txt b/data/3.14/3.14_security.txt
index c79d833..ed3cdb0 100644
--- a/data/3.14/3.14_security.txt
+++ b/data/3.14/3.14_security.txt
@@ -1413,12 +1413,10 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-42752: (unk) igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU 
   CVE-2023-42755: (unk) net/sched: Retire rsvp classifier 
@@ -1430,9 +1428,7 @@
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
-  CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/3.16/3.16_CVEs.txt b/data/3.16/3.16_CVEs.txt
index c35074f..cb3b212 100644
--- a/data/3.16/3.16_CVEs.txt
+++ b/data/3.16/3.16_CVEs.txt
@@ -1270,13 +1270,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-42752: Fix not seen in stream
 CVE-2023-42755: Fix not seen in stream
@@ -1288,9 +1286,7 @@
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
-CVE-2023-5717: Fix not seen in stream
diff --git a/data/3.16/3.16_security.txt b/data/3.16/3.16_security.txt
index 207e389..e5f8ce6 100644
--- a/data/3.16/3.16_security.txt
+++ b/data/3.16/3.16_security.txt
@@ -1376,13 +1376,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-42752: (unk) igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU 
   CVE-2023-42755: (unk) net/sched: Retire rsvp classifier 
@@ -1394,9 +1392,7 @@
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
-  CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/3.18/3.18_CVEs.txt b/data/3.18/3.18_CVEs.txt
index e4a5935..21bdd3f 100644
--- a/data/3.18/3.18_CVEs.txt
+++ b/data/3.18/3.18_CVEs.txt
@@ -1257,13 +1257,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4206: Fix not seen in stream
@@ -1279,9 +1277,7 @@
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
-CVE-2023-5717: Fix not seen in stream
diff --git a/data/3.18/3.18_security.txt b/data/3.18/3.18_security.txt
index 2a3c784..1b1db1c 100644
--- a/data/3.18/3.18_security.txt
+++ b/data/3.18/3.18_security.txt
@@ -1493,13 +1493,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
@@ -1515,9 +1513,7 @@
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
-  CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/3.2/3.2_CVEs.txt b/data/3.2/3.2_CVEs.txt
index 51dc2a7..83b4d53 100644
--- a/data/3.2/3.2_CVEs.txt
+++ b/data/3.2/3.2_CVEs.txt
@@ -1274,12 +1274,10 @@
 CVE-2023-3772: Fix not seen in stream
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-42752: Fix not seen in stream
 CVE-2023-42755: Fix not seen in stream
 CVE-2023-4385: Fix not seen in stream
@@ -1290,8 +1288,6 @@
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
-CVE-2023-5717: Fix not seen in stream
diff --git a/data/3.2/3.2_security.txt b/data/3.2/3.2_security.txt
index bf02e7d..7902664 100644
--- a/data/3.2/3.2_security.txt
+++ b/data/3.2/3.2_security.txt
@@ -1432,12 +1432,10 @@
   CVE-2023-3772: (unk) xfrm: add NULL check in xfrm_update_ae_params 
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-42752: (unk) igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU 
   CVE-2023-42755: (unk) net/sched: Retire rsvp classifier 
   CVE-2023-4385: (unk) fs: jfs: fix possible NULL pointer dereference in dbFree() 
@@ -1448,8 +1446,6 @@
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
-  CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.1/4.1_CVEs.txt b/data/4.1/4.1_CVEs.txt
index 93fa7c2..d35710a 100644
--- a/data/4.1/4.1_CVEs.txt
+++ b/data/4.1/4.1_CVEs.txt
@@ -1224,13 +1224,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4206: Fix not seen in stream
@@ -1246,10 +1244,8 @@
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
-CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.1/4.1_security.txt b/data/4.1/4.1_security.txt
index 63eb7a0..1e09e7f 100644
--- a/data/4.1/4.1_security.txt
+++ b/data/4.1/4.1_security.txt
@@ -1322,13 +1322,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
@@ -1344,10 +1342,8 @@
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
-  CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.10/4.10_CVEs.txt b/data/4.10/4.10_CVEs.txt
index 88f9c0c..a350d39 100644
--- a/data/4.10/4.10_CVEs.txt
+++ b/data/4.10/4.10_CVEs.txt
@@ -1137,13 +1137,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1162,10 +1160,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.10/4.10_security.txt b/data/4.10/4.10_security.txt
index fd29592..a2ef075 100644
--- a/data/4.10/4.10_security.txt
+++ b/data/4.10/4.10_security.txt
@@ -1171,13 +1171,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1196,10 +1194,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.11/4.11_CVEs.txt b/data/4.11/4.11_CVEs.txt
index 7c03c82..2e71676 100644
--- a/data/4.11/4.11_CVEs.txt
+++ b/data/4.11/4.11_CVEs.txt
@@ -1109,13 +1109,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1134,10 +1132,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.11/4.11_security.txt b/data/4.11/4.11_security.txt
index 2baf885..6f16b21 100644
--- a/data/4.11/4.11_security.txt
+++ b/data/4.11/4.11_security.txt
@@ -1131,13 +1131,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1156,10 +1154,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.12/4.12_CVEs.txt b/data/4.12/4.12_CVEs.txt
index 91854c6..caa1a58 100644
--- a/data/4.12/4.12_CVEs.txt
+++ b/data/4.12/4.12_CVEs.txt
@@ -1096,13 +1096,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1121,10 +1119,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.12/4.12_security.txt b/data/4.12/4.12_security.txt
index f650614..cfe67cd 100644
--- a/data/4.12/4.12_security.txt
+++ b/data/4.12/4.12_security.txt
@@ -1122,13 +1122,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1147,10 +1145,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.13/4.13_CVEs.txt b/data/4.13/4.13_CVEs.txt
index aeed20b..d77d816 100644
--- a/data/4.13/4.13_CVEs.txt
+++ b/data/4.13/4.13_CVEs.txt
@@ -1081,13 +1081,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1106,10 +1104,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.13/4.13_security.txt b/data/4.13/4.13_security.txt
index 9c8dc74..15dd04a 100644
--- a/data/4.13/4.13_security.txt
+++ b/data/4.13/4.13_security.txt
@@ -1109,13 +1109,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1134,10 +1132,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt
index b31fe6d..6f899b9 100644
--- a/data/4.14/4.14_CVEs.txt
+++ b/data/4.14/4.14_CVEs.txt
@@ -754,7 +754,7 @@
 CVE-2021-43975: Fix not seen in stream
 CVE-2021-43976: Fixed with 4.14.263
 CVE-2021-44733: Fixed with 4.14.261
-CVE-2021-44879: Fix not seen in stream
+CVE-2021-44879: Fixed with 4.14.329
 CVE-2021-45095: Fixed with 4.14.262
 CVE-2021-45469: Fixed with 4.14.260
 CVE-2021-45485: Fixed with 4.14.240
@@ -1042,7 +1042,7 @@
 CVE-2023-34255: Fix not seen in stream
 CVE-2023-34256: Fixed with 4.14.315
 CVE-2023-35001: Fixed with 4.14.322
-CVE-2023-3567: Fix not seen in stream
+CVE-2023-3567: Fixed with 4.14.329
 CVE-2023-35824: Fixed with 4.14.315
 CVE-2023-35827: Fix not seen in stream
 CVE-2023-3609: Fixed with 4.14.322
@@ -1053,13 +1053,11 @@
 CVE-2023-3776: Fixed with 4.14.322
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fixed with 4.14.326
 CVE-2023-39193: Fixed with 4.14.326
 CVE-2023-39194: Fixed with 4.14.324
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fixed with 4.14.322
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fixed with 4.14.322
 CVE-2023-4132: Fixed with 4.14.322
 CVE-2023-4134: Fix not seen in stream
@@ -1072,16 +1070,15 @@
 CVE-2023-4387: Fixed with 4.14.281
 CVE-2023-4459: Fixed with 4.14.281
 CVE-2023-45862: Fixed with 4.14.308
-CVE-2023-45863: Fix not seen in stream
+CVE-2023-45863: Fixed with 4.14.329
 CVE-2023-45871: Fixed with 4.14.326
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fixed with 4.14.327
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fixed with 4.14.326
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fixed with 4.14.328
diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt
index 8ced453..b93b0eb 100644
--- a/data/4.14/4.14_security.txt
+++ b/data/4.14/4.14_security.txt
@@ -1399,6 +1399,11 @@
 CVEs fixed in 4.14.328:
   CVE-2023-5717: 555e15e93f6dbb8ce6b5b92e5272473abfe8bd2b perf: Disallow mis-matched inherited group reads
 
+CVEs fixed in 4.14.329:
+  CVE-2021-44879: a481db81e7ead1369acca8e13b6939778cb7d2c5 f2fs: fix to do sanity check on inode type during garbage collection
+  CVE-2023-3567: af79ea9a2443016f64d8fd8d72020cc874f0e066 vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
+  CVE-2023-45863: b43cf5ad5241d6f33a02c93271a282d5ed6c4cce kobject: Fix slab-out-of-bounds in fill_kobj_path()
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -1516,7 +1521,6 @@
   CVE-2021-4150: (unk) block: fix incorrect references to disk objects 
   CVE-2021-4218: (unk) sysctl: pass kernel pointers to ->proc_handler 
   CVE-2021-43975: (unk) atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait 
-  CVE-2021-44879: (unk) f2fs: fix to do sanity check on inode type during garbage collection 
   CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() 
   CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() 
   CVE-2022-0400: (unk)  
@@ -1610,22 +1614,17 @@
   CVE-2023-33288: (unk) power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition 
   CVE-2023-3397: (unk)  
   CVE-2023-34255: (unk) xfs: verify buffer contents when we skip log replay 
-  CVE-2023-3567: (unk) vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF 
   CVE-2023-35827: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() 
   CVE-2023-3640: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-4010: (unk)  
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
-  CVE-2023-45863: (unk) kobject: Fix slab-out-of-bounds in fill_kobj_path() 
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/4.15/4.15_CVEs.txt b/data/4.15/4.15_CVEs.txt
index 0e591bc..562b4d9 100644
--- a/data/4.15/4.15_CVEs.txt
+++ b/data/4.15/4.15_CVEs.txt
@@ -1008,13 +1008,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -1034,10 +1032,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.15/4.15_security.txt b/data/4.15/4.15_security.txt
index 0fa95ca..8322010 100644
--- a/data/4.15/4.15_security.txt
+++ b/data/4.15/4.15_security.txt
@@ -1040,13 +1040,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -1066,10 +1064,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.16/4.16_CVEs.txt b/data/4.16/4.16_CVEs.txt
index 5b86372..88992b6 100644
--- a/data/4.16/4.16_CVEs.txt
+++ b/data/4.16/4.16_CVEs.txt
@@ -988,13 +988,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -1014,10 +1012,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.16/4.16_security.txt b/data/4.16/4.16_security.txt
index 0814341..6cef6b3 100644
--- a/data/4.16/4.16_security.txt
+++ b/data/4.16/4.16_security.txt
@@ -1020,13 +1020,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -1046,10 +1044,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.17/4.17_CVEs.txt b/data/4.17/4.17_CVEs.txt
index aaf7307..76a6461 100644
--- a/data/4.17/4.17_CVEs.txt
+++ b/data/4.17/4.17_CVEs.txt
@@ -970,13 +970,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -996,10 +994,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.17/4.17_security.txt b/data/4.17/4.17_security.txt
index 8ae73ea..cf23746 100644
--- a/data/4.17/4.17_security.txt
+++ b/data/4.17/4.17_security.txt
@@ -1002,13 +1002,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -1028,10 +1026,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.18/4.18_CVEs.txt b/data/4.18/4.18_CVEs.txt
index 972400b..45d5cbd 100644
--- a/data/4.18/4.18_CVEs.txt
+++ b/data/4.18/4.18_CVEs.txt
@@ -948,13 +948,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -974,10 +972,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.18/4.18_security.txt b/data/4.18/4.18_security.txt
index 41f821b..d603cc2 100644
--- a/data/4.18/4.18_security.txt
+++ b/data/4.18/4.18_security.txt
@@ -980,13 +980,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -1006,10 +1004,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt
index a27e6aa..7af392c 100644
--- a/data/4.19/4.19_CVEs.txt
+++ b/data/4.19/4.19_CVEs.txt
@@ -613,7 +613,7 @@
 CVE-2021-43975: Fixed with 4.19.220
 CVE-2021-43976: Fixed with 4.19.226
 CVE-2021-44733: Fixed with 4.19.224
-CVE-2021-44879: Fix not seen in stream
+CVE-2021-44879: Fixed with 4.19.298
 CVE-2021-45095: Fixed with 4.19.225
 CVE-2021-45469: Fixed with 4.19.223
 CVE-2021-45485: Fixed with 4.19.198
@@ -931,13 +931,11 @@
 CVE-2023-3812: Fixed with 4.19.265
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fixed with 4.19.295
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fixed with 4.19.295
 CVE-2023-39193: Fixed with 4.19.295
 CVE-2023-39194: Fixed with 4.19.293
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fixed with 4.19.291
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fixed with 4.19.291
 CVE-2023-4132: Fixed with 4.19.291
 CVE-2023-4133: Fix not seen in stream
@@ -951,16 +949,15 @@
 CVE-2023-4387: Fixed with 4.19.245
 CVE-2023-4459: Fixed with 4.19.245
 CVE-2023-45862: Fixed with 4.19.276
-CVE-2023-45863: Fix not seen in stream
+CVE-2023-45863: Fixed with 4.19.298
 CVE-2023-45871: Fixed with 4.19.295
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fixed with 4.19.295
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fixed with 4.19.295
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fixed with 4.19.297
diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt
index b1b7d25..446a59c 100644
--- a/data/4.19/4.19_security.txt
+++ b/data/4.19/4.19_security.txt
@@ -1229,6 +1229,10 @@
 CVEs fixed in 4.19.297:
   CVE-2023-5717: a714491fa92d2068358dd603cc50bf2062517bd8 perf: Disallow mis-matched inherited group reads
 
+CVEs fixed in 4.19.298:
+  CVE-2021-44879: 45c9da086dded78a12bc580f5bb012545a910803 f2fs: fix to do sanity check on inode type during garbage collection
+  CVE-2023-45863: 0af6c6c15681cf80aeb85fcb3a1928c63aa89deb kobject: Fix slab-out-of-bounds in fill_kobj_path()
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -1328,7 +1332,6 @@
   CVE-2021-4037: (unk) xfs: fix up non-directory creation in SGID directories 
   CVE-2021-4150: (unk) block: fix incorrect references to disk objects 
   CVE-2021-4218: (unk) sysctl: pass kernel pointers to ->proc_handler 
-  CVE-2021-44879: (unk) f2fs: fix to do sanity check on inode type during garbage collection 
   CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() 
   CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() 
   CVE-2022-0400: (unk)  
@@ -1424,17 +1427,13 @@
   CVE-2023-3640: (unk)  
   CVE-2023-37454: (unk)  
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-4010: (unk)  
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
-  CVE-2023-45863: (unk) kobject: Fix slab-out-of-bounds in fill_kobj_path() 
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/4.20/4.20_CVEs.txt b/data/4.20/4.20_CVEs.txt
index 1526ff5..7422602 100644
--- a/data/4.20/4.20_CVEs.txt
+++ b/data/4.20/4.20_CVEs.txt
@@ -928,13 +928,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -955,10 +953,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.20/4.20_security.txt b/data/4.20/4.20_security.txt
index b6bf5b1..7ded4c6 100644
--- a/data/4.20/4.20_security.txt
+++ b/data/4.20/4.20_security.txt
@@ -960,13 +960,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -987,10 +985,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.3/4.3_CVEs.txt b/data/4.3/4.3_CVEs.txt
index 064380b..93db006 100644
--- a/data/4.3/4.3_CVEs.txt
+++ b/data/4.3/4.3_CVEs.txt
@@ -1225,13 +1225,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4206: Fix not seen in stream
@@ -1248,10 +1246,8 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
-CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.3/4.3_security.txt b/data/4.3/4.3_security.txt
index 7cbb8dc..9310aad 100644
--- a/data/4.3/4.3_security.txt
+++ b/data/4.3/4.3_security.txt
@@ -1241,13 +1241,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
@@ -1264,10 +1262,8 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
-  CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt
index 4822221..dbfafa6 100644
--- a/data/4.4/4.4_CVEs.txt
+++ b/data/4.4/4.4_CVEs.txt
@@ -1206,13 +1206,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4206: Fix not seen in stream
@@ -1230,10 +1228,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt
index 206bd51..4099a14 100644
--- a/data/4.4/4.4_security.txt
+++ b/data/4.4/4.4_security.txt
@@ -1692,13 +1692,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
@@ -1716,10 +1714,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.5/4.5_CVEs.txt b/data/4.5/4.5_CVEs.txt
index 40056a5..bf7b3be 100644
--- a/data/4.5/4.5_CVEs.txt
+++ b/data/4.5/4.5_CVEs.txt
@@ -1189,13 +1189,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
 CVE-2023-4206: Fix not seen in stream
@@ -1213,10 +1211,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.5/4.5_security.txt b/data/4.5/4.5_security.txt
index 37b7f7f..ef7a83f 100644
--- a/data/4.5/4.5_security.txt
+++ b/data/4.5/4.5_security.txt
@@ -1205,13 +1205,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4206: (unk) net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free 
@@ -1229,10 +1227,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.6/4.6_CVEs.txt b/data/4.6/4.6_CVEs.txt
index c6e1a6d..81e1f3d 100644
--- a/data/4.6/4.6_CVEs.txt
+++ b/data/4.6/4.6_CVEs.txt
@@ -1162,13 +1162,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1187,10 +1185,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.6/4.6_security.txt b/data/4.6/4.6_security.txt
index 4f56b24..c019bf3 100644
--- a/data/4.6/4.6_security.txt
+++ b/data/4.6/4.6_security.txt
@@ -1180,13 +1180,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1205,10 +1203,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.7/4.7_CVEs.txt b/data/4.7/4.7_CVEs.txt
index 55a5d38..a48e98d 100644
--- a/data/4.7/4.7_CVEs.txt
+++ b/data/4.7/4.7_CVEs.txt
@@ -1145,13 +1145,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1170,10 +1168,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.7/4.7_security.txt b/data/4.7/4.7_security.txt
index c96cb3e..3665b2a 100644
--- a/data/4.7/4.7_security.txt
+++ b/data/4.7/4.7_security.txt
@@ -1165,13 +1165,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1190,10 +1188,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.8/4.8_CVEs.txt b/data/4.8/4.8_CVEs.txt
index 603a99a..1d55f98 100644
--- a/data/4.8/4.8_CVEs.txt
+++ b/data/4.8/4.8_CVEs.txt
@@ -1148,13 +1148,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1173,10 +1171,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.8/4.8_security.txt b/data/4.8/4.8_security.txt
index 97da9e6..d1ae0d6 100644
--- a/data/4.8/4.8_security.txt
+++ b/data/4.8/4.8_security.txt
@@ -1178,13 +1178,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1203,10 +1201,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt
index ae08af4..76e06aa 100644
--- a/data/4.9/4.9_CVEs.txt
+++ b/data/4.9/4.9_CVEs.txt
@@ -1152,13 +1152,11 @@
 CVE-2023-3776: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4134: Fix not seen in stream
@@ -1177,10 +1175,9 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt
index d0c4180..dc55b68 100644
--- a/data/4.9/4.9_security.txt
+++ b/data/4.9/4.9_security.txt
@@ -1703,13 +1703,11 @@
   CVE-2023-3776: (unk) net/sched: cls_fw: Fix improper refcount update leads to use-after-free 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -1725,10 +1723,9 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.0/5.0_CVEs.txt b/data/5.0/5.0_CVEs.txt
index 8966f70..9c9f4a6 100644
--- a/data/5.0/5.0_CVEs.txt
+++ b/data/5.0/5.0_CVEs.txt
@@ -907,13 +907,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -934,10 +932,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.0/5.0_security.txt b/data/5.0/5.0_security.txt
index 8f100d1..b85df1d 100644
--- a/data/5.0/5.0_security.txt
+++ b/data/5.0/5.0_security.txt
@@ -955,13 +955,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -982,10 +980,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.1/5.1_CVEs.txt b/data/5.1/5.1_CVEs.txt
index 1bc9dea..fb3fe30 100644
--- a/data/5.1/5.1_CVEs.txt
+++ b/data/5.1/5.1_CVEs.txt
@@ -887,13 +887,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -915,10 +913,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.1/5.1_security.txt b/data/5.1/5.1_security.txt
index fb89b1b..6d7ef97 100644
--- a/data/5.1/5.1_security.txt
+++ b/data/5.1/5.1_security.txt
@@ -923,13 +923,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -951,10 +949,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt
index d98df88..8561cda 100644
--- a/data/5.10/5.10_CVEs.txt
+++ b/data/5.10/5.10_CVEs.txt
@@ -636,7 +636,6 @@
 CVE-2023-3812: Fixed with 5.10.154
 CVE-2023-3863: Fixed with 5.10.188
 CVE-2023-39189: Fixed with 5.10.195
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fixed with 5.10.195
 CVE-2023-39193: Fixed with 5.10.195
 CVE-2023-39194: Fixed with 5.10.192
@@ -644,7 +643,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fixed with 5.10.190
 CVE-2023-40283: Fixed with 5.10.190
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fixed with 5.10.190
 CVE-2023-4132: Fixed with 5.10.188
 CVE-2023-4133: Fix not seen in stream
@@ -672,10 +670,10 @@
 CVE-2023-4623: Fixed with 5.10.195
 CVE-2023-46813: Fixed with 5.10.199
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fixed with 5.10.53
 CVE-2023-4881: Fixed with 5.10.198
 CVE-2023-4921: Fixed with 5.10.195
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fixed with 5.10.199
 CVE-2023-5197: Fixed with 5.10.198
 CVE-2023-5633: Fix not seen in stream
diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt
index c28b76d..08a900d 100644
--- a/data/5.10/5.10_security.txt
+++ b/data/5.10/5.10_security.txt
@@ -965,14 +965,12 @@
   CVE-2023-3397: (unk)  
   CVE-2023-3640: (unk)  
   CVE-2023-37454: (unk)  
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-4010: (unk)  
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-45863: (unk) kobject: Fix slab-out-of-bounds in fill_kobj_path() 
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
+  CVE-2023-47233: (unk)  
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/5.11/5.11_CVEs.txt b/data/5.11/5.11_CVEs.txt
index e11b38d..a6e6630 100644
--- a/data/5.11/5.11_CVEs.txt
+++ b/data/5.11/5.11_CVEs.txt
@@ -629,7 +629,6 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -637,7 +636,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -667,10 +665,10 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
diff --git a/data/5.11/5.11_security.txt b/data/5.11/5.11_security.txt
index 442f1f7..33d82bf 100644
--- a/data/5.11/5.11_security.txt
+++ b/data/5.11/5.11_security.txt
@@ -671,7 +671,6 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -679,7 +678,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -709,10 +707,10 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/5.12/5.12_CVEs.txt b/data/5.12/5.12_CVEs.txt
index 175b357..1f57d33 100644
--- a/data/5.12/5.12_CVEs.txt
+++ b/data/5.12/5.12_CVEs.txt
@@ -581,7 +581,6 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -589,7 +588,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -619,10 +617,10 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
diff --git a/data/5.12/5.12_security.txt b/data/5.12/5.12_security.txt
index 9d0e5ef..496b904 100644
--- a/data/5.12/5.12_security.txt
+++ b/data/5.12/5.12_security.txt
@@ -613,7 +613,6 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -621,7 +620,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -651,10 +649,10 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/5.13/5.13_CVEs.txt b/data/5.13/5.13_CVEs.txt
index 93310da..b776031 100644
--- a/data/5.13/5.13_CVEs.txt
+++ b/data/5.13/5.13_CVEs.txt
@@ -550,7 +550,6 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -558,7 +557,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -589,10 +587,10 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fixed with 5.13.5
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5158: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
diff --git a/data/5.13/5.13_security.txt b/data/5.13/5.13_security.txt
index 48e5994..9d4ca39 100644
--- a/data/5.13/5.13_security.txt
+++ b/data/5.13/5.13_security.txt
@@ -585,7 +585,6 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -593,7 +592,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -624,9 +622,9 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5158: (unk) vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
diff --git a/data/5.14/5.14_CVEs.txt b/data/5.14/5.14_CVEs.txt
index f6ff5a1..9cea49e 100644
--- a/data/5.14/5.14_CVEs.txt
+++ b/data/5.14/5.14_CVEs.txt
@@ -525,7 +525,6 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -533,7 +532,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -564,9 +562,9 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5158: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
diff --git a/data/5.14/5.14_security.txt b/data/5.14/5.14_security.txt
index feb93e7..627a9d6 100644
--- a/data/5.14/5.14_security.txt
+++ b/data/5.14/5.14_security.txt
@@ -559,7 +559,6 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -567,7 +566,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -598,9 +596,9 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5158: (unk) vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt
index e6053ac..85dd11b 100644
--- a/data/5.15/5.15_CVEs.txt
+++ b/data/5.15/5.15_CVEs.txt
@@ -531,7 +531,6 @@
 CVE-2023-3866: Fixed with 5.15.121
 CVE-2023-3867: Fix not seen in stream
 CVE-2023-39189: Fixed with 5.15.132
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fixed with 5.15.132
 CVE-2023-39193: Fixed with 5.15.132
 CVE-2023-39194: Fixed with 5.15.128
@@ -539,7 +538,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fixed with 5.15.124
 CVE-2023-40283: Fixed with 5.15.126
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fixed with 5.15.126
 CVE-2023-4132: Fixed with 5.15.121
 CVE-2023-4133: Fix not seen in stream
@@ -570,9 +568,9 @@
 CVE-2023-4623: Fixed with 5.15.132
 CVE-2023-46813: Fixed with 5.15.137
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fixed with 5.15.132
 CVE-2023-4921: Fixed with 5.15.132
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5158: Fixed with 5.15.135
 CVE-2023-5178: Fixed with 5.15.137
 CVE-2023-5197: Fixed with 5.15.134
diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt
index f0623ad..993c2f9 100644
--- a/data/5.15/5.15_security.txt
+++ b/data/5.15/5.15_security.txt
@@ -783,14 +783,12 @@
   CVE-2023-38430: (unk) ksmbd: validate smb request protocol id 
   CVE-2023-38431: (unk) ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop 
   CVE-2023-3867: (unk) ksmbd: add missing compound request handing in some commands 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-4010: (unk)  
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once 
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
+  CVE-2023-47233: (unk)  
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt
index 07ef022..d7c070c 100644
--- a/data/5.16/5.16_CVEs.txt
+++ b/data/5.16/5.16_CVEs.txt
@@ -499,7 +499,6 @@
 CVE-2023-3866: Fix not seen in stream
 CVE-2023-3867: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -507,7 +506,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -539,9 +537,9 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5158: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt
index 28da3ed..5e7932f 100644
--- a/data/5.16/5.16_security.txt
+++ b/data/5.16/5.16_security.txt
@@ -535,7 +535,6 @@
   CVE-2023-3866: (unk) ksmbd: validate session id and tree id in the compound request 
   CVE-2023-3867: (unk) ksmbd: add missing compound request handing in some commands 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -543,7 +542,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -575,9 +573,9 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5158: (unk) vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt
index eb60797..ae0ce96 100644
--- a/data/5.17/5.17_CVEs.txt
+++ b/data/5.17/5.17_CVEs.txt
@@ -445,7 +445,6 @@
 CVE-2023-3866: Fix not seen in stream
 CVE-2023-3867: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -453,7 +452,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -485,9 +483,9 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5158: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt
index d8b5710..f318045 100644
--- a/data/5.17/5.17_security.txt
+++ b/data/5.17/5.17_security.txt
@@ -481,7 +481,6 @@
   CVE-2023-3866: (unk) ksmbd: validate session id and tree id in the compound request 
   CVE-2023-3867: (unk) ksmbd: add missing compound request handing in some commands 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -489,7 +488,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -517,9 +515,9 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5158: (unk) vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
diff --git a/data/5.18/5.18_CVEs.txt b/data/5.18/5.18_CVEs.txt
index 0cc7f7d..9e05b04 100644
--- a/data/5.18/5.18_CVEs.txt
+++ b/data/5.18/5.18_CVEs.txt
@@ -395,7 +395,6 @@
 CVE-2023-3866: Fix not seen in stream
 CVE-2023-3867: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -403,7 +402,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -434,9 +432,9 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5158: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
diff --git a/data/5.18/5.18_security.txt b/data/5.18/5.18_security.txt
index 3414b5d..cec8181 100644
--- a/data/5.18/5.18_security.txt
+++ b/data/5.18/5.18_security.txt
@@ -434,7 +434,6 @@
   CVE-2023-3866: (unk) ksmbd: validate session id and tree id in the compound request 
   CVE-2023-3867: (unk) ksmbd: add missing compound request handing in some commands 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -442,7 +441,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -470,9 +468,9 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5158: (unk) vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
diff --git a/data/5.19/5.19_CVEs.txt b/data/5.19/5.19_CVEs.txt
index 2447c3b..0b0c58a 100644
--- a/data/5.19/5.19_CVEs.txt
+++ b/data/5.19/5.19_CVEs.txt
@@ -362,7 +362,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -390,9 +389,9 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5158: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
diff --git a/data/5.19/5.19_security.txt b/data/5.19/5.19_security.txt
index b42794e..6f76791 100644
--- a/data/5.19/5.19_security.txt
+++ b/data/5.19/5.19_security.txt
@@ -393,7 +393,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -420,9 +419,9 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5158: (unk) vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
diff --git a/data/5.2/5.2_CVEs.txt b/data/5.2/5.2_CVEs.txt
index d0287e1..e3f1749 100644
--- a/data/5.2/5.2_CVEs.txt
+++ b/data/5.2/5.2_CVEs.txt
@@ -849,13 +849,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -877,10 +875,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.2/5.2_security.txt b/data/5.2/5.2_security.txt
index 8d68781..a89c2bf 100644
--- a/data/5.2/5.2_security.txt
+++ b/data/5.2/5.2_security.txt
@@ -887,13 +887,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -915,10 +913,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.3/5.3_CVEs.txt b/data/5.3/5.3_CVEs.txt
index cf4a773..dbb3fc7 100644
--- a/data/5.3/5.3_CVEs.txt
+++ b/data/5.3/5.3_CVEs.txt
@@ -824,13 +824,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -852,10 +850,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.3/5.3_security.txt b/data/5.3/5.3_security.txt
index 5f3628e..1daf729 100644
--- a/data/5.3/5.3_security.txt
+++ b/data/5.3/5.3_security.txt
@@ -860,13 +860,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -888,10 +886,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt
index ccbefae..182c868 100644
--- a/data/5.4/5.4_CVEs.txt
+++ b/data/5.4/5.4_CVEs.txt
@@ -405,7 +405,7 @@
 CVE-2021-43975: Fixed with 5.4.164
 CVE-2021-43976: Fixed with 5.4.174
 CVE-2021-44733: Fixed with 5.4.170
-CVE-2021-44879: Fix not seen in stream
+CVE-2021-44879: Fixed with 5.4.260
 CVE-2021-45095: Fixed with 5.4.171
 CVE-2021-45469: Fixed with 5.4.169
 CVE-2021-45485: Fixed with 5.4.133
@@ -754,13 +754,11 @@
 CVE-2023-3812: Fixed with 5.4.224
 CVE-2023-3863: Fixed with 5.4.251
 CVE-2023-39189: Fixed with 5.4.257
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fixed with 5.4.257
 CVE-2023-39193: Fixed with 5.4.257
 CVE-2023-39194: Fixed with 5.4.255
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fixed with 5.4.253
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fixed with 5.4.253
 CVE-2023-4132: Fixed with 5.4.251
 CVE-2023-4133: Fix not seen in stream
@@ -776,16 +774,16 @@
 CVE-2023-4387: Fixed with 5.4.196
 CVE-2023-4459: Fixed with 5.4.196
 CVE-2023-45862: Fixed with 5.4.235
-CVE-2023-45863: Fix not seen in stream
+CVE-2023-45863: Fixed with 5.4.260
 CVE-2023-45871: Fixed with 5.4.257
 CVE-2023-4610: Fix not seen in stream
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fixed with 5.4.257
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fixed with 5.4.257
-CVE-2023-5090: Fix not seen in stream
-CVE-2023-5178: Fix not seen in stream
+CVE-2023-5178: Fixed with 5.4.260
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fixed with 5.4.259
diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt
index 7b2c3f6..3775780 100644
--- a/data/5.4/5.4_security.txt
+++ b/data/5.4/5.4_security.txt
@@ -1009,6 +1009,11 @@
   CVE-2023-35827: 65d34cfd4e347054eb4193bc95d9da7eaa72dee5 ravb: Fix use-after-free issue in ravb_tx_timeout_work()
   CVE-2023-5717: 7252c8b981853bb8930de44fab924f947362683f perf: Disallow mis-matched inherited group reads
 
+CVEs fixed in 5.4.260:
+  CVE-2021-44879: e9a988cd4c8baac7550aa0c2f1efc9533ed9da36 f2fs: fix to do sanity check on inode type during garbage collection
+  CVE-2023-45863: 5776aeee2a604ccc03e8269713624f9c8fd318e0 kobject: Fix slab-out-of-bounds in fill_kobj_path()
+  CVE-2023-5178: 4e53bab11f01a401a5acd3bc94335b27ec79106b nvmet-tcp: Fix a possible UAF in queue intialization setup
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -1087,7 +1092,6 @@
   CVE-2021-4148: (unk) mm: khugepaged: skip huge page collapse for special files 
   CVE-2021-4150: (unk) block: fix incorrect references to disk objects 
   CVE-2021-4218: (unk) sysctl: pass kernel pointers to ->proc_handler 
-  CVE-2021-44879: (unk) f2fs: fix to do sanity check on inode type during garbage collection 
   CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() 
   CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() 
   CVE-2022-0400: (unk)  
@@ -1169,17 +1173,13 @@
   CVE-2023-3397: (unk)  
   CVE-2023-3640: (unk)  
   CVE-2023-37454: (unk)  
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-4010: (unk)  
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
-  CVE-2023-45863: (unk) kobject: Fix slab-out-of-bounds in fill_kobj_path() 
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
-  CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/5.5/5.5_CVEs.txt b/data/5.5/5.5_CVEs.txt
index 9748d27..328d6a4 100644
--- a/data/5.5/5.5_CVEs.txt
+++ b/data/5.5/5.5_CVEs.txt
@@ -715,13 +715,11 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -743,10 +741,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.5/5.5_security.txt b/data/5.5/5.5_security.txt
index 978235f..4ec92e7 100644
--- a/data/5.5/5.5_security.txt
+++ b/data/5.5/5.5_security.txt
@@ -749,13 +749,11 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -777,10 +775,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.6/5.6_CVEs.txt b/data/5.6/5.6_CVEs.txt
index 527c68f..5ed1284 100644
--- a/data/5.6/5.6_CVEs.txt
+++ b/data/5.6/5.6_CVEs.txt
@@ -693,14 +693,12 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -724,10 +722,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.6/5.6_security.txt b/data/5.6/5.6_security.txt
index b35c6b9..b45189d 100644
--- a/data/5.6/5.6_security.txt
+++ b/data/5.6/5.6_security.txt
@@ -727,14 +727,12 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -758,10 +756,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.7/5.7_CVEs.txt b/data/5.7/5.7_CVEs.txt
index 18c1846..25bf464 100644
--- a/data/5.7/5.7_CVEs.txt
+++ b/data/5.7/5.7_CVEs.txt
@@ -691,14 +691,12 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -724,10 +722,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.7/5.7_security.txt b/data/5.7/5.7_security.txt
index 9311f17..794ea2a 100644
--- a/data/5.7/5.7_security.txt
+++ b/data/5.7/5.7_security.txt
@@ -725,14 +725,12 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -758,10 +756,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.8/5.8_CVEs.txt b/data/5.8/5.8_CVEs.txt
index bf46bbd..a6559ce 100644
--- a/data/5.8/5.8_CVEs.txt
+++ b/data/5.8/5.8_CVEs.txt
@@ -678,14 +678,12 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
 CVE-2023-4004: Fix not seen in stream
 CVE-2023-4010: Fix unknown
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -711,10 +709,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
 CVE-2023-5717: Fix not seen in stream
diff --git a/data/5.8/5.8_security.txt b/data/5.8/5.8_security.txt
index f09bb65..5261a0f 100644
--- a/data/5.8/5.8_security.txt
+++ b/data/5.8/5.8_security.txt
@@ -712,14 +712,12 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
   CVE-2023-4004: (unk) netfilter: nft_set_pipapo: fix improper element removal 
   CVE-2023-4010: (unk)  
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -745,10 +743,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
   CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads 
diff --git a/data/5.9/5.9_CVEs.txt b/data/5.9/5.9_CVEs.txt
index 79aa6e0..9d0d9a3 100644
--- a/data/5.9/5.9_CVEs.txt
+++ b/data/5.9/5.9_CVEs.txt
@@ -653,7 +653,6 @@
 CVE-2023-3812: Fix not seen in stream
 CVE-2023-3863: Fix not seen in stream
 CVE-2023-39189: Fix not seen in stream
-CVE-2023-39191: Fix not seen in stream
 CVE-2023-39192: Fix not seen in stream
 CVE-2023-39193: Fix not seen in stream
 CVE-2023-39194: Fix not seen in stream
@@ -661,7 +660,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -688,10 +686,10 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4732: Fix not seen in stream
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
-CVE-2023-5090: Fix not seen in stream
 CVE-2023-5178: Fix not seen in stream
 CVE-2023-5197: Fix not seen in stream
 CVE-2023-5633: Fix not seen in stream
diff --git a/data/5.9/5.9_security.txt b/data/5.9/5.9_security.txt
index 0460340..991b8bf 100644
--- a/data/5.9/5.9_security.txt
+++ b/data/5.9/5.9_security.txt
@@ -683,7 +683,6 @@
   CVE-2023-3812: (unk) net: tun: fix bugs for oversize packet when napi frags enabled 
   CVE-2023-3863: (unk) net: nfc: Fix use-after-free caused by nfc_llcp_find_local 
   CVE-2023-39189: (unk) netfilter: nfnetlink_osf: avoid OOB read 
-  CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-39192: (unk) netfilter: xt_u32: validate user space input 
   CVE-2023-39193: (unk) netfilter: xt_sctp: validate the flag_info count 
   CVE-2023-39194: (unk) net: xfrm: Fix xfrm_address_filter OOB read 
@@ -691,7 +690,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -718,10 +716,10 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() 
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
-  CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup 
   CVE-2023-5197: (unk) netfilter: nf_tables: disallow rule removal from chain binding 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/6.0/6.0_CVEs.txt b/data/6.0/6.0_CVEs.txt
index d13d03d..63c4bfe 100644
--- a/data/6.0/6.0_CVEs.txt
+++ b/data/6.0/6.0_CVEs.txt
@@ -317,7 +317,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fix not seen in stream
@@ -344,6 +343,7 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
 CVE-2023-5090: Fix not seen in stream
diff --git a/data/6.0/6.0_security.txt b/data/6.0/6.0_security.txt
index 7dd6688..3f58f89 100644
--- a/data/6.0/6.0_security.txt
+++ b/data/6.0/6.0_security.txt
@@ -351,7 +351,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
@@ -378,6 +377,7 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
   CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
diff --git a/data/6.1/6.1_CVEs.txt b/data/6.1/6.1_CVEs.txt
index f87d9d2..02a6cdd 100644
--- a/data/6.1/6.1_CVEs.txt
+++ b/data/6.1/6.1_CVEs.txt
@@ -261,7 +261,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fixed with 6.1.43
 CVE-2023-40283: Fixed with 6.1.45
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fixed with 6.1.45
 CVE-2023-4132: Fixed with 6.1.39
 CVE-2023-4133: Fix not seen in stream
@@ -287,7 +286,8 @@
 CVE-2023-4622: Fix not seen in stream
 CVE-2023-4623: Fixed with 6.1.53
 CVE-2023-46813: Fixed with 6.1.60
-CVE-2023-46862: Fix not seen in stream
+CVE-2023-46862: Fixed with 6.1.61
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fixed with 6.1.54
 CVE-2023-4921: Fixed with 6.1.54
 CVE-2023-5090: Fix not seen in stream
diff --git a/data/6.1/6.1_security.txt b/data/6.1/6.1_security.txt
index 2c109a9..85d5e23 100644
--- a/data/6.1/6.1_security.txt
+++ b/data/6.1/6.1_security.txt
@@ -290,6 +290,9 @@
   CVE-2023-5178: f691ec5a548257edb3aacd952e2a574e4e57b2c4 nvmet-tcp: Fix a possible UAF in queue intialization setup
   CVE-2023-5717: f6952655a61264900ed08e9d642adad8222f8e29 perf: Disallow mis-matched inherited group reads
 
+CVEs fixed in 6.1.61:
+  CVE-2023-46862: 9236d2ea6465b37c0a73d994c1ad31753d31e5f5 io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -387,11 +390,10 @@
   CVE-2023-37454: (unk)  
   CVE-2023-39191: (unk) bpf: Fix state pruning for STACK_DYNPTR stack slots 
   CVE-2023-4010: (unk)  
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
   CVE-2023-4610: (unk) Revert "mm: vmscan: make global slab shrink lockless" 
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
-  CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
   CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces 
diff --git a/data/6.2/6.2_CVEs.txt b/data/6.2/6.2_CVEs.txt
index 7de6e3c..1510909 100644
--- a/data/6.2/6.2_CVEs.txt
+++ b/data/6.2/6.2_CVEs.txt
@@ -207,7 +207,6 @@
 CVE-2023-4010: Fix unknown
 CVE-2023-4015: Fix not seen in stream
 CVE-2023-40283: Fix not seen in stream
-CVE-2023-40791: Fix not seen in stream
 CVE-2023-4128: Fix not seen in stream
 CVE-2023-4132: Fix not seen in stream
 CVE-2023-4133: Fixed with 6.2.13
@@ -234,6 +233,7 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
 CVE-2023-5090: Fix not seen in stream
diff --git a/data/6.2/6.2_security.txt b/data/6.2/6.2_security.txt
index e961de4..eab769a 100644
--- a/data/6.2/6.2_security.txt
+++ b/data/6.2/6.2_security.txt
@@ -238,7 +238,6 @@
   CVE-2023-4010: (unk)  
   CVE-2023-4015: (unk) netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR 
   CVE-2023-40283: (unk) Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb 
-  CVE-2023-40791: (unk) crypto, cifs: fix error handling in extract_iter_to_sg() 
   CVE-2023-4128: (unk) net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free 
   CVE-2023-4132: (unk) media: usb: siano: Fix warning due to null work_func_t function pointer 
   CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() 
@@ -262,6 +261,7 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
   CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
diff --git a/data/6.3/6.3_CVEs.txt b/data/6.3/6.3_CVEs.txt
index 693ac18..ab2374f 100644
--- a/data/6.3/6.3_CVEs.txt
+++ b/data/6.3/6.3_CVEs.txt
@@ -196,6 +196,7 @@
 CVE-2023-4623: Fix not seen in stream
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
 CVE-2023-5090: Fix not seen in stream
diff --git a/data/6.3/6.3_security.txt b/data/6.3/6.3_security.txt
index ba5345d..772214f 100644
--- a/data/6.3/6.3_security.txt
+++ b/data/6.3/6.3_security.txt
@@ -224,6 +224,7 @@
   CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
   CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
diff --git a/data/6.4/6.4_CVEs.txt b/data/6.4/6.4_CVEs.txt
index ebc9b57..deb56e8 100644
--- a/data/6.4/6.4_CVEs.txt
+++ b/data/6.4/6.4_CVEs.txt
@@ -144,6 +144,7 @@
 CVE-2023-4623: Fixed with 6.4.16
 CVE-2023-46813: Fix not seen in stream
 CVE-2023-46862: Fix not seen in stream
+CVE-2023-47233: Fix unknown
 CVE-2023-4881: Fix not seen in stream
 CVE-2023-4921: Fix not seen in stream
 CVE-2023-5090: Fix not seen in stream
diff --git a/data/6.4/6.4_security.txt b/data/6.4/6.4_security.txt
index d0afa94..55f0403 100644
--- a/data/6.4/6.4_security.txt
+++ b/data/6.4/6.4_security.txt
@@ -170,6 +170,7 @@
   CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES 
   CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space 
   CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid 
+  CVE-2023-47233: (unk)  
   CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write 
   CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() 
   CVE-2023-5090: (unk) x86: KVM: SVM: always update the x2avic msr interception 
diff --git a/data/CVEs.txt b/data/CVEs.txt
index da49f49..93d7953 100644
--- a/data/CVEs.txt
+++ b/data/CVEs.txt
@@ -2499,7 +2499,7 @@
 CVE-2023-3866: a848c4f15ab6d5d405dbee7de5da71839b2bf35e - 5005bcb4219156f1bf7587b185080ec1da08518e (v5.15-rc1 to v6.4)
 CVE-2023-3867: a848c4f15ab6d5d405dbee7de5da71839b2bf35e - 7b7d709ef7cf285309157fb94c33f625dd22c5e1 (v5.15-rc1 to v6.5-rc1)
 CVE-2023-39189: 11eeef41d5f63c7d2f7fdfcc733eb7fb137cc384 - f4f8a7803119005e87b716874bec07c751efafec (v2.6.31-rc1 to v6.6-rc1)
-CVE-2023-39191: (n/a) - d6fefa1105dacc8a742cdcf2f4bfb501c9e61349 (unk to v6.3-rc1)
+CVE-2023-39191: 97e03f521050c092919591e668107b3d69c5f426 - d6fefa1105dacc8a742cdcf2f4bfb501c9e61349 (v5.19-rc1 to v6.3-rc1)
 CVE-2023-39192: 1b50b8a371e90a5e110f466e4ac02cf6b5f681de - 69c5d284f67089b4750d28ff6ac6f52ec224b330 (v2.6.23-rc1 to v6.6-rc1)
 CVE-2023-39193: 2e4e6a17af35be359cc8f1c924f8f198fbd478cc - e99476497687ef9e850748fe6d232264f30bc8f9 (v2.6.16-rc1 to v6.6-rc1)
 CVE-2023-39194: d3623099d3509fa68fa28235366049dd3156c63a - dfa73c17d55b921e1d4e154976de35317e43a93a (v3.15-rc1 to v6.5-rc7)
@@ -2507,7 +2507,7 @@
 CVE-2023-4010: (n/a) - (n/a) (unk to unk)
 CVE-2023-4015: d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87 - 0a771f7b266b02d262900c75f1e175c7fe76fec2 (v5.9-rc1 to v6.5-rc4)
 CVE-2023-40283: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 1728137b33c00d5a2b5110ed7aafb42e7c32e4a1 (v2.6.12-rc2 to v6.5-rc1)
-CVE-2023-40791: (n/a) - f443fd5af5dbd531f880d3645d5dd36976cf087f (unk to v6.5-rc6)
+CVE-2023-40791: 0185846975339a5c348373aa450a977f5242366b - f443fd5af5dbd531f880d3645d5dd36976cf087f (v6.3-rc1 to v6.5-rc6)
 CVE-2023-4128: de5df63228fcfbd5bb7fd883774c18fec9e61f12 - 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 (v3.18-rc1 to v6.5-rc5)
 CVE-2023-4132: dd47fbd40e6ea6884e295e13a2e50b0894258fdf - 6f489a966fbeb0da63d45c2c66a8957eab604bf6 (v4.6-rc1 to v6.5-rc1)
 CVE-2023-4133: e0f911c81e93fc23fe1a4fb0318ff1c3b1c9027f - e50b9b9e8610d47b7c22529443e45a16b1ea3a15 (v4.15-rc1 to v6.3)
@@ -2533,8 +2533,8 @@
 CVE-2023-4459: d1a890fa37f27d6aca3abc6e25e4148efc3223a6 - edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd (v2.6.32-rc5 to v5.18)
 CVE-2023-4563: 3c4287f62044a90e73a561aa05fc46e62da173da - 24138933b97b055d486e8064b4a1721702442a9b (v5.6-rc1 to v6.5-rc6)
 CVE-2023-4569: aaa31047a6d25da0fa101da1ed544e1247949b40 - 90e5b3462efa37b8bba82d7c4e63683856e188af (v5.13-rc1 to v6.5-rc7)
-CVE-2023-45862: (n/a) - ce33e64c1788912976b61314b56935abd4bc97ef (unk to v6.3-rc1)
-CVE-2023-45863: (n/a) - 3bb2a01caa813d3a1845d378bbe4169ef280d394 (unk to v6.3-rc1)
+CVE-2023-45862: 33842cedfc33ee907b2a702f321a26f7c0bf0aaa - ce33e64c1788912976b61314b56935abd4bc97ef (v3.1-rc1 to v6.3-rc1)
+CVE-2023-45863: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 3bb2a01caa813d3a1845d378bbe4169ef280d394 (v2.6.12-rc2 to v6.3-rc1)
 CVE-2023-45871: (n/a) - bb5ed01cd2428cd25b1c88a3a9cba87055eb289f (unk to v6.6-rc1)
 CVE-2023-45898: 2a69c450083db164596c75c0f5b4d9c4c0e18eba - 768d612f79822d30a1e7d132a4d4b05337ce42ec (v6.5-rc1 to v6.6-rc1)
 CVE-2023-4610: (n/a) - 71c3ad65fabec9620d3f548b2da948c79c7ad9d5 (unk to v6.4)
@@ -2543,13 +2543,14 @@
 CVE-2023-4623: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b3d26c5702c7d6c45456326e56d2ccf3f103e60f (v2.6.12-rc2 to v6.6-rc1)
 CVE-2023-46813: 597cfe48212a3f110ab0f918bf59791f453e65b7 - 63e44bc52047f182601e7817da969a105aa1f721 (v5.10-rc1 to v6.6-rc7)
 CVE-2023-46862: (n/a) - 7644b1a1c9a7ae8ab99175989bfc8676055edb46 (unk to v6.6)
+CVE-2023-47233: (n/a) - (n/a) (unk to unk)
 CVE-2023-4732: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8f34f1eac3820fc2722e5159acceb22545b30b0d (v2.6.12-rc2 to v5.14-rc1)
 CVE-2023-4881: 49499c3e6e18b7677a63316f3ff54a16533dc28f - fd94d9dadee58e09b49075240fe83423eb1dcd36 (v4.1-rc1 to v6.6-rc1)
 CVE-2023-4921: 462dbc9101acd38e92eda93c0726857517a24bbd - 8fc134fee27f2263988ae38920bc03da416b03d8 (v3.8-rc1 to v6.6-rc1)
-CVE-2023-5090: (n/a) - b65235f6e102354ccafda601eaa1c5bef5284d21 (unk to v6.6-rc7)
+CVE-2023-5090: 4d1d7942e36add0aa741a62d0c8e3aba2d5b3ab1 - b65235f6e102354ccafda601eaa1c5bef5284d21 (v6.0-rc1 to v6.6-rc7)
 CVE-2023-5158: b8c06ad4d67db56ed6bdfb685c134da74e92a2c7 - 7aed44babc7f97e82b38e9a68515e699692cc100 (v5.13-rc1 to v6.6-rc5)
-CVE-2023-5178: (n/a) - d920abd1e7c4884f9ecd0749d1921b7ab19ddfbd (unk to v6.6-rc7)
+CVE-2023-5178: 872d26a391da92ed8f0c0f5cb5fef428067b7f30 - d920abd1e7c4884f9ecd0749d1921b7ab19ddfbd (v5.0-rc1 to v6.6-rc7)
 CVE-2023-5197: d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87 - f15f29fd4779be8a418b66e9d52979bb6d6c2325 (v5.9-rc1 to v6.6-rc3)
 CVE-2023-5345: a4e430c8c8ba96be8c6ec4f2eb108bb8bcbee069 - e6e43b8aa7cd3c3af686caf0c2e11819a886d705 (v6.1-rc1 to v6.6-rc4)
 CVE-2023-5633: (n/a) - 91398b413d03660fd5828f7b4abc64e884b98069 (unk to v6.6-rc6)
-CVE-2023-5717: (n/a) - 32671e3799ca2e4590773fd0e63aaa4229e50c06 (unk to v6.6-rc7)
+CVE-2023-5717: fa8c269353d560b7c28119ad7617029f92e40b15 - 32671e3799ca2e4590773fd0e63aaa4229e50c06 (v4.4-rc1 to v6.6-rc7)
diff --git a/data/cmts.json b/data/cmts.json
index eab650e..f881d67 100644
--- a/data/cmts.json
+++ b/data/cmts.json
@@ -19,6 +19,7 @@
     "017c59c042d01fc84cae7a8ea475861e702c77ab": "v4.9-rc1", 
     "017c73a34a661a861712f7cc1393a123e5b2208c": "v6.6-rc5", 
     "0185604c2d82c560dab2f2933a18f797e74ab5a8": "v4.4-rc7", 
+    "0185846975339a5c348373aa450a977f5242366b": "v6.3-rc1", 
     "01c846f9539c194c7a6e34af036b1115b8ed822a": "v3.17-rc1", 
     "01ca667133d019edc9f0a1f70a272447c84ec41f": "v5.1-rc4", 
     "01ea173e103edd5ec41acec65b9261b87e123fc2": "v5.12-rc1-dontuse", 
@@ -720,6 +721,7 @@
     "32ecc75ded72e0425713a7ffe2050fef6e54e564": "v4.12-rc1", 
     "3347acc6fcd4ee71ad18a9ff9d9dac176b517329": "v5.10-rc4", 
     "335178d5429c4cee61b58f4ac80688f556630818": "v5.5-rc7", 
+    "33842cedfc33ee907b2a702f321a26f7c0bf0aaa": "v3.1-rc1", 
     "338c7dbadd2671189cec7faf64c84d01071b3f96": "v3.13-rc4", 
     "338f977f4eb441e69bb9a46eaa0ac715c931a67f": "v3.14-rc3", 
     "33ab91103b3415e12457e3104f0e4517ce12d0f3": "v4.10-rc4", 
@@ -1076,6 +1078,7 @@
     "4cf949c7fafe21e085a4ee386bb2dade9067316e": "v6.2-rc1", 
     "4d06dd537f95683aba3651098ae288b7cbff8274": "v4.5", 
     "4d1356ac12f4d5180d0df345d85ff0ee42b89c72": "v5.6-rc1", 
+    "4d1d7942e36add0aa741a62d0c8e3aba2d5b3ab1": "v6.0-rc1", 
     "4d3fe31bd993ef504350989786858aefdb877daa": "v5.10-rc1", 
     "4d56304e5827c8cc8cc18c75343d283af7c4825c": "v6.4-rc5", 
     "4d63adfe12dd9cb61ed8badb4d798955399048c2": "v4.15-rc1", 
@@ -1888,6 +1891,7 @@
     "870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0": "v5.17-rc1", 
     "871997bc9e423f05c7da7c9178e62dde5df2a7f8": "v5.12-rc1", 
     "872844ddb9e44a49b759ae3e34250fefbab656f2": "v3.8-rc1", 
+    "872d26a391da92ed8f0c0f5cb5fef428067b7f30": "v5.0-rc1", 
     "875b4e3763dbc941f15143dd1a18d10bb0be303b": "v3.12-rc1", 
     "876f123b8956b455a89a172b905f9ecbb6fc5b67": "v5.7-rc1", 
     "87797fad6cce28ec9be3c13f031776ff4f104cfc": "v6.6-rc6", 
@@ -2085,6 +2089,7 @@
     "979d63d50c0c0f7bc537bf821e056cc9fe5abd38": "v5.0-rc1", 
     "979e0d74651ba5aa533277f2a6423d0f982fb6f6": "v3.14-rc6", 
     "97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2": "v3.1-rc1", 
+    "97e03f521050c092919591e668107b3d69c5f426": "v5.19-rc1", 
     "97e3d26b5e5f371b3ee223d94dd123e6c442ba80": "v6.2-rc1", 
     "97f3c0a4b0579b646b6b10ae5a3d59f0441cc12c": "v4.17-rc1", 
     "97fc15436b36ee3956efad83e22a557991f7d19d": "v3.18-rc5", 
@@ -3397,6 +3402,7 @@
     "fa3d315a4ce2c0891cdde262562e710d95fba19e": "v3.0-rc1", 
     "fa40d9734a57bcbfa79a280189799f76c88f7bb0": "v5.15", 
     "fa7f517cb26eb1a1a1f0baffcced39f6c3ec3337": "v3.16-rc1", 
+    "fa8c269353d560b7c28119ad7617029f92e40b15": "v4.4-rc1", 
     "faa775c41d655a4786e9d53cb075a77bb5a75f66": "v5.16-rc1", 
     "faaf946a7d5b79194358437150f34ab4c66bfe21": "v3.6-rc1", 
     "fac35ba763ed07ba93154c95ffc0c4a55023707f": "v6.1-rc1", 
diff --git a/data/kernel_cves.json b/data/kernel_cves.json
index 573f657..c73d658 100644
--- a/data/kernel_cves.json
+++ b/data/kernel_cves.json
@@ -13343,7 +13343,8 @@
         },
         "cwe": "Information Leak / Disclosure",
         "fixes": "",
-        "nvd_text": "** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack.  NOTE: the vendor states \"Basically if you care about this attack vector, disable deduplication.\" Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack.  NOTE: the vendor states \"Basically if you care about this attack vector, disable deduplication.\" Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2015-2877",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2015-2877",
@@ -14082,8 +14083,8 @@
         "cwe": "Other",
         "fixes": "cbb4be652d374f64661137756b8f357a1827d6a4",
         "last_affected_version": "4.1.10",
-        "last_modified": "2023-02-24",
-        "nvd_text": "drivers/usb/serial/whiteheat.c in the Linux kernel before 4.2.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted USB device. NOTE: this ID was incorrectly used for an Apache Cordova issue that has the correct ID of CVE-2015-8320.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "drivers/usb/serial/whiteheat.c in the Linux kernel before 4.2.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted USB device.  NOTE: this ID was incorrectly used for an Apache Cordova issue that has the correct ID of CVE-2015-8320.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2015-5257",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2015-5257",
@@ -15482,7 +15483,8 @@
         "cwe": "Permissions, Privileges, and Access Control",
         "fixes": "bfedb589252c01fa505ac9f6f2a3d5d68d707ef4",
         "last_affected_version": "4.9.0",
-        "nvd_text": "** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states \"there is no kernel bug here.\"",
+        "last_modified": "2023-11-08",
+        "nvd_text": "kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states \"there is no kernel bug here.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2015-8709",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2015-8709",
@@ -17362,7 +17364,8 @@
         },
         "cwe": "Resource Management Errors",
         "fixes": "9bfe5ded054b8e28a94c78580f233d6879a00146",
-        "nvd_text": "** DISPUTED ** An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that \"the underlying problem is non-trivial to handle.\"",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that \"the underlying problem is non-trivial to handle.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2016-10723",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2016-10723",
@@ -23649,8 +23652,8 @@
         "cvss3": "7.8",
         "fixes": "e09e28671cda63e6308b31798b997639120e2a21",
         "last_affected_version": "4.9.268",
-        "last_modified": "2021-05-22",
-        "nvd_text": "** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2017-0605",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2017-0605",
@@ -23890,8 +23893,8 @@
         "cmt_msg": "udp: consistently apply ufo or fragmentation",
         "fixes": "85f1bd9a7b5a79d5baa8bf44af19658f7bf77bfa",
         "last_affected_version": "4.12.6",
-        "last_modified": "2023-02-24",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2017-1000",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2017-1000",
@@ -33713,7 +33716,8 @@
         "cwe": "Permissions, Privileges, and Access Control",
         "fixes": "a45b599ad808c3c982fdcdc12b0b8611c2f92824",
         "last_affected_version": "4.16.11",
-        "nvd_text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2018-1000204",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2018-1000204",
@@ -33750,7 +33754,8 @@
         "cwe": "Resource Management Errors",
         "fixes": "318aaf34f1179b39fa9c30fa0f3288b645beee39",
         "last_affected_version": "4.14.43",
-        "nvd_text": "** DISPUTED ** drivers/scsi/libsas/sas_scsi_host.c in the Linux kernel before 4.16 allows local users to cause a denial of service (ata qc leak) by triggering certain failure conditions. NOTE: a third party disputes the relevance of this report because the failure can only occur for physically proximate attackers who unplug SAS Host Bus Adapter cables.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "drivers/scsi/libsas/sas_scsi_host.c in the Linux kernel before 4.16 allows local users to cause a denial of service (ata qc leak) by triggering certain failure conditions. NOTE: a third party disputes the relevance of this report because the failure can only occur for physically proximate attackers who unplug SAS Host Bus Adapter cables",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2018-10021",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2018-10021",
@@ -39970,8 +39975,8 @@
         "cwe": "Race Conditions",
         "fixes": "b3b7c4795ccab5be71f080774c45bbbcc75c2aaf",
         "last_affected_version": "4.15.9",
-        "last_modified": "2020-06-25",
-        "nvd_text": "** DISPUTED ** Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck<cpu number> directory. NOTE: a third party has indicated that this report is not security relevant.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck<cpu number> directory. NOTE: a third party has indicated that this report is not security relevant",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2018-7995",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2018-7995",
@@ -40847,8 +40852,8 @@
         "cwe": "Code Injection",
         "fixes": "46612b751c4941c5c0472ddf04027e877ae5990f",
         "last_affected_version": "5.0.3",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-10124",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-10124",
@@ -41346,8 +41351,8 @@
         },
         "cwe": "Race Conditions",
         "fixes": "eac616557050737a8d6ef6fe0322d0980ff0ffde",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-11191",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-11191",
@@ -41878,8 +41883,8 @@
         },
         "cwe": "NULL Pointer Dereference",
         "fixes": "95baa60a0da80a0143e3ddd4d3725758b4513825",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** An issue was discovered in ip6_ra_control in net/ipv6/ipv6_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This has been disputed as not an issue.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in ip6_ra_control in net/ipv6/ipv6_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This has been disputed as not an issue",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-12378",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-12378",
@@ -41915,8 +41920,8 @@
         },
         "cwe": "Resource Management Errors",
         "fixes": "84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. NOTE: This id is disputed as not being an issue.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. NOTE: This id is disputed as not being an issue",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-12379",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-12379",
@@ -41989,8 +41994,8 @@
         },
         "cwe": "NULL Pointer Dereference",
         "fixes": "425aa0e1d01513437668fa3d4a971168bbaa8515",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-12381",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-12381",
@@ -42027,8 +42032,8 @@
         "cwe": "NULL Pointer Dereference",
         "fixes": "9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f",
         "last_affected_version": "5.2.4",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-12382",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-12382",
@@ -42064,8 +42069,8 @@
         },
         "cwe": "Input Validation",
         "fixes": "a54988113985ca22e414e132054f234fc8a92604",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** An issue was discovered in wcd9335_codec_enable_dec in sound/soc/codecs/wcd9335.c in the Linux kernel through 5.1.5. It uses kstrndup instead of kmemdup_nul, which allows attackers to have an unspecified impact via unknown vectors. NOTE: The vendor disputes this issues as not being a vulnerability because switching to kmemdup_nul() would only fix a security issue if the source string wasn't NUL-terminated, which is not the case.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in wcd9335_codec_enable_dec in sound/soc/codecs/wcd9335.c in the Linux kernel through 5.1.5. It uses kstrndup instead of kmemdup_nul, which allows attackers to have an unspecified impact via unknown vectors. NOTE: The vendor disputes this issues as not being a vulnerability because switching to kmemdup_nul() would only fix a security issue if the source string wasn't NUL-terminated, which is not the case",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-12454",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-12454",
@@ -42101,8 +42106,8 @@
         },
         "cwe": "NULL Pointer Dereference",
         "fixes": "fcdf445ff42f036d22178b49cf64e92d527c1330",
-        "last_modified": "2021-04-01",
-        "nvd_text": "** DISPUTED ** An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue because \u201cThe memory allocation that was not checked is part of a code that only runs at boot time, before user processes are started. Therefore, there is no possibility for an unprivileged user to control it, and no denial of service.\u201d.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue because \u201cThe memory allocation that was not checked is part of a code that only runs at boot time, before user processes are started. Therefore, there is no possibility for an unprivileged user to control it, and no denial of service.\u201d",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-12455",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-12455",
@@ -42137,8 +42142,8 @@
         },
         "cwe": "Input Validation",
         "fixes": "86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-12456",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-12456",
@@ -43938,8 +43943,8 @@
         },
         "cwe": "NULL Pointer Dereference",
         "fixes": "",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-15290",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-15290",
@@ -44930,8 +44935,8 @@
         "cwe": "NULL Pointer Dereference",
         "fixes": "81de29d842ccb776c0f77aa3e2b11b07fff0c0e2",
         "last_affected_version": "5.4.6",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-16229",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-16229",
@@ -44968,8 +44973,8 @@
         "cwe": "NULL Pointer Dereference",
         "fixes": "81de29d842ccb776c0f77aa3e2b11b07fff0c0e2",
         "last_affected_version": "5.4.6",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** drivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: A third-party software maintainer states that the work queue allocation is happening during device initialization, which for a graphics card occurs during boot. It is not attacker controllable and OOM at that time is highly unlikely.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "drivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: A third-party software maintainer states that the work queue allocation is happening during device initialization, which for a graphics card occurs during boot. It is not attacker controllable and OOM at that time is highly unlikely",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-16230",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-16230",
@@ -46524,8 +46529,8 @@
         "cwe": "Information Exposure",
         "fixes": "b3ff8f1d380e65dddd772542aa9bff6c86bf715a",
         "last_affected_version": "5.6.4",
-        "last_modified": "2020-11-12",
-        "nvd_text": "** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because \u201c1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.\u201d",
+        "last_modified": "2023-11-08",
+        "nvd_text": "__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because \u201c1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19039",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19039",
@@ -46684,8 +46689,8 @@
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab",
         "last_affected_version": "5.4.14",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19046",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19046",
@@ -46804,8 +46809,8 @@
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "e13de8fe0d6a51341671bbe384826d527afe8d44",
         "last_affected_version": "5.3.9",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19049",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19049",
@@ -47043,8 +47048,8 @@
         },
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "1399c59fa92984836db90538cf92397fe7caaa57",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19055",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19055",
@@ -47403,8 +47408,8 @@
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "057b8945f78f76d0b04eeb5c27cd9225e5e7ad86",
         "last_affected_version": "5.4.12",
-        "last_modified": "2020-01-28",
-        "nvd_text": "** DISPUTED ** A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control these failures at probe time.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control these failures at probe time",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19064",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19064",
@@ -47443,8 +47448,8 @@
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "34b3be18a04ecdc610aae4c48e5d1b799d8689f6",
         "last_affected_version": "5.3.8",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19065",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19065",
@@ -47523,8 +47528,8 @@
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "57be09c6e8747bf48704136d9e3f92bfb93f5725",
         "last_affected_version": "5.3.7",
-        "last_modified": "2020-08-05",
-        "nvd_text": "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19067",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19067",
@@ -47643,8 +47648,8 @@
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "d3b0ffa1d75d5305ebe34735598993afbb8a869",
         "last_affected_version": "5.4.6",
-        "last_modified": "2020-01-28",
-        "nvd_text": "** DISPUTED ** A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19070",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19070",
@@ -47883,8 +47888,8 @@
         "cwe": "Uncontrolled Resource Consumption",
         "fixes": "78beef629fd95be4ed853b2d37b832f766bd96ca",
         "last_affected_version": "5.3.5",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** DISPUTED ** A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19076",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19076",
@@ -49521,8 +49526,8 @@
         "cwe": "Use After Free",
         "fixes": "bad8e64fb19d3a0de5e564d9a7271c31bd684369",
         "last_affected_version": "5.8.1",
-        "last_modified": "2021-03-17",
-        "nvd_text": "** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-19770",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-19770",
@@ -51256,8 +51261,8 @@
         "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
         "fixes": "04f5866e41fb70690e28397487d8bd8eea7d712a",
         "last_affected_version": "5.0.9",
-        "last_modified": "2019-08-06",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-11599. Reason: This candidate is a reservation duplicate of CVE-2019-11599. Notes: All CVE users should reference CVE-2019-11599 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-11599. Reason: This candidate is a reservation duplicate of CVE-2019-11599. Notes: All CVE users should reference CVE-2019-11599 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-3892",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-3892",
@@ -52170,8 +52175,8 @@
         "cwe": "Integer Overflow or Wraparound",
         "fixes": "da029c11e6b12f321f36dac8771e833b65cec962",
         "last_affected_version": "4.12.2",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-14634. Reason: This candidate is a reservation duplicate of CVE-2018-14634. Notes: All CVE users should reference CVE-2018-14634 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-14634. Reason: This candidate is a reservation duplicate of CVE-2018-14634. Notes: All CVE users should reference CVE-2018-14634 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-9457",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-9457",
@@ -52249,8 +52254,8 @@
         "cwe": "Improper Input Validation",
         "fixes": "a4176ec356c73a46c07c181c6d04039fafa34a9f",
         "last_affected_version": "5.0.19",
-        "last_modified": "2020-04-17",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-9503. Reason: This candidate is a duplicate of CVE-2019-9503. Notes: All CVE users should reference CVE-2019-9503 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-9503. Reason: This candidate is a duplicate of CVE-2019-9503. Notes: All CVE users should reference CVE-2019-9503 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-9466",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2019-9466",
@@ -52664,8 +52669,8 @@
         "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
         "fixes": "fb73974172ffaaf57a7c42f35424d9aece1a5af6",
         "last_affected_version": "5.6.10",
-        "last_modified": "2020-08-20",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-0255",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-0255",
@@ -53080,8 +53085,8 @@
         "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize",
         "fixes": "18dd6470c2d14d10f5a2dd926925dc80dbd3abfd",
         "last_affected_version": "4.14.85",
-        "last_modified": "2020-10-05",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-14615. Reason: This candidate is a duplicate of CVE-2018-14615. Notes: All CVE users should reference CVE-2018-14615 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-14615. Reason: This candidate is a duplicate of CVE-2018-14615. Notes: All CVE users should reference CVE-2018-14615 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-0435",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-0435",
@@ -53336,8 +53341,8 @@
         "affected_versions": "unk to unk",
         "breaks": "",
         "fixes": "",
-        "last_modified": "2020-06-23",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-10708",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-10708",
@@ -53978,8 +53983,8 @@
         "cwe": "Out-of-bounds Write",
         "fixes": "aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd",
         "last_affected_version": "5.6.2",
-        "last_modified": "2020-04-28",
-        "nvd_text": "** DISPUTED ** An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue \u201cis a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held.\u201d.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue \u201cis a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held.\u201d",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-11565",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-11565",
@@ -54176,8 +54181,8 @@
         },
         "cwe": "Insufficient Information",
         "fixes": "",
-        "last_modified": "2020-06-25",
-        "nvd_text": "** DISPUTED ** snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified \"interesting side effects.\" NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the \"owner\" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info->owner field in a safe way.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified \"interesting side effects.\" NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the \"owner\" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info->owner field in a safe way",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-11725",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-11725",
@@ -54763,8 +54768,8 @@
         "cwe": "Missing Release of Resource after Effective Lifetime",
         "fixes": "f45db2b909c7e76f35850e78f017221f30282b8e",
         "last_affected_version": "5.7.12",
-        "last_modified": "2020-08-18",
-        "nvd_text": "** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-12656",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-12656",
@@ -54883,8 +54888,8 @@
         "cwe": "Missing Release of Resource after Effective Lifetime",
         "fixes": "d80b64ff297e40c2b6f7d7abc1b3eba70d22a068",
         "last_affected_version": "5.4.42",
-        "last_modified": "2020-05-29",
-        "nvd_text": "** DISPUTED ** An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it's a one-time leak at the boot, the size is negligible, and it can't be triggered at will.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it's a one-time leak at the boot, the size is negligible, and it can't be triggered at will",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-12768",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-12768",
@@ -55417,8 +55422,8 @@
         "cmt_msg": "KEYS: prevent creating a different user's keyrings",
         "fixes": "237bbd29f7a049d310d907f4b2716a7feef9abf3",
         "last_affected_version": "4.13.4",
-        "last_modified": "2020-08-20",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-14353",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2020-14353",
@@ -63668,8 +63673,8 @@
         "cwe": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
         "fixes": "51b2ee7d006a736a9126e8111d1f24e4fd0afaa6",
         "last_affected_version": "5.10.9",
-        "last_modified": "2021-05-06",
-        "nvd_text": "** DISPUTED ** fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent this attack; see also the exports(5) no_subtree_check default behavior.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent this attack; see also the exports(5) no_subtree_check default behavior",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-3178",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2021-3178",
@@ -64956,8 +64961,8 @@
         "affected_versions": "unk to unk",
         "breaks": "",
         "fixes": "",
-        "last_modified": "2021-10-22",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-3542",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2021-3542",
@@ -65134,8 +65139,8 @@
         "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
         "fixes": "4ac06a1e013cf5fdd963317ffd3b968560f33bba",
         "last_affected_version": "5.12.9",
-        "last_modified": "2021-08-24",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-38208. Reason: This candidate is a reservation duplicate of CVE-2021-38208. Notes: All CVE users should reference CVE-2021-38208 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-38208. Reason: This candidate is a reservation duplicate of CVE-2021-38208. Notes: All CVE users should reference CVE-2021-38208 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-3587",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2021-3587",
@@ -66128,8 +66133,8 @@
         "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
         "fixes": "d00d8da5869a2608e97cfede094dfc5e11462a46",
         "last_affected_version": "5.13.3",
-        "last_modified": "2021-08-26",
-        "nvd_text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-38160",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2021-38160",
@@ -66769,8 +66774,8 @@
         "affected_versions": "unk to unk",
         "breaks": "",
         "fixes": "",
-        "last_modified": "2021-12-31",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-3892",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2021-3892",
@@ -66787,8 +66792,8 @@
         "cmt_msg": "sctp: account stream padding length for reconf chunk",
         "fixes": "a2d859e3fc97e79d907761550dbc03ff1b36479c",
         "last_affected_version": "5.14.13",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-3894",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2021-3894",
@@ -66805,8 +66810,8 @@
         "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
         "fixes": "1f3e2e97c003f80c4b087092b225c8787ff91e4d",
         "last_affected_version": "5.14.14",
-        "last_modified": "2021-11-10",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-3896",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2021-3896",
@@ -68875,7 +68880,7 @@
         "cwe": "NULL Pointer Dereference",
         "fixes": "9056d6489f5a41cfbb67f719d2c0ce61ead72d9f",
         "last_affected_version": "5.16.2",
-        "last_modified": "2022-02-28",
+        "last_modified": "2023-11-08",
         "nvd_text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-44879",
@@ -70009,8 +70014,8 @@
         "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()",
         "fixes": "032146cda85566abcd1c4884d9d23e4e30a07e9a",
         "last_affected_version": "5.14.14",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0644",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0644",
@@ -71453,8 +71458,8 @@
         "cmt_msg": "floppy: disable FDRAWCMD by default",
         "fixes": "233087ca063686964a53c829d547c7571e3f67bf",
         "last_affected_version": "5.17.5",
-        "last_modified": "2022-06-27",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-33981. Reason: This candidate is a reservation duplicate of CVE-2022-33981. Notes: All CVE users should reference CVE-2022-33981 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-33981. Reason: This candidate is a reservation duplicate of CVE-2022-33981. Notes: All CVE users should reference CVE-2022-33981 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1836",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1836",
@@ -71614,8 +71619,8 @@
         "cwe": "Use After Free",
         "fixes": "520778042ccca019f3ffa136dd0ca565c486cedd",
         "last_affected_version": "5.18.1",
-        "last_modified": "2022-06-27",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1966",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1966",
@@ -71632,8 +71637,8 @@
         "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()",
         "fixes": "fecf31ee395b0295f2d7260aa29946b7605f7c85",
         "last_affected_version": "5.18.1",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1972",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1972",
@@ -72297,8 +72302,8 @@
         "breaks": "",
         "cmt_msg": "io_uring: remove io_identity",
         "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20424",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20424",
@@ -72754,8 +72759,8 @@
         "affected_versions": "unk to unk",
         "breaks": "",
         "fixes": "",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2209",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2209",
@@ -73237,8 +73242,8 @@
         "cmt_msg": "x86/kvm/vmx: Make noinstr clean",
         "fixes": "742ab6df974ae8384a2dd213db1a3a06cf6d8936",
         "last_affected_version": "5.18.13",
-        "last_modified": "2023-01-20",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23816",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23816",
@@ -74116,8 +74121,8 @@
         "cwe": "Unspecified",
         "fixes": "be8de49bea505e7777a69ef63d60e02ac1712683",
         "last_affected_version": "6.1",
-        "last_modified": "2023-03-21",
-        "nvd_text": "When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "\nWhen SMT is enabled, certain AMD processors may speculatively execute instructions using a target\nfrom the sibling thread after an SMT mode switch potentially resulting in information disclosure.\n\n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27672",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27672",
@@ -76285,8 +76290,8 @@
         },
         "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
         "fixes": "f9bf6c03eca1077cae8de0e6d86427656fa42a9b",
-        "last_modified": "2023-01-27",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3522",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3522",
@@ -76392,8 +76397,8 @@
         "cmt_msg": "selftest/bpf: Fix memory leak in kprobe_multi_test",
         "fixes": "6d2e21dc4db3933db65293552ecc1ede26febeca",
         "last_affected_version": "6.1.1",
-        "last_modified": "2023-01-06",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3531",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3531",
@@ -76410,8 +76415,8 @@
         "cmt_msg": "selftests/bpf: Fix memory leak caused by not destroying skeleton",
         "fixes": "6e8280b958c5d7edc514cf347a800b23b7732b2b",
         "last_affected_version": "6.1.1",
-        "last_modified": "2023-01-06",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3532",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3532",
@@ -76485,8 +76490,8 @@
         "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak",
         "fixes": "0152dfee235e87660f52a117fc9f70dc55956bb4",
         "last_affected_version": "6.0.2",
-        "last_modified": "2023-06-04",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3535",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3535",
@@ -76533,8 +76538,8 @@
         "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()",
         "fixes": "b43f9acbb8942b05252be83ac25a81cec70cc192",
         "last_affected_version": "6.0.2",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3542",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3542",
@@ -77350,8 +77355,8 @@
         "affected_versions": "unk to unk",
         "breaks": "",
         "fixes": "",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3642",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3642",
@@ -77647,8 +77652,8 @@
         "cwe": "Use After Free",
         "fixes": "fc7222c3a9f56271fba02aabbfbae999042f1679",
         "last_affected_version": "5.19.10",
-        "last_modified": "2023-01-02",
-        "nvd_text": "Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation.\nWhen io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately.\n\nWe recommend upgrading past commit  https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 \n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3910",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3910",
@@ -77796,8 +77801,8 @@
         "cwe": "Integer Overflow or Wraparound",
         "fixes": "a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7",
         "last_affected_version": "5.15.69",
-        "last_modified": "2023-01-02",
-        "nvd_text": "** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39842",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39842",
@@ -78597,8 +78602,8 @@
         "cwe": "Access of Uninitialized Pointer",
         "fixes": "b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
         "last_affected_version": "6.0.7",
-        "last_modified": "2023-01-02",
-        "nvd_text": "There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
+        "last_modified": "2023-11-08",
+        "nvd_text": "There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.\nWe recommend upgrading past commit\u00a0 https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url \n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42895",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42895",
@@ -78627,8 +78632,8 @@
         "cwe": "Use After Free",
         "fixes": "711f8c3fb3db61897080468586b970c87c61d9e4",
         "last_affected_version": "6.0.7",
-        "last_modified": "2023-01-02",
-        "nvd_text": "There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
+        "last_modified": "2023-11-08",
+        "nvd_text": "There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth.\u00a0A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.\n\nWe recommend upgrading past commit\u00a0  https://www.google.com/url  https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url \n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42896",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42896",
@@ -79185,8 +79190,8 @@
         },
         "cwe": "Use After Free",
         "fixes": "44526bedc2ff8fcd58552e3c5bae928524b6f13c",
-        "last_modified": "2023-01-27",
-        "nvd_text": "There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above",
+        "last_modified": "2023-11-08",
+        "nvd_text": "There exists a use-after-free vulnerability in the Linux kernel through io_uring and the\u00a0IORING_OP_SPLICE operation. If\u00a0IORING_OP_SPLICE is\u00a0missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4696",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4696",
@@ -79795,8 +79800,8 @@
         "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF",
         "fixes": "60e2793d440a3ec95abb5d6d4fc034a4b480472d",
         "last_affected_version": "5.15.2",
-        "last_modified": "2023-02-11",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2023. Notes: none.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2023. Notes: none.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0047",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0047",
@@ -79939,8 +79944,8 @@
             "score": 7.8
         },
         "fixes": "1e6fa5216a0e59ef02e8b6b40d553238a3b81d49",
-        "last_modified": "2023-02-11",
-        "nvd_text": "There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.\n\nIn the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0240",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0240",
@@ -80554,7 +80559,8 @@
         "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs",
         "fixes": "98bea253aa28ad8be2ce565a9ca21beb4a9419e5",
         "last_affected_version": "6.3.3",
-        "last_modified": "2023-07-19",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1192",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1192",
@@ -80569,7 +80575,8 @@
         "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e",
         "cmt_msg": "ksmbd: delete asynchronous work from list",
         "fixes": "3a9b557f44ea8f216aab515a7db20e23f0eb51b9",
-        "last_modified": "2023-10-30",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1193",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1193",
@@ -80585,7 +80592,8 @@
         "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()",
         "fixes": "fc6c6a3c324c1b3e93a03d0cfa3749c781f23de0",
         "last_affected_version": "6.3.7",
-        "last_modified": "2023-09-27",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1194",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1194",
@@ -82076,8 +82084,8 @@
         "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
         "fixes": "3037933448f60f9acb705997eae62013ecb81e0d",
         "last_affected_version": "6.2",
-        "last_modified": "2023-06-30",
-        "nvd_text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2248",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2248",
@@ -82421,8 +82429,8 @@
             "score": 5.5
         },
         "fixes": "4a625ceee8a0ab0273534cb6b432ce6b331db5ee",
-        "last_modified": "2023-03-21",
-        "nvd_text": "** DISPUTED ** In the Linux kernel before 6.2, mm/memory-tiers.c misinterprets the alloc_memory_type return value (expects it to be NULL in the error case, whereas it is actually an error pointer). NOTE: this is disputed by third parties because there are no realistic cases in which a user can cause the alloc_memory_type error case to be reached.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "In the Linux kernel before 6.2, mm/memory-tiers.c misinterprets the alloc_memory_type return value (expects it to be NULL in the error case, whereas it is actually an error pointer). NOTE: this is disputed by third parties because there are no realistic cases in which a user can cause the alloc_memory_type error case to be reached.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23005",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23005",
@@ -82595,8 +82603,8 @@
             "score": 5.5
         },
         "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee",
-        "last_modified": "2023-03-03",
-        "nvd_text": "Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process. timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker threads, thus it is possible to insert a time namespace's vvar page to process's memory space via a page fault. When this time namespace is destroyed, the vvar page is also freed, but not removed from the process' memory, and a next page allocated by the kernel will be still available from the user-space process and can leak memory contents via this (read-only) use-after-free vulnerability. We recommend upgrading past version 5.10.161 or commit 788d0824269bef539fe31a785b1517882eafed93 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process.\u00a0timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker threads, thus it is possible to insert a time namespace's vvar page to process's memory space via a page fault. When this time namespace is destroyed, the vvar page is also freed, but not removed from the process' memory, and a next page allocated by the kernel will be still available from the user-space process and can leak memory contents via this (read-only) use-after-free vulnerability. We recommend upgrading past version 5.10.161 or commit\u00a0 788d0824269bef539fe31a785b1517882eafed93 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring \n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23586",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23586",
@@ -82641,8 +82649,8 @@
         "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition",
         "fixes": "6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
         "last_affected_version": "6.2.8",
-        "last_modified": "2023-05-25",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2483",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2483",
@@ -82729,8 +82737,8 @@
         },
         "cwe": "Unspecified",
         "fixes": "bb6d73d9add68ad270888db327514384dfa44958",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-09-17",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-25775",
@@ -83585,8 +83593,8 @@
             "score": 5.5
         },
         "fixes": "017c73a34a661a861712f7cc1393a123e5b2208c",
-        "last_affected_version": "6.1.56",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.6",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31085",
@@ -83644,8 +83652,8 @@
         },
         "fixes": "1240eb93f0616b21c675416516ff3d74798fdc97",
         "last_affected_version": "6.3.8",
-        "last_modified": "2023-08-25",
-        "nvd_text": "** REJECT ** Duplicate of CVE-2023-3390.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: Duplicate of CVE-2023-3390.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3117",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3117",
@@ -84615,7 +84623,8 @@
         "affected_versions": "unk to unk",
         "breaks": "",
         "fixes": "",
-        "last_modified": "2023-06-29",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3397",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3397",
@@ -84631,8 +84640,8 @@
         "cmt_msg": "xfs: verify buffer contents when we skip log replay",
         "fixes": "22ed903eee23a5b174e240f1cdfa9acf393a5210",
         "last_affected_version": "6.3.6",
-        "last_modified": "2023-06-30",
-        "nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2124. Reason: This candidate is a duplicate of CVE-2023-2124. Notes: All CVE users should reference CVE-2023-2124 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2124. Reason: This candidate is a duplicate of CVE-2023-2124. Notes: All CVE users should reference CVE-2023-2124 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34255",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34255",
@@ -84661,8 +84670,8 @@
         },
         "fixes": "4f04351888a83e595571de672e0a4a8b74f4fb31",
         "last_affected_version": "6.3.2",
-        "last_modified": "2023-06-30",
-        "nvd_text": "** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34256",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34256",
@@ -84706,8 +84715,8 @@
         "breaks": "54c9de89895e0a36047fcc4ae754ea5b8655fb9d",
         "cmt_msg": "xen/events: replace evtchn_rwlock with RCU",
         "fixes": "87797fad6cce28ec9be3c13f031776ff4f104cfc",
-        "last_affected_version": "6.1.56",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.6",
+        "last_modified": "2023-11-08",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34324",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34324",
@@ -84793,7 +84802,7 @@
         },
         "fixes": "226fae124b2dac217ea5436060d623ff3385bc34",
         "last_affected_version": "6.1.10",
-        "last_modified": "2023-09-27",
+        "last_modified": "2023-11-08",
         "nvd_text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3567",
@@ -84965,8 +84974,8 @@
             "score": 7.0
         },
         "fixes": "3971442870713de527684398416970cf025b4f89",
-        "last_affected_version": "6.1.58",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.7",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35827",
@@ -85166,8 +85175,8 @@
             "score": 4.6
         },
         "fixes": "ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-09-17",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-37453",
@@ -85677,8 +85686,8 @@
             "score": 6.0
         },
         "fixes": "f4f8a7803119005e87b716874bec07c751efafec",
-        "last_affected_version": "6.1.53",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.3",
+        "last_modified": "2023-11-08",
         "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39189",
@@ -85690,8 +85699,8 @@
         }
     },
     "CVE-2023-39191": {
-        "affected_versions": "unk to v6.3-rc1",
-        "breaks": "",
+        "affected_versions": "v5.19-rc1 to v6.3-rc1",
+        "breaks": "97e03f521050c092919591e668107b3d69c5f426",
         "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots",
         "cvss3": {
             "Attack Complexity": "Low",
@@ -85708,7 +85717,7 @@
         "cwe": "Unspecified",
         "fixes": "d6fefa1105dacc8a742cdcf2f4bfb501c9e61349",
         "last_affected_version": "6.2.2",
-        "last_modified": "2023-10-18",
+        "last_modified": "2023-11-08",
         "nvd_text": "An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39191",
@@ -85736,8 +85745,8 @@
             "score": 6.0
         },
         "fixes": "69c5d284f67089b4750d28ff6ac6f52ec224b330",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39192",
@@ -85765,8 +85774,8 @@
             "score": 6.0
         },
         "fixes": "e99476497687ef9e850748fe6d232264f30bc8f9",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39193",
@@ -85921,8 +85930,8 @@
         }
     },
     "CVE-2023-40791": {
-        "affected_versions": "unk to v6.5-rc6",
-        "breaks": "",
+        "affected_versions": "v6.3-rc1 to v6.5-rc6",
+        "breaks": "0185846975339a5c348373aa450a977f5242366b",
         "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()",
         "cvss3": {
             "Attack Complexity": "Low",
@@ -85939,7 +85948,7 @@
         "cwe": "Unspecified",
         "fixes": "f443fd5af5dbd531f880d3645d5dd36976cf087f",
         "last_affected_version": "6.4.11",
-        "last_modified": "2023-10-30",
+        "last_modified": "2023-11-08",
         "nvd_text": "extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-40791",
@@ -86302,8 +86311,8 @@
             "score": 5.5
         },
         "fixes": "c3b704d4a4a265660e665df51b129e8425216ed1",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-10-30",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42752",
@@ -86331,8 +86340,8 @@
             "score": 7.8
         },
         "fixes": "050d91c03b28ca479df13dfb02bcd2c60dd6a878",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-09-27",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42753",
@@ -86360,8 +86369,8 @@
             "score": 5.5
         },
         "fixes": "0113d9c9d1ccc07f5a3710dac4aa24b6d711278c",
-        "last_affected_version": "6.1.55",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.5",
+        "last_modified": "2023-11-08",
         "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42754",
@@ -86418,7 +86427,8 @@
             "score": 4.7
         },
         "fixes": "7433b6d2afd512d04398c73aa984d1e285be125b",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.5",
+        "last_modified": "2023-11-08",
         "nvd_text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42756",
@@ -86609,8 +86619,8 @@
         "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk",
         "fixes": "24138933b97b055d486e8064b4a1721702442a9b",
         "last_affected_version": "6.4.10",
-        "last_modified": "2023-10-18",
-        "nvd_text": "** REJECT ** This was assigned as a duplicate of CVE-2023-4244.",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: This was assigned as a duplicate of CVE-2023-4244.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4563",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4563",
@@ -86651,8 +86661,8 @@
         }
     },
     "CVE-2023-45862": {
-        "affected_versions": "unk to v6.3-rc1",
-        "breaks": "",
+        "affected_versions": "v3.1-rc1 to v6.3-rc1",
+        "breaks": "33842cedfc33ee907b2a702f321a26f7c0bf0aaa",
         "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object",
         "cvss3": {
             "Attack Complexity": "Low",
@@ -86668,7 +86678,7 @@
         },
         "fixes": "ce33e64c1788912976b61314b56935abd4bc97ef",
         "last_affected_version": "6.2.4",
-        "last_modified": "2023-10-30",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45862",
@@ -86680,8 +86690,8 @@
         }
     },
     "CVE-2023-45863": {
-        "affected_versions": "unk to v6.3-rc1",
-        "breaks": "",
+        "affected_versions": "v2.6.12-rc2 to v6.3-rc1",
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
         "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()",
         "cvss3": {
             "Attack Complexity": "High",
@@ -86697,7 +86707,7 @@
         },
         "fixes": "3bb2a01caa813d3a1845d378bbe4169ef280d394",
         "last_affected_version": "6.2.2",
-        "last_modified": "2023-10-30",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45863",
@@ -86725,8 +86735,8 @@
             "score": 9.8
         },
         "fixes": "bb5ed01cd2428cd25b1c88a3a9cba87055eb289f",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-10-30",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45871",
@@ -86754,7 +86764,8 @@
             "score": 7.8
         },
         "fixes": "768d612f79822d30a1e7d132a4d4b05337ce42ec",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.3",
+        "last_modified": "2023-11-08",
         "nvd_text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45898",
@@ -86771,7 +86782,8 @@
         "cmt_msg": "Revert \"mm: vmscan: make global slab shrink lockless\"",
         "fixes": "71c3ad65fabec9620d3f548b2da948c79c7ad9d5",
         "last_affected_version": "6.3",
-        "last_modified": "2023-10-31",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: The SRCU code was added in upstream kernel v6.4-rc1 and removed before v6.4. This bug only existed in development kernels. Please see https://lore.kernel.org/all/ZTKVfoQZplpB8rki@casper.infradead.org and https://bugzilla.suse.com/show_bug.cgi?id=1215932 for more information.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4610",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4610",
@@ -86855,8 +86867,8 @@
             "score": 7.8
         },
         "fixes": "b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
-        "last_affected_version": "6.4.15",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.2",
+        "last_modified": "2023-11-08",
         "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4623",
@@ -86871,9 +86883,22 @@
         "affected_versions": "v5.10-rc1 to v6.6-rc7",
         "breaks": "597cfe48212a3f110ab0f918bf59791f453e65b7",
         "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space",
+        "cvss3": {
+            "Attack Complexity": "High",
+            "Attack Vector": "Local",
+            "Availability": "High",
+            "Confidentiality": "High",
+            "Integrity": "High",
+            "Privileges Required": "Low",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+            "score": 7.0
+        },
+        "cwe": "Unspecified",
         "fixes": "63e44bc52047f182601e7817da969a105aa1f721",
-        "last_affected_version": "6.1.59",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.8",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46813",
@@ -86888,8 +86913,21 @@
         "affected_versions": "unk to v6.6",
         "breaks": "",
         "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid",
+        "cvss3": {
+            "Attack Complexity": "High",
+            "Attack Vector": "Local",
+            "Availability": "High",
+            "Confidentiality": "None",
+            "Integrity": "None",
+            "Privileges Required": "Low",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
+            "score": 4.7
+        },
         "fixes": "7644b1a1c9a7ae8ab99175989bfc8676055edb46",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5",
+        "last_modified": "2023-11-08",
         "nvd_text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46862",
@@ -86900,6 +86938,21 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2023-46862"
         }
     },
+    "CVE-2023-47233": {
+        "affected_versions": "unk to unk",
+        "breaks": "",
+        "fixes": "",
+        "last_modified": "2023-11-08",
+        "nvd_text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
+        "ref_urls": {
+            "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-47233",
+            "ExploitDB": "https://www.exploit-db.com/search?cve=2023-47233",
+            "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-47233",
+            "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-47233",
+            "SUSE": "https://www.suse.com/security/cve/CVE-2023-47233",
+            "Ubuntu": "https://ubuntu.com/security/CVE-2023-47233"
+        }
+    },
     "CVE-2023-4732": {
         "affected_versions": "v2.6.12-rc2 to v5.14-rc1",
         "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
@@ -86946,9 +86999,9 @@
             "score": 7.1
         },
         "fixes": "fd94d9dadee58e09b49075240fe83423eb1dcd36",
-        "last_affected_version": "6.1.53",
-        "last_modified": "2023-10-18",
-        "nvd_text": "** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.",
+        "last_affected_version": "6.5.3",
+        "last_modified": "2023-11-08",
+        "nvd_text": "Rejected reason: CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4881",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4881",
@@ -86976,8 +87029,8 @@
             "score": 7.8
         },
         "fixes": "8fc134fee27f2263988ae38920bc03da416b03d8",
-        "last_affected_version": "6.1.53",
-        "last_modified": "2023-09-27",
+        "last_affected_version": "6.5.3",
+        "last_modified": "2023-11-08",
         "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.\n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4921",
@@ -86989,11 +87042,13 @@
         }
     },
     "CVE-2023-5090": {
-        "affected_versions": "unk to v6.6-rc7",
-        "breaks": "",
+        "affected_versions": "v6.0-rc1 to v6.6-rc7",
+        "breaks": "4d1d7942e36add0aa741a62d0c8e3aba2d5b3ab1",
         "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception",
         "fixes": "b65235f6e102354ccafda601eaa1c5bef5284d21",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.8",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5090",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5090",
@@ -87021,8 +87076,8 @@
         },
         "cwe": "Unspecified",
         "fixes": "7aed44babc7f97e82b38e9a68515e699692cc100",
-        "last_affected_version": "6.1.56",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.6",
+        "last_modified": "2023-11-08",
         "nvd_text": "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5158",
@@ -87034,12 +87089,13 @@
         }
     },
     "CVE-2023-5178": {
-        "affected_versions": "unk to v6.6-rc7",
-        "breaks": "",
+        "affected_versions": "v5.0-rc1 to v6.6-rc7",
+        "breaks": "872d26a391da92ed8f0c0f5cb5fef428067b7f30",
         "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup",
         "fixes": "d920abd1e7c4884f9ecd0749d1921b7ab19ddfbd",
-        "last_affected_version": "6.1.59",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.8",
+        "last_modified": "2023-11-08",
+        "nvd_text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation in case that the attacker already has local privileges.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5178",
             "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5178",
@@ -87066,8 +87122,8 @@
             "score": 6.6
         },
         "fixes": "f15f29fd4779be8a418b66e9d52979bb6d6c2325",
-        "last_affected_version": "6.1.55",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.5",
+        "last_modified": "2023-11-08",
         "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.\n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5197",
@@ -87095,8 +87151,8 @@
             "score": 7.8
         },
         "fixes": "e6e43b8aa7cd3c3af686caf0c2e11819a886d705",
-        "last_affected_version": "6.1.55",
-        "last_modified": "2023-10-18",
+        "last_affected_version": "6.5.5",
+        "last_modified": "2023-11-08",
         "nvd_text": "A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.\n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5345",
@@ -87111,8 +87167,21 @@
         "affected_versions": "unk to v6.6-rc6",
         "breaks": "",
         "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces",
+        "cvss3": {
+            "Attack Complexity": "Low",
+            "Attack Vector": "Local",
+            "Availability": "High",
+            "Confidentiality": "High",
+            "Integrity": "High",
+            "Privileges Required": "Low",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+            "score": 7.8
+        },
         "fixes": "91398b413d03660fd5828f7b4abc64e884b98069",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.7",
+        "last_modified": "2023-11-08",
         "nvd_text": "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5633",
@@ -87124,12 +87193,24 @@
         }
     },
     "CVE-2023-5717": {
-        "affected_versions": "unk to v6.6-rc7",
-        "breaks": "",
+        "affected_versions": "v4.4-rc1 to v6.6-rc7",
+        "breaks": "fa8c269353d560b7c28119ad7617029f92e40b15",
         "cmt_msg": "perf: Disallow mis-matched inherited group reads",
+        "cvss3": {
+            "Attack Complexity": "Low",
+            "Attack Vector": "Local",
+            "Availability": "High",
+            "Confidentiality": "High",
+            "Integrity": "High",
+            "Privileges Required": "Low",
+            "Scope": "Unchanged",
+            "User Interaction": "None",
+            "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+            "score": 7.8
+        },
         "fixes": "32671e3799ca2e4590773fd0e63aaa4229e50c06",
-        "last_affected_version": "6.1.59",
-        "last_modified": "2023-10-31",
+        "last_affected_version": "6.5.8",
+        "last_modified": "2023-11-08",
         "nvd_text": "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n",
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5717",
diff --git a/data/stream_data.json b/data/stream_data.json
index 72ac0a1..8c527cb 100644
--- a/data/stream_data.json
+++ b/data/stream_data.json
@@ -2088,9 +2088,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -2232,9 +2229,6 @@
             "CVE-2022-2588": {
                 "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
             }, 
-            "CVE-2023-5717": {
-                "cmt_msg": "perf: Disallow mis-matched inherited group reads"
-            }, 
             "CVE-2023-4134": {
                 "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()"
             }, 
@@ -3312,9 +3306,6 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -3978,6 +3969,9 @@
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -4119,9 +4113,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -4392,9 +4383,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -4932,9 +4920,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -5445,9 +5430,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -6279,9 +6261,6 @@
             "CVE-2020-13143": {
                 "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
@@ -6483,8 +6462,8 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -7407,6 +7386,9 @@
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -7608,9 +7590,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -8590,9 +8569,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -9085,9 +9061,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -10018,8 +9991,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -10873,6 +10846,9 @@
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -11071,9 +11047,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -11401,9 +11374,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -11906,9 +11876,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -12413,9 +12380,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -13406,8 +13370,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -13601,9 +13565,6 @@
             "CVE-2021-22543": {
                 "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
@@ -14297,6 +14258,9 @@
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -14498,9 +14462,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -15347,9 +15308,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -15830,9 +15788,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -16718,8 +16673,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -17546,6 +17501,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -17735,9 +17693,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -18044,9 +17999,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-0590": {
                 "cmt_msg": "net: sched: fix race condition in qdisc_graft()"
             }, 
@@ -22153,6 +22105,20 @@
                 "cmt_id": "555e15e93f6dbb8ce6b5b92e5272473abfe8bd2b"
             }
         }, 
+        "4.14.329": {
+            "CVE-2023-3567": {
+                "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", 
+                "cmt_id": "af79ea9a2443016f64d8fd8d72020cc874f0e066"
+            }, 
+            "CVE-2021-44879": {
+                "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", 
+                "cmt_id": "a481db81e7ead1369acca8e13b6939778cb7d2c5"
+            }, 
+            "CVE-2023-45863": {
+                "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", 
+                "cmt_id": "b43cf5ad5241d6f33a02c93271a282d5ed6c4cce"
+            }
+        }, 
         "outstanding": {
             "CVE-2023-20593": {
                 "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix"
@@ -22193,9 +22159,6 @@
             "CVE-2023-2007": {
                 "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
@@ -22220,9 +22183,6 @@
             "CVE-2020-27820": {
                 "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-24503": {
                 "cmt_msg": ""
             }, 
@@ -22232,9 +22192,6 @@
             "CVE-2019-19449": {
                 "cmt_msg": "f2fs: fix to do sanity check on segment/section count"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2023-5633": {
                 "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces"
             }, 
@@ -22301,6 +22258,9 @@
             "CVE-2022-3115": {
                 "cmt_msg": "drm: mali-dp: potential dereference of null pointer"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-23000": {
                 "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function"
             }, 
@@ -22319,9 +22279,6 @@
             "CVE-2019-12378": {
                 "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
             }, 
-            "CVE-2023-45863": {
-                "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()"
-            }, 
             "CVE-2023-1582": {
                 "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry"
             }, 
@@ -22346,9 +22303,6 @@
             "CVE-2022-3636": {
                 "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-20908": {
                 "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down"
             }, 
@@ -22544,9 +22498,6 @@
             "CVE-2022-36402": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-3567": {
-                "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF"
-            }, 
             "CVE-2008-4609": {
                 "cmt_msg": ""
             }, 
@@ -22694,9 +22645,6 @@
             "CVE-2022-20166": {
                 "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions"
             }, 
-            "CVE-2023-3863": {
-                "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
-            }, 
             "CVE-2019-12380": {
                 "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code"
             }, 
@@ -22727,8 +22675,8 @@
             "CVE-2023-1281": {
                 "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu"
             }, 
-            "CVE-2021-44879": {
-                "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
+            "CVE-2023-3863": {
+                "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
             }, 
             "CVE-2023-30456": {
                 "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4"
@@ -23224,9 +23172,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
@@ -23689,9 +23634,6 @@
             "CVE-2018-16871": {
                 "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -24538,8 +24480,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -25327,6 +25269,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
@@ -25504,9 +25449,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -25807,9 +25749,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -26278,9 +26217,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -26758,9 +26694,6 @@
             "CVE-2018-16871": {
                 "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -27640,8 +27573,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -28444,6 +28377,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -28630,9 +28566,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -28936,9 +28869,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -32566,6 +32496,16 @@
                 "cmt_id": "a714491fa92d2068358dd603cc50bf2062517bd8"
             }
         }, 
+        "4.19.298": {
+            "CVE-2021-44879": {
+                "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", 
+                "cmt_id": "45c9da086dded78a12bc580f5bb012545a910803"
+            }, 
+            "CVE-2023-45863": {
+                "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", 
+                "cmt_id": "0af6c6c15681cf80aeb85fcb3a1928c63aa89deb"
+            }
+        }, 
         "outstanding": {
             "CVE-2021-0929": {
                 "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
@@ -32600,9 +32540,6 @@
             "CVE-2018-1121": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
@@ -32645,9 +32582,6 @@
             "CVE-2019-19449": {
                 "cmt_msg": "f2fs: fix to do sanity check on segment/section count"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2020-24504": {
                 "cmt_msg": "ice: create scheduler aggregator node config and move VSIs"
             }, 
@@ -32708,6 +32642,9 @@
             "CVE-2022-3115": {
                 "cmt_msg": "drm: mali-dp: potential dereference of null pointer"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-23000": {
                 "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function"
             }, 
@@ -32726,9 +32663,6 @@
             "CVE-2019-12378": {
                 "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
             }, 
-            "CVE-2023-45863": {
-                "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()"
-            }, 
             "CVE-2023-1582": {
                 "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry"
             }, 
@@ -32753,9 +32687,6 @@
             "CVE-2022-3636": {
                 "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-20908": {
                 "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down"
             }, 
@@ -32921,9 +32852,6 @@
             "CVE-2022-36402": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2008-4609": {
                 "cmt_msg": ""
             }, 
@@ -33068,9 +32996,6 @@
             "CVE-2022-20166": {
                 "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions"
             }, 
-            "CVE-2023-3863": {
-                "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
-            }, 
             "CVE-2019-12380": {
                 "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code"
             }, 
@@ -33098,8 +33023,8 @@
             "CVE-2023-1281": {
                 "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu"
             }, 
-            "CVE-2021-44879": {
-                "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
+            "CVE-2023-3863": {
+                "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local"
             }, 
             "CVE-2020-12656": {
                 "cmt_msg": "sunrpc: check that domain table is empty at module unload."
@@ -33555,9 +33480,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
@@ -34014,9 +33936,6 @@
             "CVE-2022-2503": {
                 "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -34851,8 +34770,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -35622,6 +35541,9 @@
             "CVE-2023-1390": {
                 "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
@@ -35787,9 +35709,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -36087,9 +36006,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -37906,12 +37822,6 @@
             "CVE-2022-0002": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2015-4178": {
                 "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused."
             }, 
@@ -38143,9 +38053,6 @@
             "CVE-2019-19922": {
                 "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices"
             }, 
-            "CVE-2023-5717": {
-                "cmt_msg": "perf: Disallow mis-matched inherited group reads"
-            }, 
             "CVE-2019-19927": {
                 "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
             }, 
@@ -39223,9 +39130,6 @@
             "CVE-2023-2007": {
                 "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2020-26557": {
                 "cmt_msg": ""
             }, 
@@ -39280,9 +39184,6 @@
             "CVE-2020-0066": {
                 "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -40057,6 +39958,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -41895,12 +41799,6 @@
             "CVE-2022-0002": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2015-4178": {
                 "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused."
             }, 
@@ -42888,9 +42786,6 @@
             "CVE-2023-1829": {
                 "cmt_msg": "net/sched: Retire tcindex classifier"
             }, 
-            "CVE-2023-5717": {
-                "cmt_msg": "perf: Disallow mis-matched inherited group reads"
-            }, 
             "CVE-2019-19227": {
                 "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client"
             }, 
@@ -43341,9 +43236,6 @@
             "CVE-2023-2007": {
                 "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2017-7472": {
                 "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings"
             }, 
@@ -43398,9 +43290,6 @@
             "CVE-2020-0066": {
                 "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -44256,6 +44145,9 @@
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -47697,9 +47589,6 @@
             "CVE-2020-24588": {
                 "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks"
             }, 
-            "CVE-2023-5717": {
-                "cmt_msg": "perf: Disallow mis-matched inherited group reads"
-            }, 
             "CVE-2018-10087": {
                 "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()"
             }, 
@@ -47790,9 +47679,6 @@
             "CVE-2022-0002": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2015-4178": {
                 "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused."
             }, 
@@ -48651,9 +48537,6 @@
             "CVE-2020-28374": {
                 "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2023-3006": {
                 "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list"
             }, 
@@ -48675,9 +48558,6 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -49176,6 +49056,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -49521,9 +49404,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -49598,6 +49478,657 @@
             }
         }
     }, 
+    "6.6": {
+        "6.6": {
+            "CVE-2023-46862": {
+                "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", 
+                "cmt_id": "7644b1a1c9a7ae8ab99175989bfc8676055edb46"
+            }
+        }, 
+        "outstanding": {
+            "CVE-2020-26556": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26557": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-20794": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26559": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-35501": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-4010": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-1121": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-19378": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-24503": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-24502": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-11725": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-23825": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3397": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3864": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3606": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-19814": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-2209": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-26934": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2016-8660": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-15802": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-36402": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2008-2544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-15239": {
+                "cmt_msg": "unknown"
+            }, 
+            "CVE-2007-3719": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-20941": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-21400": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-2640": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2010-4563": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26140": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26143": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26142": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3533": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-1247": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-10708": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-4543": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2017-13693": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-0399": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2017-13694": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2012-4542": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2013-7445": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2005-3660": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-31082": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-31081": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3238": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2008-4609": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-14304": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-0347": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3714": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-12456": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26560": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3892": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-37454": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3642": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2011-4917": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-15902": {
+                "cmt_msg": "unknown"
+            }, 
+            "CVE-2019-15290": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-17977": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-26878": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-1116": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2010-5321": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12930": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12931": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39801": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39800": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45885": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45884": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3542": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12929": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12928": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-25220": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2015-2877": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-26242": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-16089": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-32629": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-0400": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-44034": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3847": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-2961": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-25265": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2011-4916": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-23039": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3640": {
+                "cmt_msg": ""
+            }
+        }
+    }, 
+    "6.5": {
+        "6.5.3": {
+            "CVE-2023-4623": {
+                "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", 
+                "cmt_id": "eb07894c51c7d6bb8d00948a3e6e7b52c791e93e"
+            }, 
+            "CVE-2023-25775": {
+                "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", 
+                "cmt_id": "782c5702b933477b088e80e6d07b9493145b2916"
+            }, 
+            "CVE-2023-37453": {
+                "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()", 
+                "cmt_id": "b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5"
+            }, 
+            "CVE-2023-42753": {
+                "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", 
+                "cmt_id": "d95c8420efe684b964e3aa28108e9a354bcd7225"
+            }, 
+            "CVE-2023-42752": {
+                "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", 
+                "cmt_id": "3138192865c2a1f089dd27a7d80a7271ecd468e7"
+            }, 
+            "CVE-2023-45871": {
+                "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", 
+                "cmt_id": "dad92377fc6e012e481c6f4a75e32e48fe2777db"
+            }, 
+            "CVE-2023-39193": {
+                "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", 
+                "cmt_id": "85ebbbe845823be6f8c04b4901da9a0a6f866283"
+            }, 
+            "CVE-2023-39192": {
+                "cmt_msg": "netfilter: xt_u32: validate user space input", 
+                "cmt_id": "799cc0fb184408f688b030ea381844b16d1d9c62"
+            }
+        }, 
+        "6.5.4": {
+            "CVE-2023-4881": {
+                "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", 
+                "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce"
+            }, 
+            "CVE-2023-4921": {
+                "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", 
+                "cmt_id": "e5471b82c36396e809817cb988dfc4bce0a688cb"
+            }, 
+            "CVE-2023-45898": {
+                "cmt_msg": "ext4: fix slab-use-after-free in ext4_es_insert_extent()", 
+                "cmt_id": "c15bf3330a9e3c01b23e59899a6a02432a62ddc3"
+            }, 
+            "CVE-2023-39189": {
+                "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", 
+                "cmt_id": "a3d0f898b80ac9b049e590b3ee6391716002da17"
+            }
+        }, 
+        "6.5.6": {
+            "CVE-2023-42754": {
+                "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", 
+                "cmt_id": "cda20fcddf53f0f959641c8ef4d50ab87ffa5124"
+            }, 
+            "CVE-2023-42756": {
+                "cmt_msg": "netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP", 
+                "cmt_id": "20a93d402b6fe6757e14b0eeb400dfac8b8aa3ad"
+            }, 
+            "CVE-2023-5197": {
+                "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", 
+                "cmt_id": "13f385f99147b4445a1ff151fabd44c12d366ab0"
+            }, 
+            "CVE-2023-5345": {
+                "cmt_msg": "fs/smb/client: Reset password pointer to NULL", 
+                "cmt_id": "0c116005af551e9cf437a9ec8c80204c2d4b1b53"
+            }
+        }, 
+        "6.5.7": {
+            "CVE-2023-34324": {
+                "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", 
+                "cmt_id": "76b33722e2d2336a6e2a7d9eacbbb8988478cf98"
+            }, 
+            "CVE-2023-31085": {
+                "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", 
+                "cmt_id": "87b9858e404069817cd4b31830e0a1b9b3d183c4"
+            }, 
+            "CVE-2023-5158": {
+                "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", 
+                "cmt_id": "0bf2b9c2f3545ffce5720de61c33fc171c0e480a"
+            }
+        }, 
+        "6.5.8": {
+            "CVE-2023-5633": {
+                "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces", 
+                "cmt_id": "1474b39f961703d0bb33833a6d6b112826839781"
+            }, 
+            "CVE-2023-35827": {
+                "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", 
+                "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705"
+            }
+        }, 
+        "6.5.9": {
+            "CVE-2023-46813": {
+                "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", 
+                "cmt_id": "11b975cb82cc6d88e8b04f77a673077ac5c30c8b"
+            }, 
+            "CVE-2023-5717": {
+                "cmt_msg": "perf: Disallow mis-matched inherited group reads", 
+                "cmt_id": "20f925d38e1ecc1d36ee6bf6e325fb514a6f727d"
+            }, 
+            "CVE-2023-5090": {
+                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception", 
+                "cmt_id": "94805f9d3a3fb1f091bcc08b9c4846c4346706eb"
+            }, 
+            "CVE-2023-5178": {
+                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup", 
+                "cmt_id": "675f0e9bb716fa3252979145b9b1a950140e94e9"
+            }
+        }, 
+        "6.5.10": {
+            "CVE-2023-46862": {
+                "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", 
+                "cmt_id": "56e08ccc969796168f0e6adf6642f8546f54ba6f"
+            }
+        }, 
+        "outstanding": {
+            "CVE-2020-26556": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26557": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-20794": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26559": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-35501": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-4010": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-1121": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-19378": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-24503": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-24502": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-11725": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-23825": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3397": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3864": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3606": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-19814": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-2209": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-26934": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2016-8660": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-15802": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-36402": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2008-2544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-15239": {
+                "cmt_msg": "unknown"
+            }, 
+            "CVE-2007-3719": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-20941": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-21400": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-2640": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2010-4563": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26140": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26143": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26142": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3533": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-1247": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-10708": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-4543": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2017-13693": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-0399": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2017-13694": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2012-4542": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2013-7445": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2005-3660": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-31083": {
+                "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO"
+            }, 
+            "CVE-2023-31082": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-31081": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3238": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2008-4609": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-14304": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-0347": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3714": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-12456": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-26560": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3892": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-37454": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3642": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2011-4917": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-15902": {
+                "cmt_msg": "unknown"
+            }, 
+            "CVE-2019-15290": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-17977": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-26878": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-1116": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2010-5321": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12930": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12931": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39801": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39800": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45885": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-45884": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3542": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12929": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12928": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-25220": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2015-2877": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-26242": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-16089": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-32629": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-0400": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-44034": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3847": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-2961": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-25265": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2011-4916": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-23039": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2023-3640": {
+                "cmt_msg": ""
+            }
+        }
+    }, 
     "6.4": {
         "6.4": {
             "CVE-2023-3865": {
@@ -49894,6 +50425,9 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
             }, 
@@ -52452,12 +52986,6 @@
             "CVE-2022-3635": {
                 "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2015-4178": {
                 "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused."
             }, 
@@ -52671,9 +53199,6 @@
             "CVE-2019-19922": {
                 "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices"
             }, 
-            "CVE-2023-5717": {
-                "cmt_msg": "perf: Disallow mis-matched inherited group reads"
-            }, 
             "CVE-2019-19927": {
                 "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
             }, 
@@ -53496,9 +54021,6 @@
             "CVE-2023-2007": {
                 "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2019-14896": {
                 "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor"
             }, 
@@ -53526,9 +54048,6 @@
             "CVE-2020-0066": {
                 "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
             }, 
@@ -54180,6 +54699,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -55094,6 +55616,9 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-3141": {
                 "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition"
             }, 
@@ -55352,9 +55877,6 @@
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
@@ -56399,6 +56921,12 @@
                 "cmt_id": "f691ec5a548257edb3aacd952e2a574e4e57b2c4"
             }
         }, 
+        "6.1.61": {
+            "CVE-2023-46862": {
+                "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", 
+                "cmt_id": "9236d2ea6465b37c0a73d994c1ad31753d31e5f5"
+            }
+        }, 
         "outstanding": {
             "CVE-2020-26556": {
                 "cmt_msg": ""
@@ -56466,6 +56994,9 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
             }, 
@@ -56481,9 +57012,6 @@
             "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -56703,9 +57231,6 @@
             "CVE-2011-4916": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-46862": {
-                "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid"
-            }, 
             "CVE-2023-23039": {
                 "cmt_msg": ""
             }, 
@@ -57206,6 +57731,9 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-0459": {
                 "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()"
             }, 
@@ -57572,9 +58100,6 @@
             "CVE-2023-2985": {
                 "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2023-39194": {
                 "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read"
             }, 
@@ -58306,9 +58831,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -58858,9 +59380,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -59719,9 +60238,6 @@
             "CVE-2020-13143": {
                 "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
@@ -59941,8 +60457,8 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -60901,6 +61417,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -61108,9 +61627,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2016-5412": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures"
             }, 
@@ -65291,9 +65807,6 @@
             "CVE-2022-3635": {
                 "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -65492,9 +66005,6 @@
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2023-0030": {
                 "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions"
             }, 
@@ -65915,8 +66425,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2023-39193": {
                 "cmt_msg": "netfilter: xt_sctp: validate the flag_info count"
@@ -66299,6 +66809,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -66368,9 +66881,6 @@
             "CVE-2023-3161": {
                 "cmt_msg": "fbcon: Check font dimension limits"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -66530,9 +67040,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -66923,9 +67430,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -67460,9 +67964,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -68297,9 +68798,6 @@
             "CVE-2020-13143": {
                 "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
@@ -68513,8 +69011,8 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -69461,6 +69959,9 @@
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -69668,9 +70169,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -70546,9 +71044,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -71095,9 +71590,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -71929,9 +72421,6 @@
             "CVE-2020-13143": {
                 "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
@@ -72154,8 +72643,8 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -73099,6 +73588,9 @@
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -73309,9 +73801,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2016-5412": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures"
             }, 
@@ -75329,9 +75818,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -75563,9 +76049,6 @@
             "CVE-2019-19922": {
                 "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices"
             }, 
-            "CVE-2023-5717": {
-                "cmt_msg": "perf: Disallow mis-matched inherited group reads"
-            }, 
             "CVE-2019-19927": {
                 "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
             }, 
@@ -76607,9 +77090,6 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -77360,6 +77840,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -77522,9 +78005,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -77843,9 +78323,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -78344,9 +78821,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
@@ -78653,9 +79127,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2020-26088": {
                 "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check."
             }, 
@@ -79271,8 +79742,8 @@
             "CVE-2020-15852": {
                 "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -79886,6 +80357,9 @@
             "CVE-2023-0240": {
                 "cmt_msg": "io_uring: COW io_identity on mismatch"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -79997,9 +80471,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -80734,9 +81205,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -81013,9 +81481,6 @@
             "CVE-2022-41850": {
                 "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()"
             }, 
-            "CVE-2023-5717": {
-                "cmt_msg": "perf: Disallow mis-matched inherited group reads"
-            }, 
             "CVE-2019-19927": {
                 "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
             }, 
@@ -81304,9 +81769,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -82195,9 +82657,6 @@
             "CVE-2020-13143": {
                 "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
@@ -82423,8 +82882,8 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -83401,6 +83860,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -83620,9 +84082,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2016-5412": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures"
             }, 
@@ -84487,9 +84946,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -84787,9 +85243,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2020-16120": {
                 "cmt_msg": "ovl: switch to mounter creds in readdir"
             }, 
@@ -85384,8 +85837,8 @@
             "CVE-2023-1078": {
                 "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -85996,6 +86449,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -86098,9 +86554,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -86794,9 +87247,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -87100,9 +87550,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3573": {
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
@@ -87667,8 +88114,8 @@
             "CVE-2023-1078": {
                 "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -88246,6 +88693,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -88345,9 +88795,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -88990,9 +89437,6 @@
             "CVE-2021-28715": {
                 "cmt_msg": "xen/netback: don't queue unlimited number of packages"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -89215,9 +89659,6 @@
             "CVE-2023-1829": {
                 "cmt_msg": "net/sched: Retire tcindex classifier"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2021-4083": {
                 "cmt_msg": "fget: check that the fd still exists after getting a ref to it"
             }, 
@@ -90415,6 +90856,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -90514,9 +90958,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -94792,9 +95233,6 @@
             "CVE-2023-1670": {
                 "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
@@ -94828,9 +95266,6 @@
             "CVE-2020-27820": {
                 "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-24503": {
                 "cmt_msg": ""
             }, 
@@ -94843,8 +95278,8 @@
             "CVE-2019-19449": {
                 "cmt_msg": "f2fs: fix to do sanity check on segment/section count"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2023-39193": {
                 "cmt_msg": "netfilter: xt_sctp: validate the flag_info count"
@@ -94948,6 +95383,9 @@
             "CVE-2023-39189": {
                 "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-0459": {
                 "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()"
             }, 
@@ -95008,9 +95446,6 @@
             "CVE-2022-47929": {
                 "cmt_msg": "net: sched: disallow noqueue for qdisc classes"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -95617,9 +96052,6 @@
             "CVE-2023-23559": {
                 "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2023-1855": {
                 "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition"
             }, 
@@ -96137,9 +96569,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -96671,9 +97100,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -97502,9 +97928,6 @@
             "CVE-2020-13143": {
                 "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
@@ -97718,8 +98141,8 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -98657,6 +99080,9 @@
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -98867,9 +99293,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -99761,9 +100184,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
@@ -100265,9 +100685,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -101255,8 +101672,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
@@ -101456,9 +101873,6 @@
             "CVE-2021-22543": {
                 "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2022-45884": {
                 "cmt_msg": ""
             }, 
@@ -102167,6 +102581,9 @@
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -102365,9 +102782,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -103312,9 +103726,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
@@ -103735,9 +104146,6 @@
             "CVE-2022-2503": {
                 "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-19048": {
                 "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr"
             }, 
@@ -104500,8 +104908,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -105253,6 +105661,9 @@
             "CVE-2023-1390": {
                 "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -105400,9 +105811,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -106205,9 +106613,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
@@ -106619,9 +107024,6 @@
             "CVE-2022-2503": {
                 "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -107384,8 +107786,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -108119,6 +108521,9 @@
             "CVE-2023-1390": {
                 "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -108272,9 +108677,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -109072,9 +109474,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -109471,9 +109870,6 @@
             "CVE-2022-2503": {
                 "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -110188,8 +110584,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -110896,6 +111292,9 @@
             "CVE-2023-1390": {
                 "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -111046,9 +111445,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -111802,9 +112198,6 @@
             "CVE-2021-28715": {
                 "cmt_msg": "xen/netback: don't queue unlimited number of packages"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -112057,9 +112450,6 @@
             "CVE-2022-4269": {
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2022-1204": {
                 "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
             }, 
@@ -112528,8 +112918,8 @@
             "CVE-2023-39194": {
                 "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2023-39193": {
                 "cmt_msg": "netfilter: xt_sctp: validate the flag_info count"
@@ -113026,6 +113416,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -113095,9 +113488,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -113714,9 +114104,6 @@
             "CVE-2022-3633": {
                 "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -113960,9 +114347,6 @@
             "CVE-2022-34495": {
                 "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_probe()"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2022-1204": {
                 "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
             }, 
@@ -114413,8 +114797,8 @@
             "CVE-2023-39194": {
                 "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2023-39193": {
                 "cmt_msg": "netfilter: xt_sctp: validate the flag_info count"
@@ -114908,6 +115292,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -114977,9 +115364,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -117703,9 +118087,6 @@
             "CVE-2018-1121": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
@@ -117736,9 +118117,6 @@
             "CVE-2020-24502": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2020-24504": {
                 "cmt_msg": "ice: create scheduler aggregator node config and move VSIs"
             }, 
@@ -117784,6 +118162,9 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-3176": {
                 "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling"
             }, 
@@ -117814,9 +118195,6 @@
             "CVE-2022-3636": {
                 "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-4696": {
                 "cmt_msg": "io_uring: remove any grabbing of context"
             }, 
@@ -118579,9 +118957,6 @@
             "CVE-2021-28715": {
                 "cmt_msg": "xen/netback: don't queue unlimited number of packages"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -118855,9 +119230,6 @@
             "CVE-2022-4269": {
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3573": {
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
@@ -119380,8 +119752,8 @@
             "CVE-2023-1078": {
                 "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -119902,6 +120274,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-3610": {
                 "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic"
             }, 
@@ -119971,9 +120346,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -120779,9 +121151,6 @@
             "CVE-2022-3633": {
                 "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -120995,9 +121364,6 @@
             "CVE-2023-3567": {
                 "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2023-30772": {
                 "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition"
             }, 
@@ -121355,8 +121721,8 @@
             "CVE-2023-39194": {
                 "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2023-38428": {
                 "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
@@ -121766,6 +122132,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -121829,9 +122198,6 @@
             "CVE-2023-3161": {
                 "cmt_msg": "fbcon: Check font dimension limits"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -122489,9 +122855,6 @@
             "CVE-2022-3633": {
                 "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -122684,9 +123047,6 @@
             "CVE-2022-4269": {
                 "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2022-1882": {
                 "cmt_msg": "watchqueue: make sure to serialize 'wqueue->defunct' properly"
             }, 
@@ -123020,8 +123380,8 @@
             "CVE-2023-39194": {
                 "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2023-38428": {
                 "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
@@ -123404,6 +123764,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -123458,9 +123821,6 @@
             "CVE-2023-3161": {
                 "cmt_msg": "fbcon: Check font dimension limits"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -123985,9 +124345,6 @@
             "CVE-2022-3633": {
                 "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -124228,9 +124585,6 @@
             "CVE-2022-34495": {
                 "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_probe()"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2022-1204": {
                 "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
             }, 
@@ -124672,8 +125026,8 @@
             "CVE-2023-39194": {
                 "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2023-39193": {
                 "cmt_msg": "netfilter: xt_sctp: validate the flag_info count"
@@ -125116,6 +125470,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -125179,9 +125536,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -127460,9 +127814,6 @@
             "CVE-2018-1121": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2023-38427": {
                 "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()"
             }, 
@@ -127487,9 +127838,6 @@
             "CVE-2020-24502": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2023-5633": {
                 "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces"
             }, 
@@ -127538,6 +127886,9 @@
             "CVE-2022-3114": {
                 "cmt_msg": "clk: imx: Add check for kcalloc"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-37454": {
                 "cmt_msg": ""
             }, 
@@ -127559,9 +127910,6 @@
             "CVE-2022-3636": {
                 "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -128199,9 +128547,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
@@ -128655,9 +129000,6 @@
             "CVE-2022-2503": {
                 "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2019-19048": {
                 "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr"
             }, 
@@ -129453,8 +129795,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -130236,6 +130578,9 @@
             "CVE-2023-1390": {
                 "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -130395,9 +130740,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -130680,9 +131022,6 @@
             "CVE-2022-45886": {
                 "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net"
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2023-2124": {
                 "cmt_msg": "xfs: verify buffer contents when we skip log replay"
             }, 
@@ -133670,6 +134009,20 @@
                 "cmt_id": "65d34cfd4e347054eb4193bc95d9da7eaa72dee5"
             }
         }, 
+        "5.4.260": {
+            "CVE-2023-5178": {
+                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup", 
+                "cmt_id": "4e53bab11f01a401a5acd3bc94335b27ec79106b"
+            }, 
+            "CVE-2021-44879": {
+                "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", 
+                "cmt_id": "e9a988cd4c8baac7550aa0c2f1efc9533ed9da36"
+            }, 
+            "CVE-2023-45863": {
+                "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", 
+                "cmt_id": "5776aeee2a604ccc03e8269713624f9c8fd318e0"
+            }
+        }, 
         "outstanding": {
             "CVE-2021-0929": {
                 "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
@@ -133701,9 +134054,6 @@
             "CVE-2018-1121": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
@@ -133740,9 +134090,6 @@
             "CVE-2019-19449": {
                 "cmt_msg": "f2fs: fix to do sanity check on segment/section count"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2020-24504": {
                 "cmt_msg": "ice: create scheduler aggregator node config and move VSIs"
             }, 
@@ -133797,6 +134144,9 @@
             "CVE-2023-0240": {
                 "cmt_msg": "io_uring: COW io_identity on mismatch"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1789": {
                 "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID"
             }, 
@@ -133809,9 +134159,6 @@
             "CVE-2021-3669": {
                 "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
             }, 
-            "CVE-2023-45863": {
-                "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()"
-            }, 
             "CVE-2023-1582": {
                 "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry"
             }, 
@@ -133833,9 +134180,6 @@
             "CVE-2022-3636": {
                 "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -134112,9 +134456,6 @@
             "CVE-2023-1281": {
                 "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu"
             }, 
-            "CVE-2021-44879": {
-                "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
-            }, 
             "CVE-2022-27672": {
                 "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions"
             }, 
@@ -134178,9 +134519,6 @@
             "CVE-2023-23039": {
                 "cmt_msg": ""
             }, 
-            "CVE-2023-5178": {
-                "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup"
-            }, 
             "CVE-2020-27835": {
                 "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times"
             }, 
@@ -134584,9 +134922,6 @@
             "CVE-2022-3633": {
                 "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-2602": {
                 "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
             }, 
@@ -135049,9 +135384,6 @@
             "CVE-2023-39194": {
                 "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
-            }, 
             "CVE-2023-38428": {
                 "cmt_msg": "ksmbd: fix wrong UserName check in session_user"
             }, 
@@ -135427,6 +135759,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-42329": {
                 "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled"
             }, 
@@ -135478,9 +135813,6 @@
             "CVE-2023-3161": {
                 "cmt_msg": "fbcon: Check font dimension limits"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -135929,9 +136261,6 @@
             "CVE-2022-3633": {
                 "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-3630": {
                 "cmt_msg": "fscache: don't leak cookie access refs if invalidation is in progress or failed"
             }, 
@@ -136706,6 +137035,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-42329": {
                 "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled"
             }, 
@@ -136760,9 +137092,6 @@
             "CVE-2023-3161": {
                 "cmt_msg": "fbcon: Check font dimension limits"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -137441,9 +137770,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2019-15902": {
                 "cmt_msg": "unknown"
             }, 
@@ -137807,9 +138133,6 @@
             "CVE-2022-2503": {
                 "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -138485,8 +138808,8 @@
             "CVE-2020-0067": {
                 "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -139154,6 +139477,9 @@
             "CVE-2023-0240": {
                 "cmt_msg": "io_uring: COW io_identity on mismatch"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -139289,9 +139615,6 @@
             "CVE-2020-2732": {
                 "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -139953,9 +140276,6 @@
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
-            "CVE-2023-40791": {
-                "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()"
-            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -140256,9 +140576,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2023-4622": {
-                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
-            }, 
             "CVE-2020-26088": {
                 "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check."
             }, 
@@ -140853,8 +141170,8 @@
             "CVE-2020-15852": {
                 "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV"
             }, 
-            "CVE-2023-39191": {
-                "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots"
+            "CVE-2023-4622": {
+                "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES"
             }, 
             "CVE-2020-26558": {
                 "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical"
@@ -141465,6 +141782,9 @@
             "CVE-2022-3595": {
                 "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -141567,9 +141887,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets"
             }, 
-            "CVE-2023-5090": {
-                "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -142247,6 +142564,9 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2023-47233": {
+                "cmt_msg": ""
+            }, 
             "CVE-2023-40283": {
                 "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb"
             }, 
diff --git a/data/stream_fixes.json b/data/stream_fixes.json
index 74030e4..398bac1 100644
--- a/data/stream_fixes.json
+++ b/data/stream_fixes.json
@@ -30174,6 +30174,14 @@
         }
     }, 
     "CVE-2021-44879": {
+        "4.14": {
+            "cmt_id": "a481db81e7ead1369acca8e13b6939778cb7d2c5", 
+            "fixed_version": "4.14.329"
+        }, 
+        "4.19": {
+            "cmt_id": "45c9da086dded78a12bc580f5bb012545a910803", 
+            "fixed_version": "4.19.298"
+        }, 
         "5.15": {
             "cmt_id": "0ddbdc0b7f0cec3815ac05a30b2c2f6457be3050", 
             "fixed_version": "5.15.17"
@@ -30181,6 +30189,10 @@
         "5.16": {
             "cmt_id": "d667b9f61df7bdfcb59dd1406fd2392c358f0008", 
             "fixed_version": "5.16.3"
+        }, 
+        "5.4": {
+            "cmt_id": "e9a988cd4c8baac7550aa0c2f1efc9533ed9da36", 
+            "fixed_version": "5.4.260"
         }
     }, 
     "CVE-2021-45095": {
@@ -38235,6 +38247,10 @@
         "6.4": {
             "cmt_id": "ceba966f1d6391800cab3c1c9ac1661b5166bc5b", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "782c5702b933477b088e80e6d07b9493145b2916", 
+            "fixed_version": "6.5.3"
         }
     }, 
     "CVE-2023-2598": {
@@ -38683,6 +38699,10 @@
         "6.1": {
             "cmt_id": "91aeb418b9175d09fc858f0fdf01988cbf990c5d", 
             "fixed_version": "6.1.57"
+        }, 
+        "6.5": {
+            "cmt_id": "87b9858e404069817cd4b31830e0a1b9b3d183c4", 
+            "fixed_version": "6.5.7"
         }
     }, 
     "CVE-2023-3111": {
@@ -39465,6 +39485,10 @@
         "6.1": {
             "cmt_id": "a4cc925e2e12c3bbffb0860acdb9f9c1abde47dd", 
             "fixed_version": "6.1.57"
+        }, 
+        "6.5": {
+            "cmt_id": "76b33722e2d2336a6e2a7d9eacbbb8988478cf98", 
+            "fixed_version": "6.5.7"
         }
     }, 
     "CVE-2023-3439": {
@@ -39504,6 +39528,10 @@
         }
     }, 
     "CVE-2023-3567": {
+        "4.14": {
+            "cmt_id": "af79ea9a2443016f64d8fd8d72020cc874f0e066", 
+            "fixed_version": "4.14.329"
+        }, 
         "4.19": {
             "cmt_id": "6332f52f44b9776568bf3c0b714ddfb0bb175e78", 
             "fixed_version": "4.19.273"
@@ -39645,6 +39673,10 @@
         "6.1": {
             "cmt_id": "6f6fa8061f756aedb93af12a8a5d3cf659127965", 
             "fixed_version": "6.1.59"
+        }, 
+        "6.5": {
+            "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705", 
+            "fixed_version": "6.5.8"
         }
     }, 
     "CVE-2023-35828": {
@@ -39785,6 +39817,10 @@
         "6.4": {
             "cmt_id": "b4a074b1fb222164ed7d5c0b8c922dc4a0840848", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5", 
+            "fixed_version": "6.5.3"
         }
     }, 
     "CVE-2023-3772": {
@@ -40089,6 +40125,10 @@
         "6.1": {
             "cmt_id": "7bb8d52b4271be7527b6e3120ae6ce4c6cdf6e34", 
             "fixed_version": "6.1.54"
+        }, 
+        "6.5": {
+            "cmt_id": "a3d0f898b80ac9b049e590b3ee6391716002da17", 
+            "fixed_version": "6.5.4"
         }
     }, 
     "CVE-2023-39191": {
@@ -40125,6 +40165,10 @@
         "6.4": {
             "cmt_id": "83b995321eaaa0176041d9d79c7d0415cb6ed7e1", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "799cc0fb184408f688b030ea381844b16d1d9c62", 
+            "fixed_version": "6.5.3"
         }
     }, 
     "CVE-2023-39193": {
@@ -40155,6 +40199,10 @@
         "6.4": {
             "cmt_id": "b63b4e114593073a1c25087526782258c9dd5347", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "85ebbbe845823be6f8c04b4901da9a0a6f866283", 
+            "fixed_version": "6.5.3"
         }
     }, 
     "CVE-2023-39194": {
@@ -40527,6 +40575,10 @@
         "6.4": {
             "cmt_id": "87f07ec534e39e29bc715753df2e77509e8fafc3", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "3138192865c2a1f089dd27a7d80a7271ecd468e7", 
+            "fixed_version": "6.5.3"
         }
     }, 
     "CVE-2023-42753": {
@@ -40549,6 +40601,10 @@
         "6.4": {
             "cmt_id": "d59b6fc405549f7caf31f6aa5da1d6bef746b166", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "d95c8420efe684b964e3aa28108e9a354bcd7225", 
+            "fixed_version": "6.5.3"
         }
     }, 
     "CVE-2023-42754": {
@@ -40567,6 +40623,10 @@
         "6.1": {
             "cmt_id": "2712545e535d7a2e4c53b9c9658a9c88c6055862", 
             "fixed_version": "6.1.56"
+        }, 
+        "6.5": {
+            "cmt_id": "cda20fcddf53f0f959641c8ef4d50ab87ffa5124", 
+            "fixed_version": "6.5.6"
         }
     }, 
     "CVE-2023-42755": {
@@ -40595,6 +40655,12 @@
             "fixed_version": "6.1.55"
         }
     }, 
+    "CVE-2023-42756": {
+        "6.5": {
+            "cmt_id": "20a93d402b6fe6757e14b0eeb400dfac8b8aa3ad", 
+            "fixed_version": "6.5.6"
+        }
+    }, 
     "CVE-2023-4385": {
         "4.14": {
             "cmt_id": "070ddf59cf17faf6aae7d89f78e0510c94d07940", 
@@ -40794,10 +40860,22 @@
         }
     }, 
     "CVE-2023-45863": {
+        "4.14": {
+            "cmt_id": "b43cf5ad5241d6f33a02c93271a282d5ed6c4cce", 
+            "fixed_version": "4.14.329"
+        }, 
+        "4.19": {
+            "cmt_id": "0af6c6c15681cf80aeb85fcb3a1928c63aa89deb", 
+            "fixed_version": "4.19.298"
+        }, 
         "5.15": {
             "cmt_id": "89a0079049f5568268d75c8cdf28bec0e2553e23", 
             "fixed_version": "5.15.99"
         }, 
+        "5.4": {
+            "cmt_id": "5776aeee2a604ccc03e8269713624f9c8fd318e0", 
+            "fixed_version": "5.4.260"
+        }, 
         "6.1": {
             "cmt_id": "fe4dd80d58ec5633daf5d50671d1341f738508bf", 
             "fixed_version": "6.1.16"
@@ -40835,6 +40913,16 @@
         "6.4": {
             "cmt_id": "6a9abbccaac418e965f42e8a8f6dd826e341a6f9", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "dad92377fc6e012e481c6f4a75e32e48fe2777db", 
+            "fixed_version": "6.5.3"
+        }
+    }, 
+    "CVE-2023-45898": {
+        "6.5": {
+            "cmt_id": "c15bf3330a9e3c01b23e59899a6a02432a62ddc3", 
+            "fixed_version": "6.5.4"
         }
     }, 
     "CVE-2023-4610": {
@@ -40877,6 +40965,10 @@
         "6.4": {
             "cmt_id": "5293f466d41d6c2eaad8b833576ea3dbee630dc2", 
             "fixed_version": "6.4.16"
+        }, 
+        "6.5": {
+            "cmt_id": "eb07894c51c7d6bb8d00948a3e6e7b52c791e93e", 
+            "fixed_version": "6.5.3"
         }
     }, 
     "CVE-2023-46813": {
@@ -40891,6 +40983,24 @@
         "6.1": {
             "cmt_id": "57d0639f60f1ff04cbe7fd52823b94b894d7f812", 
             "fixed_version": "6.1.60"
+        }, 
+        "6.5": {
+            "cmt_id": "11b975cb82cc6d88e8b04f77a673077ac5c30c8b", 
+            "fixed_version": "6.5.9"
+        }
+    }, 
+    "CVE-2023-46862": {
+        "6.1": {
+            "cmt_id": "9236d2ea6465b37c0a73d994c1ad31753d31e5f5", 
+            "fixed_version": "6.1.61"
+        }, 
+        "6.5": {
+            "cmt_id": "56e08ccc969796168f0e6adf6642f8546f54ba6f", 
+            "fixed_version": "6.5.10"
+        }, 
+        "6.6": {
+            "cmt_id": "7644b1a1c9a7ae8ab99175989bfc8676055edb46", 
+            "fixed_version": "6.6"
         }
     }, 
     "CVE-2023-4732": {
@@ -40915,6 +41025,10 @@
         "6.1": {
             "cmt_id": "d9ebfc0f21377690837ebbd119e679243e0099cc", 
             "fixed_version": "6.1.54"
+        }, 
+        "6.5": {
+            "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce", 
+            "fixed_version": "6.5.4"
         }
     }, 
     "CVE-2023-4921": {
@@ -40941,6 +41055,16 @@
         "6.1": {
             "cmt_id": "a18349dc8d916a64d7c93f05da98953e3386d8e9", 
             "fixed_version": "6.1.54"
+        }, 
+        "6.5": {
+            "cmt_id": "e5471b82c36396e809817cb988dfc4bce0a688cb", 
+            "fixed_version": "6.5.4"
+        }
+    }, 
+    "CVE-2023-5090": {
+        "6.5": {
+            "cmt_id": "94805f9d3a3fb1f091bcc08b9c4846c4346706eb", 
+            "fixed_version": "6.5.9"
         }
     }, 
     "CVE-2023-5158": {
@@ -40951,6 +41075,10 @@
         "6.1": {
             "cmt_id": "3a72decd6b49ff11a894aabd4d9b3025f046fe61", 
             "fixed_version": "6.1.57"
+        }, 
+        "6.5": {
+            "cmt_id": "0bf2b9c2f3545ffce5720de61c33fc171c0e480a", 
+            "fixed_version": "6.5.7"
         }
     }, 
     "CVE-2023-5178": {
@@ -40962,9 +41090,17 @@
             "cmt_id": "34f62612be2a7f90ab68a14154db6664a32f8db0", 
             "fixed_version": "5.15.137"
         }, 
+        "5.4": {
+            "cmt_id": "4e53bab11f01a401a5acd3bc94335b27ec79106b", 
+            "fixed_version": "5.4.260"
+        }, 
         "6.1": {
             "cmt_id": "f691ec5a548257edb3aacd952e2a574e4e57b2c4", 
             "fixed_version": "6.1.60"
+        }, 
+        "6.5": {
+            "cmt_id": "675f0e9bb716fa3252979145b9b1a950140e94e9", 
+            "fixed_version": "6.5.9"
         }
     }, 
     "CVE-2023-5197": {
@@ -40979,12 +41115,26 @@
         "6.1": {
             "cmt_id": "9af8bb2afea3705b58fe930f97a39322f46e5b8b", 
             "fixed_version": "6.1.56"
+        }, 
+        "6.5": {
+            "cmt_id": "13f385f99147b4445a1ff151fabd44c12d366ab0", 
+            "fixed_version": "6.5.6"
         }
     }, 
     "CVE-2023-5345": {
         "6.1": {
             "cmt_id": "f555a508087ab8210b4658120ac6413d6fe2b4c7", 
             "fixed_version": "6.1.56"
+        }, 
+        "6.5": {
+            "cmt_id": "0c116005af551e9cf437a9ec8c80204c2d4b1b53", 
+            "fixed_version": "6.5.6"
+        }
+    }, 
+    "CVE-2023-5633": {
+        "6.5": {
+            "cmt_id": "1474b39f961703d0bb33833a6d6b112826839781", 
+            "fixed_version": "6.5.8"
         }
     }, 
     "CVE-2023-5717": {
@@ -41011,6 +41161,10 @@
         "6.1": {
             "cmt_id": "f6952655a61264900ed08e9d642adad8222f8e29", 
             "fixed_version": "6.1.60"
+        }, 
+        "6.5": {
+            "cmt_id": "20f925d38e1ecc1d36ee6bf6e325fb514a6f727d", 
+            "fixed_version": "6.5.9"
         }
     }
 }
\ No newline at end of file
diff --git a/kern.json b/kern.json
index 1155cb0..314bdcf 100644
--- a/kern.json
+++ b/kern.json
@@ -3,6 +3,6 @@
         "4.11", "4.13", "4.15", "4.16", "4.8", "4.17", "4.5", "4.6",
         "4.7", "4.3", "4.20", "5.0", "4.18", "5.1", "5.2", "5.3", "5.6",
         "5.5", "5.7", "5.9", "5.8", "5.9", "5.11", "5.12", "5.13", "5.14",
-        "5.15", "5.16", "5.17", "5.18", "5.19", "4.4", "4.9", "6.0", "6.2"],
-     "supp_streams": ["4.14", "4.19", "5.4", "5.10", "5.15", "6.1", "6.3", "6.4"]
+        "5.15", "5.16", "5.17", "5.18", "5.19", "4.4", "4.9", "6.0", "6.2", "6.3"],
+     "supp_streams": ["4.14", "4.19", "5.4", "5.10", "5.15", "6.1", "6.4", "6.5", "6.6"]
 }