Update 20Oct22

[ci skip]
diff --git a/CHANGES.md b/CHANGES.md
index 0561e8c..53f0f1a 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1,32 +1,43 @@
 
 # **Linux Kernel CVE Changes**
 
-## Last Update - 17Oct22 16:10
+## Last Update - 20Oct22 19:57
 
 ### **New CVEs Added:**
 
-[CVE-2022-3521](cves/CVE-2022-3521)  
-[CVE-2022-3522](cves/CVE-2022-3522)  
-[CVE-2022-3523](cves/CVE-2022-3523)  
-[CVE-2022-3524](cves/CVE-2022-3524)  
-[CVE-2022-3526](cves/CVE-2022-3526)  
-[CVE-2022-41674](cves/CVE-2022-41674)  
-[CVE-2022-42719](cves/CVE-2022-42719)  
-[CVE-2022-42720](cves/CVE-2022-42720)  
-[CVE-2022-42721](cves/CVE-2022-42721)  
-[CVE-2022-42722](cves/CVE-2022-42722)  
+[CVE-2022-2602](cves/CVE-2022-2602)  
+[CVE-2022-3531](cves/CVE-2022-3531)  
+[CVE-2022-3532](cves/CVE-2022-3532)  
+[CVE-2022-3535](cves/CVE-2022-3535)  
+[CVE-2022-3541](cves/CVE-2022-3541)  
+[CVE-2022-3542](cves/CVE-2022-3542)  
+[CVE-2022-3543](cves/CVE-2022-3543)  
+[CVE-2022-3544](cves/CVE-2022-3544)  
+[CVE-2022-3545](cves/CVE-2022-3545)  
+[CVE-2022-3564](cves/CVE-2022-3564)  
+[CVE-2022-3565](cves/CVE-2022-3565)  
+[CVE-2022-3566](cves/CVE-2022-3566)  
+[CVE-2022-3567](cves/CVE-2022-3567)  
+[CVE-2022-3577](cves/CVE-2022-3577)  
+[CVE-2022-3586](cves/CVE-2022-3586)  
+[CVE-2022-3594](cves/CVE-2022-3594)  
+[CVE-2022-3595](cves/CVE-2022-3595)  
 
 
 ### **New Versions Checked:**
 
-[5.10.148](streams/5.10)  
-[5.15.74](streams/5.15)  
-[5.19.16](streams/5.19)  
-[5.4.218](streams/5.4)  
+[5.10.149](streams/5.10)  
+[5.4.219](streams/5.4)  
 
 
 ### **Updated CVEs:**
 
-[CVE-2022-20409](cves/CVE-2022-20409)  
-[CVE-2022-3303](cves/CVE-2022-3303)  
-[CVE-2022-40768](cves/CVE-2022-40768)  
+[CVE-2022-20421](cves/CVE-2022-20421)  
+[CVE-2022-20422](cves/CVE-2022-20422)  
+[CVE-2022-20423](cves/CVE-2022-20423)  
+[CVE-2022-41674](cves/CVE-2022-41674)  
+[CVE-2022-42703](cves/CVE-2022-42703)  
+[CVE-2022-42719](cves/CVE-2022-42719)  
+[CVE-2022-42720](cves/CVE-2022-42720)  
+[CVE-2022-42721](cves/CVE-2022-42721)  
+[CVE-2022-42722](cves/CVE-2022-42722)  
diff --git a/data/3.12/3.12_CVEs.txt b/data/3.12/3.12_CVEs.txt
index b4a31fa..453d806 100644
--- a/data/3.12/3.12_CVEs.txt
+++ b/data/3.12/3.12_CVEs.txt
@@ -1122,9 +1122,6 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
-CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1182,6 +1179,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1195,12 +1208,6 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
-CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/3.12/3.12_security.txt b/data/3.12/3.12_security.txt
index c131141..718377f 100644
--- a/data/3.12/3.12_security.txt
+++ b/data/3.12/3.12_security.txt
@@ -1260,9 +1260,6 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
-  CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1320,6 +1317,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1333,12 +1346,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/3.14/3.14_CVEs.txt b/data/3.14/3.14_CVEs.txt
index cfc3804..1b72e0e 100644
--- a/data/3.14/3.14_CVEs.txt
+++ b/data/3.14/3.14_CVEs.txt
@@ -1090,9 +1090,6 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
-CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1151,6 +1148,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1164,12 +1177,6 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
-CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/3.14/3.14_security.txt b/data/3.14/3.14_security.txt
index fe95357..6d8df2c 100644
--- a/data/3.14/3.14_security.txt
+++ b/data/3.14/3.14_security.txt
@@ -1224,9 +1224,6 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
-  CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1285,6 +1282,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1298,12 +1311,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/3.16/3.16_CVEs.txt b/data/3.16/3.16_CVEs.txt
index a60f746..0df7817 100644
--- a/data/3.16/3.16_CVEs.txt
+++ b/data/3.16/3.16_CVEs.txt
@@ -1071,9 +1071,6 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
-CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1135,6 +1132,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1148,12 +1161,6 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
-CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/3.16/3.16_security.txt b/data/3.16/3.16_security.txt
index 513ed4c..39fe7b0 100644
--- a/data/3.16/3.16_security.txt
+++ b/data/3.16/3.16_security.txt
@@ -1177,9 +1177,6 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
-  CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1241,6 +1238,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1254,12 +1267,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/3.18/3.18_CVEs.txt b/data/3.18/3.18_CVEs.txt
index 4818887..390ee56 100644
--- a/data/3.18/3.18_CVEs.txt
+++ b/data/3.18/3.18_CVEs.txt
@@ -1055,9 +1055,6 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
-CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1120,6 +1117,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1133,12 +1146,6 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
-CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/3.18/3.18_security.txt b/data/3.18/3.18_security.txt
index b4382c2..cfb6f88 100644
--- a/data/3.18/3.18_security.txt
+++ b/data/3.18/3.18_security.txt
@@ -1289,9 +1289,6 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
-  CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1354,6 +1351,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1367,12 +1380,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/3.2/3.2_CVEs.txt b/data/3.2/3.2_CVEs.txt
index 651311f..d88287d 100644
--- a/data/3.2/3.2_CVEs.txt
+++ b/data/3.2/3.2_CVEs.txt
@@ -1106,9 +1106,6 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
-CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1159,6 +1156,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1172,12 +1185,6 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
-CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/3.2/3.2_security.txt b/data/3.2/3.2_security.txt
index 81814cd..ef8cd96 100644
--- a/data/3.2/3.2_security.txt
+++ b/data/3.2/3.2_security.txt
@@ -1262,9 +1262,6 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
-  CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1315,6 +1312,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1328,12 +1341,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.1/4.1_CVEs.txt b/data/4.1/4.1_CVEs.txt
index 4a672e2..7111f83 100644
--- a/data/4.1/4.1_CVEs.txt
+++ b/data/4.1/4.1_CVEs.txt
@@ -1013,9 +1013,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1081,6 +1079,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1094,12 +1108,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.1/4.1_security.txt b/data/4.1/4.1_security.txt
index cedcca3..4ec0f44 100644
--- a/data/4.1/4.1_security.txt
+++ b/data/4.1/4.1_security.txt
@@ -1109,9 +1109,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1177,6 +1175,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1190,12 +1204,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.10/4.10_CVEs.txt b/data/4.10/4.10_CVEs.txt
index 3a4db3d..0e9fafc 100644
--- a/data/4.10/4.10_CVEs.txt
+++ b/data/4.10/4.10_CVEs.txt
@@ -909,9 +909,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -979,6 +977,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -993,12 +1007,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.10/4.10_security.txt b/data/4.10/4.10_security.txt
index 38f0d53..52e6e97 100644
--- a/data/4.10/4.10_security.txt
+++ b/data/4.10/4.10_security.txt
@@ -943,9 +943,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1013,6 +1011,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1027,12 +1041,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.11/4.11_CVEs.txt b/data/4.11/4.11_CVEs.txt
index 0ba95ab..2a4e636 100644
--- a/data/4.11/4.11_CVEs.txt
+++ b/data/4.11/4.11_CVEs.txt
@@ -880,9 +880,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -951,6 +949,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -965,12 +979,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.11/4.11_security.txt b/data/4.11/4.11_security.txt
index 30b0f8f..f686df1 100644
--- a/data/4.11/4.11_security.txt
+++ b/data/4.11/4.11_security.txt
@@ -902,9 +902,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -973,6 +971,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -987,12 +1001,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.12/4.12_CVEs.txt b/data/4.12/4.12_CVEs.txt
index 48f9e14..b2c8cc3 100644
--- a/data/4.12/4.12_CVEs.txt
+++ b/data/4.12/4.12_CVEs.txt
@@ -860,9 +860,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -934,6 +932,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -948,12 +962,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.12/4.12_security.txt b/data/4.12/4.12_security.txt
index c6c47a3..c8e60e0 100644
--- a/data/4.12/4.12_security.txt
+++ b/data/4.12/4.12_security.txt
@@ -886,9 +886,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -960,6 +958,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -974,12 +988,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.13/4.13_CVEs.txt b/data/4.13/4.13_CVEs.txt
index 6ec4cca..a319c86 100644
--- a/data/4.13/4.13_CVEs.txt
+++ b/data/4.13/4.13_CVEs.txt
@@ -843,9 +843,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -917,6 +915,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -931,12 +945,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.13/4.13_security.txt b/data/4.13/4.13_security.txt
index 2196977..08cdaaf 100644
--- a/data/4.13/4.13_security.txt
+++ b/data/4.13/4.13_security.txt
@@ -871,9 +871,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -945,6 +943,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -959,12 +973,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt
index 645b0aa..7e69fea 100644
--- a/data/4.14/4.14_CVEs.txt
+++ b/data/4.14/4.14_CVEs.txt
@@ -811,7 +811,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fixed with 4.14.293
 CVE-2022-20422: Fixed with 4.14.291
-CVE-2022-20423: Fixed with 4.14.273
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fixed with 4.14.284
 CVE-2022-21125: Fixed with 4.14.284
@@ -885,6 +884,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fixed with 4.14.293
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fixed with 4.14.289
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -899,12 +914,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fixed with 4.14.292
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt
index 3cee430..7990ef3 100644
--- a/data/4.14/4.14_security.txt
+++ b/data/4.14/4.14_security.txt
@@ -1111,7 +1111,6 @@
 CVEs fixed in 4.14.273:
   CVE-2022-20158: b1e27cda1e3c12b705875bb7e247a97168580e33 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
   CVE-2022-20368: b1e27cda1e3c12b705875bb7e247a97168580e33 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
-  CVE-2022-20423: c7953cf03a26876d676145ce5d2ae6d8c9630b90 usb: gadget: rndis: prevent integer overflow in rndis_set_response()
 
 CVEs fixed in 4.14.274:
   CVE-2022-1016: a3cc32863b175168283cb0a5fde08de6a1e27df9 netfilter: nf_tables: initialize registers in nft_do_chain()
@@ -1207,6 +1206,7 @@
   CVE-2021-4159: a7cf53f9ebcd887c19588c0c1b4b8260f41a3faa bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
   CVE-2022-20421: 229f47603dd306bc0eb1a831439adb8e48bb0eae binder: fix UAF of ref->proc caused by race condition
   CVE-2022-2663: 6ce66e3442a5989cbe56a6884384bf0b7d1d0725 netfilter: nf_conntrack_irc: Fix forged IP logic
+  CVE-2022-3586: a7af71bb5ee6e887d49f098e212ef4f2f7cfbaf6 sch_sfb: Don't assume the skb is still around after enqueueing to child
   CVE-2022-40307: 233d5c4d18971feee5fc2f33f00b63d8205cfc67 efi: capsule-loader: Fix use-after-free in efi_capsule_write
 
 CVEs fixed in 4.14.295:
@@ -1377,6 +1377,21 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
@@ -1386,11 +1401,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.15/4.15_CVEs.txt b/data/4.15/4.15_CVEs.txt
index 4a0ab3d..5ef09d7 100644
--- a/data/4.15/4.15_CVEs.txt
+++ b/data/4.15/4.15_CVEs.txt
@@ -761,7 +761,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -835,6 +834,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -849,12 +864,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.15/4.15_security.txt b/data/4.15/4.15_security.txt
index 7cfcae4..c02232f 100644
--- a/data/4.15/4.15_security.txt
+++ b/data/4.15/4.15_security.txt
@@ -793,7 +793,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -867,6 +866,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -881,12 +896,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.16/4.16_CVEs.txt b/data/4.16/4.16_CVEs.txt
index 0b5f2fa..91927f9 100644
--- a/data/4.16/4.16_CVEs.txt
+++ b/data/4.16/4.16_CVEs.txt
@@ -740,7 +740,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -814,6 +813,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -829,12 +844,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.16/4.16_security.txt b/data/4.16/4.16_security.txt
index c58dd74..21a660e 100644
--- a/data/4.16/4.16_security.txt
+++ b/data/4.16/4.16_security.txt
@@ -772,7 +772,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -846,6 +845,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -861,12 +876,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.17/4.17_CVEs.txt b/data/4.17/4.17_CVEs.txt
index abb61f7..2760b4d 100644
--- a/data/4.17/4.17_CVEs.txt
+++ b/data/4.17/4.17_CVEs.txt
@@ -720,7 +720,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -794,6 +793,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -809,12 +824,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.17/4.17_security.txt b/data/4.17/4.17_security.txt
index bb8ad50..99b5cba 100644
--- a/data/4.17/4.17_security.txt
+++ b/data/4.17/4.17_security.txt
@@ -752,7 +752,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -826,6 +825,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -841,12 +856,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.18/4.18_CVEs.txt b/data/4.18/4.18_CVEs.txt
index bd99be7..36fe0c0 100644
--- a/data/4.18/4.18_CVEs.txt
+++ b/data/4.18/4.18_CVEs.txt
@@ -698,7 +698,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -772,6 +771,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -787,12 +802,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.18/4.18_security.txt b/data/4.18/4.18_security.txt
index 11e7b6b..da06ec2 100644
--- a/data/4.18/4.18_security.txt
+++ b/data/4.18/4.18_security.txt
@@ -730,7 +730,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -804,6 +803,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -819,12 +834,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt
index 4a4b20b..51cc426 100644
--- a/data/4.19/4.19_CVEs.txt
+++ b/data/4.19/4.19_CVEs.txt
@@ -672,7 +672,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fixed with 4.19.258
 CVE-2022-20422: Fixed with 4.19.256
-CVE-2022-20423: Fixed with 4.19.236
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fixed with 4.19.248
 CVE-2022-21125: Fixed with 4.19.248
@@ -747,6 +746,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fixed with 4.19.258
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fixed with 4.19.253
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -762,12 +777,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fixed with 4.19.257
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt
index cda1d40..5489efa 100644
--- a/data/4.19/4.19_security.txt
+++ b/data/4.19/4.19_security.txt
@@ -918,7 +918,6 @@
 CVEs fixed in 4.19.236:
   CVE-2022-20158: a33dd1e6693f80d805155b3f69c18c2f642915da net/packet: fix slab-out-of-bounds access in packet_recvmsg()
   CVE-2022-20368: a33dd1e6693f80d805155b3f69c18c2f642915da net/packet: fix slab-out-of-bounds access in packet_recvmsg()
-  CVE-2022-20423: 138d4f739b35dfb40438a0d5d7054965763bfbe7 usb: gadget: rndis: prevent integer overflow in rndis_set_response()
 
 CVEs fixed in 4.19.237:
   CVE-2022-1016: 88791b79a1eb2ba94e95d039243e28433583a67b netfilter: nf_tables: initialize registers in nft_do_chain()
@@ -1021,6 +1020,7 @@
 CVEs fixed in 4.19.258:
   CVE-2022-20421: 06e5b43ca4dab06a92bf4c2f33766e6fb11b880a binder: fix UAF of ref->proc caused by race condition
   CVE-2022-2663: 3275f7804f40de3c578d2253232349b07c25f146 netfilter: nf_conntrack_irc: Fix forged IP logic
+  CVE-2022-3586: 9245ed20950afe225bc6d1c4b9d28d55aa152e25 sch_sfb: Don't assume the skb is still around after enqueueing to child
   CVE-2022-40307: 021805af5bedeafc76c117fc771c100b358ab419 efi: capsule-loader: Fix use-after-free in efi_capsule_write
 
 CVEs fixed in 4.19.260:
@@ -1167,6 +1167,21 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
@@ -1177,11 +1192,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.20/4.20_CVEs.txt b/data/4.20/4.20_CVEs.txt
index e0c00e3..d3efdc0 100644
--- a/data/4.20/4.20_CVEs.txt
+++ b/data/4.20/4.20_CVEs.txt
@@ -660,7 +660,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -735,6 +734,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -750,12 +765,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.20/4.20_security.txt b/data/4.20/4.20_security.txt
index 3731f27..1df4c22 100644
--- a/data/4.20/4.20_security.txt
+++ b/data/4.20/4.20_security.txt
@@ -693,7 +693,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -767,6 +766,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -782,12 +797,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.3/4.3_CVEs.txt b/data/4.3/4.3_CVEs.txt
index 6f9c71f..3556757 100644
--- a/data/4.3/4.3_CVEs.txt
+++ b/data/4.3/4.3_CVEs.txt
@@ -1009,9 +1009,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1078,6 +1076,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1091,12 +1105,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.3/4.3_security.txt b/data/4.3/4.3_security.txt
index 7c73af7..96b7840 100644
--- a/data/4.3/4.3_security.txt
+++ b/data/4.3/4.3_security.txt
@@ -1025,9 +1025,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1094,6 +1092,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1107,12 +1121,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt
index fad2391..218a487 100644
--- a/data/4.4/4.4_CVEs.txt
+++ b/data/4.4/4.4_CVEs.txt
@@ -989,9 +989,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1059,6 +1057,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1072,12 +1086,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt
index b63bc09..773657a 100644
--- a/data/4.4/4.4_security.txt
+++ b/data/4.4/4.4_security.txt
@@ -1473,9 +1473,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1543,6 +1541,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1556,12 +1570,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.5/4.5_CVEs.txt b/data/4.5/4.5_CVEs.txt
index ba2e293..159400a 100644
--- a/data/4.5/4.5_CVEs.txt
+++ b/data/4.5/4.5_CVEs.txt
@@ -971,9 +971,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1041,6 +1039,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1054,12 +1068,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.5/4.5_security.txt b/data/4.5/4.5_security.txt
index 882fe88..a0d9b23 100644
--- a/data/4.5/4.5_security.txt
+++ b/data/4.5/4.5_security.txt
@@ -987,9 +987,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1057,6 +1055,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1070,12 +1084,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.6/4.6_CVEs.txt b/data/4.6/4.6_CVEs.txt
index 2799a70..29875a2 100644
--- a/data/4.6/4.6_CVEs.txt
+++ b/data/4.6/4.6_CVEs.txt
@@ -943,9 +943,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -1013,6 +1011,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1026,12 +1040,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.6/4.6_security.txt b/data/4.6/4.6_security.txt
index 716dcda..e90a508 100644
--- a/data/4.6/4.6_security.txt
+++ b/data/4.6/4.6_security.txt
@@ -961,9 +961,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1031,6 +1029,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1044,12 +1058,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.7/4.7_CVEs.txt b/data/4.7/4.7_CVEs.txt
index 4801379..bd42d8c 100644
--- a/data/4.7/4.7_CVEs.txt
+++ b/data/4.7/4.7_CVEs.txt
@@ -925,9 +925,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -995,6 +993,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1009,12 +1023,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.7/4.7_security.txt b/data/4.7/4.7_security.txt
index 2f4011b..e123c60 100644
--- a/data/4.7/4.7_security.txt
+++ b/data/4.7/4.7_security.txt
@@ -945,9 +945,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1015,6 +1013,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1029,12 +1043,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.8/4.8_CVEs.txt b/data/4.8/4.8_CVEs.txt
index 125b39f..3fb8e5e 100644
--- a/data/4.8/4.8_CVEs.txt
+++ b/data/4.8/4.8_CVEs.txt
@@ -929,9 +929,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fix not seen in stream
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -999,6 +997,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1013,12 +1027,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.8/4.8_security.txt b/data/4.8/4.8_security.txt
index 3c8106f..e3605fe 100644
--- a/data/4.8/4.8_security.txt
+++ b/data/4.8/4.8_security.txt
@@ -959,9 +959,7 @@
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20368: (unk) net/packet: fix slab-out-of-bounds access in packet_recvmsg() 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -1029,6 +1027,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -1043,12 +1057,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt
index 1efd1c2..aedcd98 100644
--- a/data/4.9/4.9_CVEs.txt
+++ b/data/4.9/4.9_CVEs.txt
@@ -928,9 +928,7 @@
 CVE-2022-20166: Fix not seen in stream
 CVE-2022-20368: Fixed with 4.9.308
 CVE-2022-20369: Fix not seen in stream
-CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fixed with 4.9.308
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fixed with 4.9.319
 CVE-2022-21125: Fixed with 4.9.319
@@ -998,6 +996,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fixed with 4.9.328
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fixed with 4.9.324
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -1012,12 +1026,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fixed with 4.9.327
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt
index 0bf859d..7f51928 100644
--- a/data/4.9/4.9_security.txt
+++ b/data/4.9/4.9_security.txt
@@ -1248,7 +1248,6 @@
 CVEs fixed in 4.9.308:
   CVE-2022-20158: b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
   CVE-2022-20368: b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
-  CVE-2022-20423: 8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b usb: gadget: rndis: prevent integer overflow in rndis_set_response()
 
 CVEs fixed in 4.9.309:
   CVE-2022-1016: 4d28522acd1c4415c85f6b33463713a268f68965 netfilter: nf_tables: initialize registers in nft_do_chain()
@@ -1323,6 +1322,7 @@
 
 CVEs fixed in 4.9.328:
   CVE-2022-2663: eb4d8d6b44a23ff2b6e2af06c8240de73dff8a7d netfilter: nf_conntrack_irc: Fix forged IP logic
+  CVE-2022-3586: b5aa83141aa97f81c8e06051e4bd925bfb5474fb sch_sfb: Don't assume the skb is still around after enqueueing to child
 
 CVEs fixed in 4.9.330:
   CVE-2022-39842: a0dcaa48042a56a9eee2efed19563866a0ddbce2 video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write
@@ -1503,7 +1503,6 @@
   CVE-2022-20148: (unk) f2fs: fix UAF in f2fs_available_free_memory 
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
-  CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21385: (unk) net/rds: fix warn in rds_message_alloc_sgs 
@@ -1535,6 +1534,21 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
@@ -1545,11 +1559,6 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.0/5.0_CVEs.txt b/data/5.0/5.0_CVEs.txt
index 8cbe33d..6971316 100644
--- a/data/5.0/5.0_CVEs.txt
+++ b/data/5.0/5.0_CVEs.txt
@@ -640,7 +640,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -714,6 +713,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -729,12 +744,7 @@
 CVE-2022-40768: Fix not seen in stream
 CVE-2022-41218: Fix unknown
 CVE-2022-41222: Fix not seen in stream
-CVE-2022-41674: Fix not seen in stream
 CVE-2022-41848: Fix unknown
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
-CVE-2022-42720: Fix not seen in stream
-CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.0/5.0_security.txt b/data/5.0/5.0_security.txt
index 4c33b00..c356970 100644
--- a/data/5.0/5.0_security.txt
+++ b/data/5.0/5.0_security.txt
@@ -688,7 +688,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -762,6 +761,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -777,12 +792,7 @@
   CVE-2022-40768: (unk) scsi: stex: Properly zero out the passthrough command structure 
   CVE-2022-41218: (unk)  
   CVE-2022-41222: (unk) mm/mremap: hold the rmap lock in write mode when moving page table entries. 
-  CVE-2022-41674: (unk) wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() 
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
-  CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.1/5.1_CVEs.txt b/data/5.1/5.1_CVEs.txt
index 493a5fa..102f2c2 100644
--- a/data/5.1/5.1_CVEs.txt
+++ b/data/5.1/5.1_CVEs.txt
@@ -608,7 +608,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -640,6 +639,7 @@
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -685,6 +685,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -705,7 +721,5 @@
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fix not seen in stream
-CVE-2022-42719: Fix not seen in stream
 CVE-2022-42720: Fix not seen in stream
 CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.1/5.1_security.txt b/data/5.1/5.1_security.txt
index 0e5b609..918354e 100644
--- a/data/5.1/5.1_security.txt
+++ b/data/5.1/5.1_security.txt
@@ -644,7 +644,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -676,6 +675,7 @@
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -721,6 +721,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -741,7 +757,5 @@
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
   CVE-2022-42703: (unk) mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse 
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
   CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
   CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt
index c7912e6..7909fa8 100644
--- a/data/5.10/5.10_CVEs.txt
+++ b/data/5.10/5.10_CVEs.txt
@@ -314,7 +314,6 @@
 CVE-2022-20409: Fix not seen in stream
 CVE-2022-20421: Fixed with 5.10.142
 CVE-2022-20422: Fixed with 5.10.137
-CVE-2022-20423: Fixed with 5.10.108
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-2078: Fixed with 5.10.120
 CVE-2022-21123: Fixed with 5.10.123
@@ -350,6 +349,7 @@
 CVE-2022-2585: Fixed with 5.10.137
 CVE-2022-2586: Fixed with 5.10.137
 CVE-2022-2588: Fixed with 5.10.137
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fixed with 5.10.129
 CVE-2022-26373: Fixed with 5.10.136
 CVE-2022-2639: Fixed with 5.10.113
@@ -401,6 +401,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fixed with 5.10.121
+CVE-2022-3586: Fixed with 5.10.143
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fixed with 5.10.132
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -422,7 +438,7 @@
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fixed with 5.10.141
-CVE-2022-42719: Fix not seen in stream
+CVE-2022-42719: Fixed with 5.10.149
 CVE-2022-42720: Fixed with 5.10.148
 CVE-2022-42721: Fixed with 5.10.148
 CVE-2022-42722: Fixed with 5.10.148
diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt
index 7270338..56638a1 100644
--- a/data/5.10/5.10_security.txt
+++ b/data/5.10/5.10_security.txt
@@ -373,7 +373,6 @@
 CVEs fixed in 5.10.108:
   CVE-2022-20158: 70b7b3c055fd4a464da8da55ff4c1f84269f9b02 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
   CVE-2022-20368: 70b7b3c055fd4a464da8da55ff4c1f84269f9b02 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
-  CVE-2022-20423: 28bc0267399f42f987916a7174e2e32f0833cc65 usb: gadget: rndis: prevent integer overflow in rndis_set_response()
   CVE-2022-27666: 9248694dac20eda06e22d8503364dc9d03df4e2f esp: Fix possible buffer overflow in ESP transformation
 
 CVEs fixed in 5.10.109:
@@ -443,6 +442,7 @@
 
 CVEs fixed in 5.10.121:
   CVE-2022-1184: da2f05919238c7bdc6e28c79539f55c8355408bb ext4: verify dir block before splitting it
+  CVE-2022-3577: 296f8ca0f73f5268cd9b85cf72ff783596b2264e HID: bigben: fix slab-out-of-bounds Write in bigben_probe
 
 CVEs fixed in 5.10.122:
   CVE-2022-32981: 3be74fc0afbeadc2aff8dc69f3bf9716fbe66486 powerpc/32: Fix overread/overwrite of thread_struct via ptrace
@@ -512,6 +512,7 @@
 
 CVEs fixed in 5.10.143:
   CVE-2022-2663: e12ce30fe593dd438c5b392290ad7316befc11ca netfilter: nf_conntrack_irc: Fix forged IP logic
+  CVE-2022-3586: 2ee85ac1b29dbd2ebd2d8e5ac1dd5793235d516b sch_sfb: Don't assume the skb is still around after enqueueing to child
   CVE-2022-40307: 918d9c4a4bdf5205f2fb3f64dddfb56c9a1d01d6 efi: capsule-loader: Fix use-after-free in efi_capsule_write
 
 CVEs fixed in 5.10.145:
@@ -530,6 +531,9 @@
   CVE-2022-42721: b0e5c5deb7880be5b8a459d584e13e1f9879d307 wifi: cfg80211: avoid nontransmitted BSS list corruption
   CVE-2022-42722: 58c0306d0bcd5f541714bea8765d23111c9af68a wifi: mac80211: fix crash in beacon protection for P2P-device
 
+CVEs fixed in 5.10.149:
+  CVE-2022-42719: 31ce5da48a845bac48930bbde1d45e7449591728 wifi: mac80211: fix MBSSID parsing use-after-free
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -618,6 +622,7 @@
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
   CVE-2022-23825: (unk)  
   CVE-2022-25265: (unk)  
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-2961: (unk)  
   CVE-2022-2978: (unk)  
   CVE-2022-2991: (unk) remove the lightnvm subsystem 
@@ -630,6 +635,20 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
@@ -641,4 +660,3 @@
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
diff --git a/data/5.11/5.11_CVEs.txt b/data/5.11/5.11_CVEs.txt
index 8e061c8..0c0e8a4 100644
--- a/data/5.11/5.11_CVEs.txt
+++ b/data/5.11/5.11_CVEs.txt
@@ -303,7 +303,6 @@
 CVE-2022-20409: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
@@ -339,6 +338,7 @@
 CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -392,6 +392,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.11/5.11_security.txt b/data/5.11/5.11_security.txt
index cfcc90b..bd8e855 100644
--- a/data/5.11/5.11_security.txt
+++ b/data/5.11/5.11_security.txt
@@ -343,7 +343,6 @@
   CVE-2022-20409: (unk) io_uring: remove io_identity 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
@@ -379,6 +378,7 @@
   CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -432,6 +432,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/5.12/5.12_CVEs.txt b/data/5.12/5.12_CVEs.txt
index c64f989..5d0f673 100644
--- a/data/5.12/5.12_CVEs.txt
+++ b/data/5.12/5.12_CVEs.txt
@@ -256,7 +256,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -290,6 +289,7 @@
 CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -344,6 +344,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.12/5.12_security.txt b/data/5.12/5.12_security.txt
index 7783589..c4131a7 100644
--- a/data/5.12/5.12_security.txt
+++ b/data/5.12/5.12_security.txt
@@ -289,7 +289,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -323,6 +322,7 @@
   CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -377,6 +377,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/5.13/5.13_CVEs.txt b/data/5.13/5.13_CVEs.txt
index b3dbaec..4567d80 100644
--- a/data/5.13/5.13_CVEs.txt
+++ b/data/5.13/5.13_CVEs.txt
@@ -219,7 +219,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -253,6 +252,7 @@
 CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -310,6 +310,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.13/5.13_security.txt b/data/5.13/5.13_security.txt
index 74413e5..253aa16 100644
--- a/data/5.13/5.13_security.txt
+++ b/data/5.13/5.13_security.txt
@@ -252,7 +252,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -286,6 +285,7 @@
   CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -343,6 +343,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/5.14/5.14_CVEs.txt b/data/5.14/5.14_CVEs.txt
index 5228475..b30d1a5 100644
--- a/data/5.14/5.14_CVEs.txt
+++ b/data/5.14/5.14_CVEs.txt
@@ -191,7 +191,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -226,6 +225,7 @@
 CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -283,6 +283,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.14/5.14_security.txt b/data/5.14/5.14_security.txt
index 87e527e..a6fe57c 100644
--- a/data/5.14/5.14_security.txt
+++ b/data/5.14/5.14_security.txt
@@ -225,7 +225,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -260,6 +259,7 @@
   CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -317,6 +317,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt
index 5ccf39d..311c703 100644
--- a/data/5.15/5.15_CVEs.txt
+++ b/data/5.15/5.15_CVEs.txt
@@ -158,7 +158,6 @@
 CVE-2022-20369: Fixed with 5.15.33
 CVE-2022-20421: Fixed with 5.15.66
 CVE-2022-20422: Fixed with 5.15.61
-CVE-2022-20423: Fixed with 5.15.31
 CVE-2022-2078: Fixed with 5.15.45
 CVE-2022-21123: Fixed with 5.15.48
 CVE-2022-21125: Fixed with 5.15.48
@@ -194,6 +193,7 @@
 CVE-2022-2585: Fixed with 5.15.61
 CVE-2022-2586: Fixed with 5.15.61
 CVE-2022-2588: Fixed with 5.15.61
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fixed with 5.15.53
 CVE-2022-26373: Fixed with 5.15.60
 CVE-2022-2639: Fixed with 5.15.36
@@ -251,6 +251,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fixed with 5.15.35
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fixed with 5.15.46
+CVE-2022-3586: Fixed with 5.15.68
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fixed with 5.15.56
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt
index 7586725..8d5fc4f 100644
--- a/data/5.15/5.15_security.txt
+++ b/data/5.15/5.15_security.txt
@@ -131,7 +131,6 @@
 CVEs fixed in 5.15.31:
   CVE-2022-20158: a055f5f2841f7522b44a2b1eccb1951b4b03d51a net/packet: fix slab-out-of-bounds access in packet_recvmsg()
   CVE-2022-20368: a055f5f2841f7522b44a2b1eccb1951b4b03d51a net/packet: fix slab-out-of-bounds access in packet_recvmsg()
-  CVE-2022-20423: 56b38e3ca4064041d93c1ca18828c8cedad2e16c usb: gadget: rndis: prevent integer overflow in rndis_set_response()
 
 CVEs fixed in 5.15.32:
   CVE-2022-1015: 1bd57dea456149619f3b80d67eee012122325af8 netfilter: nf_tables: validate registers coming from userspace.
@@ -213,6 +212,7 @@
 CVEs fixed in 5.15.46:
   CVE-2022-1184: ca17db384762be0ec38373a12460081d22a8b42d ext4: verify dir block before splitting it
   CVE-2022-1973: 61decb58486d7c0cbded25fe4d301ab4fa148cd8 fs/ntfs3: Fix invalid free in log_replay
+  CVE-2022-3577: 22e0b0b84c538b60bdf8eeceee7ab3cebf4a1a09 HID: bigben: fix slab-out-of-bounds Write in bigben_probe
 
 CVEs fixed in 5.15.47:
   CVE-2022-32981: 2a0165d278973e30f2282c15c52d91788749d2d4 powerpc/32: Fix overread/overwrite of thread_struct via ptrace
@@ -279,6 +279,7 @@
 CVEs fixed in 5.15.68:
   CVE-2022-2663: 451c9ce1e2fc9b9e40303bef8e5a0dca1a923cc4 netfilter: nf_conntrack_irc: Fix forged IP logic
   CVE-2022-3303: 8015ef9e8a0ee5cecfd0cb6805834d007ab26f86 ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
+  CVE-2022-3586: 1a889da60afc017050e1f517b3b976b462846668 sch_sfb: Don't assume the skb is still around after enqueueing to child
   CVE-2022-40307: dd291e070be0eca8807476b022bda00c891d9066 efi: capsule-loader: Fix use-after-free in efi_capsule_write
 
 CVEs fixed in 5.15.70:
@@ -365,6 +366,7 @@
   CVE-2022-23825: (unk)  
   CVE-2022-24122: (unk) ucount:  Make get_ucount a safe get_user replacement 
   CVE-2022-25265: (unk)  
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26878: (unk)  
   CVE-2022-2961: (unk)  
   CVE-2022-2978: (unk)  
@@ -375,6 +377,20 @@
   CVE-2022-3522: (unk) mm/hugetlb: use hugetlb_pte_stable in migration race check 
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt
index aba654a..c136748 100644
--- a/data/5.16/5.16_CVEs.txt
+++ b/data/5.16/5.16_CVEs.txt
@@ -124,7 +124,6 @@
 CVE-2022-20369: Fixed with 5.16.19
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fixed with 5.16.17
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -161,6 +160,7 @@
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-2590: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -219,6 +219,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt
index 52fa979..c6ee75c 100644
--- a/data/5.16/5.16_security.txt
+++ b/data/5.16/5.16_security.txt
@@ -80,7 +80,6 @@
 CVEs fixed in 5.16.17:
   CVE-2022-20158: ef591b35176029fdefea38e8388ffa371e18f4b2 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
   CVE-2022-20368: ef591b35176029fdefea38e8388ffa371e18f4b2 net/packet: fix slab-out-of-bounds access in packet_recvmsg()
-  CVE-2022-20423: df7e088d51cdf78b1a0bf1f3d405c2593295c7b0 usb: gadget: rndis: prevent integer overflow in rndis_set_response()
 
 CVEs fixed in 5.16.18:
   CVE-2022-1015: 2c8ebdaa7c9755b85d90c07530210e83665bad9a netfilter: nf_tables: validate registers coming from userspace.
@@ -216,6 +215,7 @@
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-2590: (unk) mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -255,6 +255,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt
index 6550077..9d878d4 100644
--- a/data/5.17/5.17_CVEs.txt
+++ b/data/5.17/5.17_CVEs.txt
@@ -114,6 +114,7 @@
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-2590: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fixed with 5.17.5
@@ -164,6 +165,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fixed with 5.17.4
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fixed with 5.17.14
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt
index 73a811c..f806bed 100644
--- a/data/5.17/5.17_security.txt
+++ b/data/5.17/5.17_security.txt
@@ -83,6 +83,7 @@
 CVEs fixed in 5.17.14:
   CVE-2022-1184: 4b1cd51256e9267140153f04f4e62148adb2908c ext4: verify dir block before splitting it
   CVE-2022-1973: 2088cc00491e8d25a99d0f247df843e9c3df2040 fs/ntfs3: Fix invalid free in log_replay
+  CVE-2022-3577: 2ab0a30f4f709f462d253bbb36fc64bb6de5a135 HID: bigben: fix slab-out-of-bounds Write in bigben_probe
 
 CVEs fixed in 5.17.15:
   CVE-2022-32981: 638556430658eca42501271edb38154264767ff5 powerpc/32: Fix overread/overwrite of thread_struct via ptrace
@@ -171,6 +172,7 @@
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-2590: (unk) mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2663: (unk) netfilter: nf_conntrack_irc: Fix forged IP logic 
@@ -196,6 +198,21 @@
   CVE-2022-3522: (unk) mm/hugetlb: use hugetlb_pte_stable in migration race check 
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/5.18/5.18_CVEs.txt b/data/5.18/5.18_CVEs.txt
index 4d16555..2a56848 100644
--- a/data/5.18/5.18_CVEs.txt
+++ b/data/5.18/5.18_CVEs.txt
@@ -88,6 +88,7 @@
 CVE-2022-2586: Fixed with 5.18.18
 CVE-2022-2588: Fixed with 5.18.18
 CVE-2022-2590: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fixed with 5.18.10
 CVE-2022-26373: Fixed with 5.18.17
 CVE-2022-2663: Fix not seen in stream
@@ -120,6 +121,22 @@
 CVE-2022-3522: Fix not seen in stream
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fixed with 5.18.3
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fixed with 5.18.13
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.18/5.18_security.txt b/data/5.18/5.18_security.txt
index aad5de4..c9dd1c8 100644
--- a/data/5.18/5.18_security.txt
+++ b/data/5.18/5.18_security.txt
@@ -20,6 +20,7 @@
 CVEs fixed in 5.18.3:
   CVE-2022-1184: 298659c0e7074f774a794fc293df4014617b87be ext4: verify dir block before splitting it
   CVE-2022-1973: 2aafbe9fb210a355d6e0e92a91f294dee80e5d44 fs/ntfs3: Fix invalid free in log_replay
+  CVE-2022-3577: 50db547e5f25218e1aec3864d77cac0cb2fc51ca HID: bigben: fix slab-out-of-bounds Write in bigben_probe
 
 CVEs fixed in 5.18.4:
   CVE-2022-32981: 7764a258356c454fe56b9f56fc07c0e146a3bccb powerpc/32: Fix overread/overwrite of thread_struct via ptrace
@@ -141,6 +142,7 @@
   CVE-2022-23825: (unk)  
   CVE-2022-25265: (unk)  
   CVE-2022-2590: (unk) mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-2663: (unk) netfilter: nf_conntrack_irc: Fix forged IP logic 
   CVE-2022-26878: (unk)  
   CVE-2022-2785: (unk) bpf: Disallow bpf programs call prog_run command. 
@@ -156,6 +158,21 @@
   CVE-2022-3522: (unk) mm/hugetlb: use hugetlb_pte_stable in migration race check 
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
diff --git a/data/5.19/5.19_CVEs.txt b/data/5.19/5.19_CVEs.txt
index ae53536..1a8e8c1 100644
--- a/data/5.19/5.19_CVEs.txt
+++ b/data/5.19/5.19_CVEs.txt
@@ -68,6 +68,7 @@
 CVE-2022-2586: Fixed with 5.19.2
 CVE-2022-2588: Fixed with 5.19.2
 CVE-2022-2590: Fixed with 5.19.6
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26373: Fixed with 5.19.1
 CVE-2022-2663: Fixed with 5.19.9
 CVE-2022-26878: Fix unknown
@@ -84,6 +85,21 @@
 CVE-2022-3522: Fix not seen in stream
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3586: Fixed with 5.19.9
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
 CVE-2022-36946: Fixed with 5.19
diff --git a/data/5.19/5.19_security.txt b/data/5.19/5.19_security.txt
index 5b80591..ceaf97e 100644
--- a/data/5.19/5.19_security.txt
+++ b/data/5.19/5.19_security.txt
@@ -30,6 +30,7 @@
 CVEs fixed in 5.19.9:
   CVE-2022-2663: 6cf0609154b2ce8d3ae160e7506ab316400a8d3d netfilter: nf_conntrack_irc: Fix forged IP logic
   CVE-2022-3303: 723ac5ab2891b6c10dd6cc78ef5456af593490eb ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
+  CVE-2022-3586: 8f796f36f5ba839c11eb4685150ebeed496c546f sch_sfb: Don't assume the skb is still around after enqueueing to child
   CVE-2022-40307: d46815a8f26ca6db2336106a148265239f73b0af efi: capsule-loader: Fix use-after-free in efi_capsule_write
 
 CVEs fixed in 5.19.14:
@@ -106,6 +107,7 @@
   CVE-2022-2209: (unk)  
   CVE-2022-23825: (unk)  
   CVE-2022-25265: (unk)  
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26878: (unk)  
   CVE-2022-2961: (unk)  
   CVE-2022-2978: (unk)  
@@ -116,6 +118,20 @@
   CVE-2022-3522: (unk) mm/hugetlb: use hugetlb_pte_stable in migration race check 
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
diff --git a/data/5.2/5.2_CVEs.txt b/data/5.2/5.2_CVEs.txt
index bf77a11..8c16b08 100644
--- a/data/5.2/5.2_CVEs.txt
+++ b/data/5.2/5.2_CVEs.txt
@@ -568,7 +568,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -600,6 +599,7 @@
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -646,6 +646,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -669,4 +685,3 @@
 CVE-2022-42719: Fix not seen in stream
 CVE-2022-42720: Fix not seen in stream
 CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.2/5.2_security.txt b/data/5.2/5.2_security.txt
index 7eda5ce..43c6ea2 100644
--- a/data/5.2/5.2_security.txt
+++ b/data/5.2/5.2_security.txt
@@ -606,7 +606,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -638,6 +637,7 @@
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -684,6 +684,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -707,4 +723,3 @@
   CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
   CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
   CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.3/5.3_CVEs.txt b/data/5.3/5.3_CVEs.txt
index 06a7a97..3b2f964 100644
--- a/data/5.3/5.3_CVEs.txt
+++ b/data/5.3/5.3_CVEs.txt
@@ -540,7 +540,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -572,6 +571,7 @@
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -618,6 +618,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -641,4 +657,3 @@
 CVE-2022-42719: Fix not seen in stream
 CVE-2022-42720: Fix not seen in stream
 CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.3/5.3_security.txt b/data/5.3/5.3_security.txt
index 737b35a..02e07c7 100644
--- a/data/5.3/5.3_security.txt
+++ b/data/5.3/5.3_security.txt
@@ -576,7 +576,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -608,6 +607,7 @@
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -654,6 +654,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -677,4 +693,3 @@
   CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
   CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
   CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt
index d155d8f..4d5400f 100644
--- a/data/5.4/5.4_CVEs.txt
+++ b/data/5.4/5.4_CVEs.txt
@@ -466,7 +466,6 @@
 CVE-2022-20369: Fixed with 5.4.210
 CVE-2022-20421: Fixed with 5.4.213
 CVE-2022-20422: Fixed with 5.4.211
-CVE-2022-20423: Fixed with 5.4.187
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fixed with 5.4.199
 CVE-2022-21125: Fixed with 5.4.199
@@ -500,6 +499,7 @@
 CVE-2022-25636: Fixed with 5.4.182
 CVE-2022-2586: Fixed with 5.4.211
 CVE-2022-2588: Fixed with 5.4.211
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fixed with 5.4.204
 CVE-2022-26373: Fixed with 5.4.210
 CVE-2022-2639: Fixed with 5.4.191
@@ -546,6 +546,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fixed with 5.4.198
+CVE-2022-3586: Fixed with 5.4.213
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fixed with 5.4.207
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -566,7 +582,6 @@
 CVE-2022-41849: Fix unknown
 CVE-2022-41850: Fix unknown
 CVE-2022-42703: Fixed with 5.4.212
-CVE-2022-42719: Fix not seen in stream
+CVE-2022-42719: Fixed with 5.4.219
 CVE-2022-42720: Fixed with 5.4.218
 CVE-2022-42721: Fixed with 5.4.218
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt
index 9cba34b..ccee3b6 100644
--- a/data/5.4/5.4_security.txt
+++ b/data/5.4/5.4_security.txt
@@ -644,7 +644,6 @@
 CVEs fixed in 5.4.187:
   CVE-2022-20158: 268dcf1f7b3193bc446ec3d14e08a240e9561e4d net/packet: fix slab-out-of-bounds access in packet_recvmsg()
   CVE-2022-20368: 268dcf1f7b3193bc446ec3d14e08a240e9561e4d net/packet: fix slab-out-of-bounds access in packet_recvmsg()
-  CVE-2022-20423: 21829376268397f9fd2c35cfa9135937b6aa3a1e usb: gadget: rndis: prevent integer overflow in rndis_set_response()
 
 CVEs fixed in 5.4.188:
   CVE-2022-1016: 06f0ff82c70241a766a811ae1acf07d6e2734dcb netfilter: nf_tables: initialize registers in nft_do_chain()
@@ -699,6 +698,7 @@
   CVE-2022-1966: f36736fbd48491a8d85cd22f4740d542c5a1546e netfilter: nf_tables: disallow non-stateful expression in sets earlier
   CVE-2022-32250: f36736fbd48491a8d85cd22f4740d542c5a1546e netfilter: nf_tables: disallow non-stateful expression in sets earlier
   CVE-2022-32981: 0c4bc0a2f8257f79a70fe02b9a698eb14695a64b powerpc/32: Fix overread/overwrite of thread_struct via ptrace
+  CVE-2022-3577: 00771de7cc28e405f5ae19ca46facd83a534bb8f HID: bigben: fix slab-out-of-bounds Write in bigben_probe
 
 CVEs fixed in 5.4.199:
   CVE-2022-21123: 0800f1b45bf6d85e5a168db9ae91fb816f0a8c34 x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
@@ -753,6 +753,7 @@
 CVEs fixed in 5.4.213:
   CVE-2022-20421: 30d0901b307f27d36b2655fb3048cf31ee0e89c0 binder: fix UAF of ref->proc caused by race condition
   CVE-2022-2663: 36f7b71f8ad8e4d224b45f7d6ecfeff63b091547 netfilter: nf_conntrack_irc: Fix forged IP logic
+  CVE-2022-3586: 279c7668e354fa151d5fd2e8c42b5153a1de3135 sch_sfb: Don't assume the skb is still around after enqueueing to child
   CVE-2022-40307: 8028ff4cdbb3f20d3c1c04be33a83bab0cb94997 efi: capsule-loader: Fix use-after-free in efi_capsule_write
 
 CVEs fixed in 5.4.215:
@@ -770,6 +771,9 @@
   CVE-2022-42720: 785eaabfe3103e8bfa36aebacff6e8f69f092ed7 wifi: cfg80211: fix BSS refcounting bugs
   CVE-2022-42721: 77bb20ccb9dfc9ed4f9c93788c90d08cfd891cdc wifi: cfg80211: avoid nontransmitted BSS list corruption
 
+CVEs fixed in 5.4.219:
+  CVE-2022-42719: 0cb5be43dc4b79da010522f79a06fa56f944d3cd wifi: mac80211: fix MBSSID parsing use-after-free
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -873,6 +877,7 @@
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
   CVE-2022-23825: (unk)  
   CVE-2022-25265: (unk)  
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-2961: (unk)  
   CVE-2022-2978: (unk)  
   CVE-2022-2991: (unk) remove the lightnvm subsystem 
@@ -887,6 +892,20 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
   CVE-2022-38096: (unk)  
@@ -898,5 +917,3 @@
   CVE-2022-41848: (unk)  
   CVE-2022-41849: (unk)  
   CVE-2022-41850: (unk)  
-  CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.5/5.5_CVEs.txt b/data/5.5/5.5_CVEs.txt
index b5adf25..ea3f566 100644
--- a/data/5.5/5.5_CVEs.txt
+++ b/data/5.5/5.5_CVEs.txt
@@ -424,7 +424,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
 CVE-2022-21125: Fix not seen in stream
@@ -458,6 +457,7 @@
 CVE-2022-25636: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -506,6 +506,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -529,4 +545,3 @@
 CVE-2022-42719: Fix not seen in stream
 CVE-2022-42720: Fix not seen in stream
 CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.5/5.5_security.txt b/data/5.5/5.5_security.txt
index 73c0f80..0bc65f8 100644
--- a/data/5.5/5.5_security.txt
+++ b/data/5.5/5.5_security.txt
@@ -458,7 +458,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
@@ -492,6 +491,7 @@
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -540,6 +540,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -563,4 +579,3 @@
   CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
   CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
   CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.6/5.6_CVEs.txt b/data/5.6/5.6_CVEs.txt
index f0c1c32..de08d74 100644
--- a/data/5.6/5.6_CVEs.txt
+++ b/data/5.6/5.6_CVEs.txt
@@ -398,7 +398,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
@@ -433,6 +432,7 @@
 CVE-2022-25636: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -481,6 +481,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -504,4 +520,3 @@
 CVE-2022-42719: Fix not seen in stream
 CVE-2022-42720: Fix not seen in stream
 CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.6/5.6_security.txt b/data/5.6/5.6_security.txt
index f151270..4982f78 100644
--- a/data/5.6/5.6_security.txt
+++ b/data/5.6/5.6_security.txt
@@ -432,7 +432,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
@@ -467,6 +466,7 @@
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -515,6 +515,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -538,4 +554,3 @@
   CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
   CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
   CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.7/5.7_CVEs.txt b/data/5.7/5.7_CVEs.txt
index 5d32863..9937af3 100644
--- a/data/5.7/5.7_CVEs.txt
+++ b/data/5.7/5.7_CVEs.txt
@@ -385,7 +385,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
@@ -421,6 +420,7 @@
 CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -469,6 +469,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
@@ -492,4 +508,3 @@
 CVE-2022-42719: Fix not seen in stream
 CVE-2022-42720: Fix not seen in stream
 CVE-2022-42721: Fix not seen in stream
-CVE-2022-42722: Fix not seen in stream
diff --git a/data/5.7/5.7_security.txt b/data/5.7/5.7_security.txt
index e38bf80..7d2dadb 100644
--- a/data/5.7/5.7_security.txt
+++ b/data/5.7/5.7_security.txt
@@ -419,7 +419,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
@@ -455,6 +454,7 @@
   CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -503,6 +503,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
@@ -526,4 +542,3 @@
   CVE-2022-42719: (unk) wifi: mac80211: fix MBSSID parsing use-after-free 
   CVE-2022-42720: (unk) wifi: cfg80211: fix BSS refcounting bugs 
   CVE-2022-42721: (unk) wifi: cfg80211: avoid nontransmitted BSS list corruption 
-  CVE-2022-42722: (unk) wifi: mac80211: fix crash in beacon protection for P2P-device 
diff --git a/data/5.8/5.8_CVEs.txt b/data/5.8/5.8_CVEs.txt
index d7077bf..60e68d2 100644
--- a/data/5.8/5.8_CVEs.txt
+++ b/data/5.8/5.8_CVEs.txt
@@ -366,7 +366,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
@@ -402,6 +401,7 @@
 CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -451,6 +451,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.8/5.8_security.txt b/data/5.8/5.8_security.txt
index c7e9903..de73225 100644
--- a/data/5.8/5.8_security.txt
+++ b/data/5.8/5.8_security.txt
@@ -400,7 +400,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
@@ -436,6 +435,7 @@
   CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -485,6 +485,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/5.9/5.9_CVEs.txt b/data/5.9/5.9_CVEs.txt
index 4b237f6..b6c95a3 100644
--- a/data/5.9/5.9_CVEs.txt
+++ b/data/5.9/5.9_CVEs.txt
@@ -337,7 +337,6 @@
 CVE-2022-20369: Fix not seen in stream
 CVE-2022-20421: Fix not seen in stream
 CVE-2022-20422: Fix not seen in stream
-CVE-2022-20423: Fix not seen in stream
 CVE-2022-20424: Fix not seen in stream
 CVE-2022-2078: Fix not seen in stream
 CVE-2022-21123: Fix not seen in stream
@@ -373,6 +372,7 @@
 CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
+CVE-2022-2602: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
 CVE-2022-26373: Fix not seen in stream
 CVE-2022-2639: Fix not seen in stream
@@ -423,6 +423,22 @@
 CVE-2022-3523: Fix not seen in stream
 CVE-2022-3524: Fix not seen in stream
 CVE-2022-3526: Fix not seen in stream
+CVE-2022-3531: Fix unknown
+CVE-2022-3532: Fix unknown
+CVE-2022-3535: Fix not seen in stream
+CVE-2022-3541: Fix not seen in stream
+CVE-2022-3542: Fix not seen in stream
+CVE-2022-3543: Fix not seen in stream
+CVE-2022-3544: Fix unknown
+CVE-2022-3545: Fix not seen in stream
+CVE-2022-3564: Fix unknown
+CVE-2022-3565: Fix not seen in stream
+CVE-2022-3566: Fix not seen in stream
+CVE-2022-3567: Fix not seen in stream
+CVE-2022-3577: Fix not seen in stream
+CVE-2022-3586: Fix not seen in stream
+CVE-2022-3594: Fix not seen in stream
+CVE-2022-3595: Fix not seen in stream
 CVE-2022-36123: Fix not seen in stream
 CVE-2022-36280: Fix unknown
 CVE-2022-36402: Fix unknown
diff --git a/data/5.9/5.9_security.txt b/data/5.9/5.9_security.txt
index e85e5df..c6b429d 100644
--- a/data/5.9/5.9_security.txt
+++ b/data/5.9/5.9_security.txt
@@ -367,7 +367,6 @@
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-20421: (unk) binder: fix UAF of ref->proc caused by race condition 
   CVE-2022-20422: (unk) arm64: fix oops in concurrently setting insn_emulation sysctls 
-  CVE-2022-20423: (unk) usb: gadget: rndis: prevent integer overflow in rndis_set_response() 
   CVE-2022-20424: (unk) io_uring: remove io_identity 
   CVE-2022-2078: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
@@ -403,6 +402,7 @@
   CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2602: (unk) io_uring/af_unix: defer registered files gc to io_uring release 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
@@ -453,6 +453,22 @@
   CVE-2022-3523: (unk) mm/memory.c: fix race when faulting a device private page 
   CVE-2022-3524: (unk) tcp/udp: Fix memory leak in ipv6_renew_options(). 
   CVE-2022-3526: (unk) macvlan: Fix leaking skb in source mode with nodst option 
+  CVE-2022-3531: (unk)  
+  CVE-2022-3532: (unk)  
+  CVE-2022-3535: (unk) net: mvpp2: fix mvpp2 debugfs leak 
+  CVE-2022-3541: (unk) eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address 
+  CVE-2022-3542: (unk) bnx2x: fix potential memory leak in bnx2x_tpa_stop() 
+  CVE-2022-3543: (unk) af_unix: Fix memory leaks of the whole sk due to OOB skb. 
+  CVE-2022-3544: (unk)  
+  CVE-2022-3545: (unk) nfp: fix use-after-free in area_cache_get() 
+  CVE-2022-3564: (unk)  
+  CVE-2022-3565: (unk) mISDN: fix use-after-free bugs in l1oip timer handlers 
+  CVE-2022-3566: (unk) tcp: Fix data races around icsk->icsk_af_ops. 
+  CVE-2022-3567: (unk) ipv6: Fix data races around sk->sk_prot. 
+  CVE-2022-3577: (unk) HID: bigben: fix slab-out-of-bounds Write in bigben_probe 
+  CVE-2022-3586: (unk) sch_sfb: Don't assume the skb is still around after enqueueing to child 
+  CVE-2022-3594: (unk) r8152: Rate limit overflow messages 
+  CVE-2022-3595: (unk) cifs: fix double-fault crash during ntlmssp 
   CVE-2022-36123: (unk) x86: Clear .brk area at early boot 
   CVE-2022-36280: (unk)  
   CVE-2022-36402: (unk)  
diff --git a/data/CVEs.txt b/data/CVEs.txt
index ef300bb..bf62368 100644
--- a/data/CVEs.txt
+++ b/data/CVEs.txt
@@ -2041,9 +2041,9 @@
 CVE-2022-20368: 0fb375fb9b93b7d822debc6a734052337ccfdb1f - c700525fcc06b05adfea78039de02628af79e07a (v2.6.14-rc3 to v5.17)
 CVE-2022-20369: 7f98639def42a676998d734b381af6c0e64d7791 - 8310ca94075e784bbb06593cd6c068ee6b6e4ca6 (v2.6.35-rc1 to v5.18-rc1)
 CVE-2022-20409: 5c3462cfd123b341c9d3c947c1a2bab373f1697f - 4379bf8bd70b5de6bba7d53015b0c36c57a634ee (v5.10-rc1 to v5.12-rc1-dontuse)
-CVE-2022-20421: (n/a) - a0e44c64b6061dda7e00b7c458e4523e2331b739 (unk to v6.0-rc4)
-CVE-2022-20422: (n/a) - af483947d472eccb79e42059276c4deed76f99a6 (unk to v6.0-rc1)
-CVE-2022-20423: (n/a) - 65f3324f4b6fed78b8761c3b74615ecf0ffa81fa (unk to v5.17)
+CVE-2022-20421: a60b890f607dc6d7806afc0dc8666577faf40bb4 - a0e44c64b6061dda7e00b7c458e4523e2331b739 (v4.14-rc1 to v6.0-rc4)
+CVE-2022-20422: 587064b610c703f259317d00dc37bf6d40f4fc74 - af483947d472eccb79e42059276c4deed76f99a6 (v3.19-rc1 to v6.0-rc1)
+CVE-2022-20423: 38ea1eac7d88072bbffb630e2b3db83ca649b826 - 65f3324f4b6fed78b8761c3b74615ecf0ffa81fa (v5.17-rc4 to v5.17)
 CVE-2022-20424: (n/a) - 4379bf8bd70b5de6bba7d53015b0c36c57a634ee (unk to v5.12-rc1-dontuse)
 CVE-2022-2078: f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85 - fecf31ee395b0295f2d7260aa29946b7605f7c85 (v5.6-rc1 to v5.19-rc1)
 CVE-2022-21123: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8cb861e9e3c9a55099ad3d08e1a3b653d29c33ca (v2.6.12-rc2 to v5.19-rc3)
@@ -2083,6 +2083,7 @@
 CVE-2022-2586: 958bee14d0718ca7a5002c0f48a099d1d345812a - 470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 (v3.16-rc1 to v6.0-rc1)
 CVE-2022-2588: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9ad36309e2719a884f946678e0296be10f0bb4c1 (v2.6.12-rc2 to v6.0-rc1)
 CVE-2022-2590: 9ae0f87d009ca6c4aab2882641ddfc319727e3db - 5535be3099717646781ce1540cf725965d680e7b (v5.16-rc1 to v6.0-rc3)
+CVE-2022-2602: 6b06314c47e141031be043539900d80d2c7ba10f - 0091bfc81741b8d3aeb3b7ab8636f911b2de6e80 (v5.1-rc1 to v6.1-rc1)
 CVE-2022-26365: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2f446ffe9d737e9a844b97887919c4fda18246e7 (v2.6.12-rc2 to v5.19-rc6)
 CVE-2022-26373: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2b1299322016731d56807aa49254a5ea3080b6b3 (v2.6.12-rc2 to v6.0-rc1)
 CVE-2022-2639: f28cd2af22a0c134e4aa1c64a70f70d815d473fb - cefa91b2332d7009bc0be5d951d6cbbf349f90f8 (v5.1-rc4 to v5.18-rc4)
@@ -2146,6 +2147,22 @@
 CVE-2022-3523: (n/a) - 16ce101db85db694a91380aa4c89b25530871d33 (unk to v6.1-rc1)
 CVE-2022-3524: (n/a) - 3c52c6bb831f6335c176a0fc7214e26f43adbd11 (unk to v6.1-rc1)
 CVE-2022-3526: (n/a) - e16b859872b87650bb55b12cca5a5fcdc49c1442 (unk to v5.18-rc3)
+CVE-2022-3531: (n/a) - (n/a) (unk to unk)
+CVE-2022-3532: (n/a) - (n/a) (unk to unk)
+CVE-2022-3535: (n/a) - 0152dfee235e87660f52a117fc9f70dc55956bb4 (unk to v6.1-rc1)
+CVE-2022-3541: (n/a) - 12aece8b01507a2d357a1861f470e83621fbb6f2 (unk to v6.1-rc1)
+CVE-2022-3542: (n/a) - b43f9acbb8942b05252be83ac25a81cec70cc192 (unk to v6.1-rc1)
+CVE-2022-3543: (n/a) - 7a62ed61367b8fd01bae1e18e30602c25060d824 (unk to v6.1-rc1)
+CVE-2022-3544: (n/a) - (n/a) (unk to unk)
+CVE-2022-3545: (n/a) - 02e1a114fdb71e59ee6770294166c30d437bf86a (unk to v6.0-rc1)
+CVE-2022-3564: (n/a) - (n/a) (unk to unk)
+CVE-2022-3565: (n/a) - 2568a7e0832ee30b0a351016d03062ab4e0e0a3f (unk to v6.1-rc1)
+CVE-2022-3566: (n/a) - f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57 (unk to v6.1-rc1)
+CVE-2022-3567: (n/a) - 364f997b5cfe1db0d63a390fe7c801fa2b3115f6 (unk to v6.1-rc1)
+CVE-2022-3577: (n/a) - fc4ef9d5724973193bfa5ebed181dba6de3a56db (unk to v5.19-rc1)
+CVE-2022-3586: (n/a) - 9efd23297cca530bb35e1848665805d3fcdd7889 (unk to v6.0-rc5)
+CVE-2022-3594: (n/a) - 93e2be344a7db169b7119de21ac1bf253b8c6907 (unk to v6.1-rc1)
+CVE-2022-3595: (n/a) - b854b4ee66437e6e1622fda90529c814978cb4ca (unk to v6.1-rc1)
 CVE-2022-36123: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 38fa5479b41376dc9d7f57e71c83514285a25ca0 (v2.6.12-rc2 to v5.19-rc6)
 CVE-2022-36280: (n/a) - (n/a) (unk to unk)
 CVE-2022-36402: (n/a) - (n/a) (unk to unk)
@@ -2163,12 +2180,12 @@
 CVE-2022-40768: 5a25ba1677ab8d63890016a8c1bca68a3e0fbc7d - 6022f210461fef67e6e676fd8544ca02d1bcfa7a (v2.6.19-rc1 to v6.1-rc1)
 CVE-2022-41218: (n/a) - (n/a) (unk to unk)
 CVE-2022-41222: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 97113eb39fa7972722ff490b947d8af023e1f6a2 (v2.6.12-rc2 to v5.14-rc1)
-CVE-2022-41674: (n/a) - aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d (unk to v6.1-rc1)
+CVE-2022-41674: 0b8fb8235be8be99a197e8d948fc0a2df8dc261a - aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d (v5.1-rc1 to v6.1-rc1)
 CVE-2022-41848: (n/a) - (n/a) (unk to unk)
 CVE-2022-41849: (n/a) - (n/a) (unk to unk)
 CVE-2022-41850: (n/a) - (n/a) (unk to unk)
-CVE-2022-42703: (n/a) - 2555283eb40df89945557273121e9393ef9b542b (unk to v6.0-rc4)
-CVE-2022-42719: (n/a) - ff05d4b45dd89b922578dac497dcabf57cf771c6 (unk to v6.1-rc1)
-CVE-2022-42720: (n/a) - 0b7808818cb9df6680f98996b8e9a439fa7bcc2f (unk to v6.1-rc1)
-CVE-2022-42721: (n/a) - bcca852027e5878aec911a347407ecc88d6fff7f (unk to v6.1-rc1)
-CVE-2022-42722: (n/a) - b2d03cabe2b2e150ff5a381731ea0355459be09f (unk to v6.1-rc1)
+CVE-2022-42703: 7a3ef208e662f4b63d43a23f61a64a129c525bbc - 2555283eb40df89945557273121e9393ef9b542b (v3.19-rc4 to v6.0-rc4)
+CVE-2022-42719: 5023b14cf4df4d22e1a80738167f3438c9e62e5f - ff05d4b45dd89b922578dac497dcabf57cf771c6 (v5.2-rc1 to v6.1-rc1)
+CVE-2022-42720: a3584f56de1c808d4383a275b4a74467b19e5645 - 0b7808818cb9df6680f98996b8e9a439fa7bcc2f (v5.1-rc1 to v6.1-rc1)
+CVE-2022-42721: 0b8fb8235be8be99a197e8d948fc0a2df8dc261a - bcca852027e5878aec911a347407ecc88d6fff7f (v5.1-rc1 to v6.1-rc1)
+CVE-2022-42722: 9eaf183af741e3d8393eb571ac8aec9ee7d6530e - b2d03cabe2b2e150ff5a381731ea0355459be09f (v5.8-rc1 to v6.1-rc1)
diff --git a/data/cmts.json b/data/cmts.json
index 67e3ff5..65708ab 100644
--- a/data/cmts.json
+++ b/data/cmts.json
@@ -7,10 +7,12 @@
     "004a403c2e954734090a69aedc7f4f822bdcc142": "v2.6.27-rc1", 
     "005145378c9ad7575a01b6ce1ba118fb427f583a": "v4.11-rc1", 
     "008ca35f6e87be1d60b6af3d1ae247c6d5c2531d": "v5.18-rc1", 
+    "0091bfc81741b8d3aeb3b7ab8636f911b2de6e80": "v6.1-rc1", 
     "00b5f37189d24ac3ed46cb7f11742094778c46ce": "v5.18-rc1", 
     "01310bb7c9c98752cc763b36532fab028e0f8f81": "v4.20-rc3", 
     "01330d7288e0050c5aaabc558059ff91589e67cd": "v4.5-rc1", 
     "0143fc5e9f6f5aad4764801015bc8d4b4a278200": "v3.6-rc1", 
+    "0152dfee235e87660f52a117fc9f70dc55956bb4": "v6.1-rc1", 
     "017c59c042d01fc84cae7a8ea475861e702c77ab": "v4.9-rc1", 
     "0185604c2d82c560dab2f2933a18f797e74ab5a8": "v4.4-rc7", 
     "01c846f9539c194c7a6e34af036b1115b8ed822a": "v3.17-rc1", 
@@ -20,6 +22,7 @@
     "027ef6c87853b0a9df53175063028edb4950d476": "v3.7-rc1", 
     "028a41e89383e1208dff1afe3e260b8cb6d3431c": "v4.1-rc1", 
     "029f7f3b8701cc7aca8bdb31f0c7edd6a479e357": "v4.5-rc1", 
+    "02e1a114fdb71e59ee6770294166c30d437bf86a": "v6.0-rc1", 
     "0305cd5f7fca85dae392b9ba85b116896eb7c1c7": "v4.4-rc1", 
     "030b533c4fd4d2ec3402363323de4bb2983c9cee": "v4.9-rc1", 
     "030e2c78d3a91dd0d27fef37e91950dde333eba1": "v4.5-rc1", 
@@ -124,6 +127,7 @@
     "0b4419162aa6c4204843f3a13b48d9ab821d3167": "v2.6.27-rc1", 
     "0b7808818cb9df6680f98996b8e9a439fa7bcc2f": "v6.1-rc1", 
     "0b79459b482e85cb7426aa7da683a9f2c97aeae1": "v3.9-rc4", 
+    "0b8fb8235be8be99a197e8d948fc0a2df8dc261a": "v5.1-rc1", 
     "0b99d58902dd82fa51216eb8e0d6ddd8c43e90e4": "v3.12-rc1", 
     "0b9f6c4615c993d2b552e0d2bd1ade49b56e5beb": "v4.10-rc1", 
     "0ba002bc4393dcfae031fc707b11c094b46a5048": "v4.16-rc1", 
@@ -208,6 +212,7 @@
     "129a72a0d3c8e139a04512325384fe5ac119e74d": "v4.10-rc4", 
     "12a169e7d8f4b1c95252d8b04ed0f1033ed7cfe2": "v2.6.28-rc1", 
     "12ae030d54ef250706da5642fc7697cc60ad0df7": "v3.13-rc1", 
+    "12aece8b01507a2d357a1861f470e83621fbb6f2": "v6.1-rc1", 
     "12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9": "v5.11-rc6", 
     "12ca6ad2e3a896256f086497a7c7406a547ee373": "v4.4", 
     "12d6e7538e2d418c08f082b1b44ffa5fb7270ed8": "v3.7-rc1", 
@@ -437,6 +442,7 @@
     "251e22abde21833b3d29577e4d8c7aaccd650eee": "v4.7-rc1", 
     "253f4911f297b83745938b7f2c5649b94730b002": "v4.7-rc1", 
     "2555283eb40df89945557273121e9393ef9b542b": "v6.0-rc4", 
+    "2568a7e0832ee30b0a351016d03062ab4e0e0a3f": "v6.1-rc1", 
     "256df2f3879efdb2e9808bdb1b54b16fbb11fa38": "v2.6.36-rc1", 
     "257b5358b32f17e0603b6ff57b13610b0e02348f": "v2.6.36-rc1", 
     "2638fd0f92d4397884fd991d8f4925cb3f081901": "v4.11-rc7", 
@@ -630,6 +636,7 @@
     "362e4e49abe53e89d87455dfcd7c1bbaf08a839d": "v3.1-rc8", 
     "363b02dab09b3226f3bd1420dad9c72b79a42a76": "v4.14-rc6", 
     "364dbdf3b6c31a4a5fb7a6d479e7aafb4a7a10b6": "v2.6.38-rc1", 
+    "364f997b5cfe1db0d63a390fe7c801fa2b3115f6": "v6.1-rc1", 
     "36947254e5f981aeeedab1c7dfa35fc34d330e80": "v5.7-rc1", 
     "36a6503feddadbbad415fb3891e80f94c10a9b21": "v4.9-rc1", 
     "36cf515b9bbe298e1ce7384620f0d4ec45ad3328": "v4.12-rc1", 
@@ -930,6 +937,7 @@
     "500a373d731ac506612db12631ec21295c1ff360": "v5.10-rc1", 
     "50145474f6ef4a9c19205b173da6264a644c7489": "v5.9-rc6", 
     "50220dead1650609206efe91f0cc116132d59b3f": "v4.6-rc1", 
+    "5023b14cf4df4d22e1a80738167f3438c9e62e5f": "v5.2-rc1", 
     "502e95c6678505474f1056480310cd9382bacbac": "v4.1-rc1", 
     "50535249f624d0072cd885bcdce4e4b6fb770160": "v5.12-rc5", 
     "505d9dcb0f7ddf9d075e729523a33d38642ae680": "v5.15-rc4", 
@@ -1012,6 +1020,7 @@
     "5800dc5c19f34e6e03b5adab1282535cb102fafd": "v4.19-rc1", 
     "581738a681b6faae5725c2555439189ca81c0f1f": "v5.5-rc1", 
     "585895cdfc683a067d803fead83267cee309ffd0": "v2.6.39-rc1", 
+    "587064b610c703f259317d00dc37bf6d40f4fc74": "v3.19-rc1", 
     "5872331b3d91820e14716632ebb56b1399b34fe1": "v5.9-rc2", 
     "588afcc1c0e45358159090d95bf7b246fb67565f": "v4.5-rc1", 
     "588f7d39b3592a36fb7702ae3b8bdd9be4621e2f": "v5.2-rc6", 
@@ -1221,6 +1230,7 @@
     "6acb47d1a318e5b3b7115354ebc4ea060c59d3a1": "v4.20-rc1", 
     "6aeb75e6adfaed16e58780309613a578fe1ee90b": "v4.12-rc2", 
     "6af3aa57a0984e061f61308fe181a9a12359fecc": "v5.4-rc4", 
+    "6b06314c47e141031be043539900d80d2c7ba10f": "v5.1-rc1", 
     "6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a": "v5.17-rc8", 
     "6b1e6cc7855b09a0a9bfa1d9f30172ba366f161c": "v4.8-rc1", 
     "6b4afdd794783fe515b50838aa36591e3feea990": "v3.15-rc1", 
@@ -1394,6 +1404,8 @@
     "79e48650320e6fba48369fccf13fd045315b19b8": "v4.6", 
     "7a2af766af15887754f7f7a0869b4603b390876a": "v4.14-rc1", 
     "7a3e97b0dc4bbac2ba7803564ab0057722689921": "v3.4-rc1", 
+    "7a3ef208e662f4b63d43a23f61a64a129c525bbc": "v3.19-rc4", 
+    "7a62ed61367b8fd01bae1e18e30602c25060d824": "v6.1-rc1", 
     "7a7b5df84b6b4e5d599c7289526eed96541a0654": "v4.10-rc7", 
     "7a9cdebdcc17e426fb5287e4a82db1dfe86339b2": "v4.19-rc4", 
     "7ada876a8703f23befbb20a7465a702ee39b1704": "v2.6.37-rc1", 
@@ -1669,6 +1681,7 @@
     "93a2001bdfd5376c3dc2158653034c20392d15c5": "v4.7-rc5", 
     "93c303d2045b30572d8d5e74d3ad80692acfebbe": "v4.18-rc1", 
     "93c647643b48f0131f02e45da3bd367d80443291": "v4.15-rc4", 
+    "93e2be344a7db169b7119de21ac1bf253b8c6907": "v6.1-rc1", 
     "94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24": "v5.13-rc4", 
     "942080643bce061c3dd9d5718d3b745dcb39a8bc": "v3.19-rc1", 
     "9446edb9a1740989cf6c20daf7510fb9a23be14a": "v3.12-rc2", 
@@ -1797,7 +1810,9 @@
     "9e8910257397372633e74b333ef891f20c800ee4": "v3.12-rc1", 
     "9ea2aa8b7dba9e99544c4187cc298face254569f": "v3.19-rc5", 
     "9ea9b9c48387edc101d56349492ad9c0492ff78d": "v5.15-rc1", 
+    "9eaf183af741e3d8393eb571ac8aec9ee7d6530e": "v5.8-rc1", 
     "9ec7671603573ede31207eb5b0b3e1aa211b2854": "v2.6.31-rc1", 
+    "9efd23297cca530bb35e1848665805d3fcdd7889": "v6.0-rc5", 
     "9f00b2e7cf241fa389733d41b615efdaa2cb0f5b": "v3.11-rc1", 
     "9f0f3ebeda47a5518817f33c40f6d3ea9c0275b8": "v4.12-rc1", 
     "9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f": "v5.3-rc1", 
@@ -1855,6 +1870,7 @@
     "a31ad380bed817aa25f8830ad23e1a0480fef797": "v3.10-rc1", 
     "a32e0eec7042b21ccb52896cf715e3e2641fed93": "v3.5-rc1", 
     "a33121e5487b424339636b25c35d3a180eaa5f5e": "v5.5-rc5", 
+    "a3584f56de1c808d4383a275b4a74467b19e5645": "v5.1-rc1", 
     "a35f2ef3b7376bfd0a57f7844bd7454389aae1fc": "v5.12-rc1", 
     "a36c61f9025b8924f99f54d518763bee7aa84085": "v2.6.37-rc1", 
     "a370003cc301d4361bae20c9ef615f89bf8d1e8a": "v5.2-rc6", 
@@ -1896,6 +1912,7 @@
     "a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887": "v3.10", 
     "a5ec6ae161d72f01411169a938fa5f8baea16e8f": "v4.15-rc5", 
     "a5f596830e27e15f7a0ecd6be55e433d776986d8": "v4.16-rc6", 
+    "a60b890f607dc6d7806afc0dc8666577faf40bb4": "v4.14-rc1", 
     "a612769774a30e4fc143c4cb6395c12573415660": "v4.7", 
     "a6138db815df5ee542d848318e5dae681590fccd": "v3.17-rc1", 
     "a642fc305053cc1c6e47e4f4df327895747ab485": "v3.18-rc2", 
@@ -2038,6 +2055,7 @@
     "b41e98524e424d104aa7851d54fd65820759875a": "v5.7-rc1", 
     "b42db0860e13067fcc7cbfba3966c9e652668bbc": "v4.17-rc4", 
     "b43d1f9f7067c6759b1051e8ecb84e82cef569fe": "v5.5-rc3", 
+    "b43f9acbb8942b05252be83ac25a81cec70cc192": "v6.1-rc1", 
     "b4487b93545214a9db8cbf32e86411677b0cca21": "v5.9-rc1", 
     "b463a6f744a263fccd7da14db1afdc880371a280": "v2.6.37-rc1", 
     "b46a0bf78ad7b150ef5910da83859f7f5a514ffd": "v5.0-rc5", 
@@ -2073,6 +2091,7 @@
     "b7cc176c9eb3aa6989ac099efd8bdd6d0eaa784a": "v2.6.24-rc1", 
     "b805d78d300bcf2c83d6df7da0c818b0fee41427": "v5.1", 
     "b844f0ecbc5626ec26cfc70cb144a4c9b85dc3f2": "v4.6-rc1", 
+    "b854b4ee66437e6e1622fda90529c814978cb4ca": "v6.1-rc1", 
     "b858c331cdf402853be2c48c8f4f77173ef04da8": "v3.9-rc1", 
     "b860d3cc62877fad02863e2a08efff69a19382d2": "v3.9-rc7", 
     "b862676e371715456c9dade7990c8004996d0d9e": "v5.13-rc1", 
@@ -2765,6 +2784,7 @@
     "f45db2b909c7e76f35850e78f017221f30282b8e": "v5.8-rc1", 
     "f48da8b14d04ca87ffcffe68829afd45f926ec6a": "v3.18-rc3", 
     "f48e91e87e67b56bef63393d1a02c6e22c1d7078": "v4.12-rc2", 
+    "f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57": "v6.1-rc1", 
     "f4c23a140d80ef5e6d3d1f8f57007649014b60fa": "v5.8-rc7", 
     "f538d4da8d521746ca5ebf8c1a8105eb49bfb45e": "v2.6.15-rc1", 
     "f53dc67c5e7babafe239b93a11678b0e05bead51": "v2.6.25-rc1", 
@@ -2847,6 +2867,7 @@
     "fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57": "v4.14-rc1", 
     "fc3314609047daf472b3ffc49f9a1c5608068713": "v3.9-rc1", 
     "fc3a9157d3148ab91039c75423da8ef97be3e105": "v2.6.38-rc1", 
+    "fc4ef9d5724973193bfa5ebed181dba6de3a56db": "v5.19-rc1", 
     "fc67dd70adb711a45d2ef34e12d1a8be75edde61": "v4.16-rc1", 
     "fc6d01ff9ef03b66d4a3a23b46fc3c3d8cf92009": "v5.18-rc1", 
     "fc739a058d99c9297ef6bfd923b809d85855b9a9": "v5.4-rc3", 
diff --git a/data/kernel_cves.json b/data/kernel_cves.json
index 21a4a86..636d01a 100644
--- a/data/kernel_cves.json
+++ b/data/kernel_cves.json
@@ -71208,28 +71208,28 @@
         "last_modified": "2022-10-17"
     }, 
     "CVE-2022-20421": {
-        "affected_versions": "unk to v6.0-rc4", 
-        "breaks": "", 
+        "affected_versions": "v4.14-rc1 to v6.0-rc4", 
+        "breaks": "a60b890f607dc6d7806afc0dc8666577faf40bb4", 
         "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", 
         "fixes": "a0e44c64b6061dda7e00b7c458e4523e2331b739", 
         "last_affected_version": "5.19.7", 
-        "last_modified": "2022-10-12"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-20422": {
-        "affected_versions": "unk to v6.0-rc1", 
-        "breaks": "", 
+        "affected_versions": "v3.19-rc1 to v6.0-rc1", 
+        "breaks": "587064b610c703f259317d00dc37bf6d40f4fc74", 
         "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", 
         "fixes": "af483947d472eccb79e42059276c4deed76f99a6", 
         "last_affected_version": "5.19.1", 
-        "last_modified": "2022-10-12"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-20423": {
-        "affected_versions": "unk to v5.17", 
-        "breaks": "", 
+        "affected_versions": "v5.17-rc4 to v5.17", 
+        "breaks": "38ea1eac7d88072bbffb630e2b3db83ca649b826", 
         "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
         "fixes": "65f3324f4b6fed78b8761c3b74615ecf0ffa81fa", 
         "last_affected_version": "5.16", 
-        "last_modified": "2022-10-12"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-20424": {
         "affected_versions": "unk to v5.12-rc1-dontuse", 
@@ -72312,6 +72312,13 @@
         "last_affected_version": "5.19.5", 
         "last_modified": "2022-09-22"
     }, 
+    "CVE-2022-2602": {
+        "affected_versions": "v5.1-rc1 to v6.1-rc1", 
+        "breaks": "6b06314c47e141031be043539900d80d2c7ba10f", 
+        "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release", 
+        "fixes": "0091bfc81741b8d3aeb3b7ab8636f911b2de6e80", 
+        "last_modified": "2022-10-20"
+    }, 
     "CVE-2022-26365": {
         "affected_versions": "v2.6.12-rc2 to v5.19-rc6", 
         "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", 
@@ -73774,6 +73781,116 @@
         "last_affected_version": "5.17.3", 
         "last_modified": "2022-10-17"
     }, 
+    "CVE-2022-3531": {
+        "affected_versions": "unk to unk", 
+        "breaks": "", 
+        "fixes": "", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3532": {
+        "affected_versions": "unk to unk", 
+        "breaks": "", 
+        "fixes": "", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3535": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak", 
+        "fixes": "0152dfee235e87660f52a117fc9f70dc55956bb4", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3541": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address", 
+        "fixes": "12aece8b01507a2d357a1861f470e83621fbb6f2", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3542": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", 
+        "fixes": "b43f9acbb8942b05252be83ac25a81cec70cc192", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3543": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb.", 
+        "fixes": "7a62ed61367b8fd01bae1e18e30602c25060d824", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3544": {
+        "affected_versions": "unk to unk", 
+        "breaks": "", 
+        "fixes": "damon/sysfs: fix possible memleak on damon_sysfs_add_target", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3545": {
+        "affected_versions": "unk to v6.0-rc1", 
+        "breaks": "", 
+        "cmt_msg": "nfp: fix use-after-free in area_cache_get()", 
+        "fixes": "02e1a114fdb71e59ee6770294166c30d437bf86a", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3564": {
+        "affected_versions": "unk to unk", 
+        "breaks": "", 
+        "fixes": "", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3565": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", 
+        "fixes": "2568a7e0832ee30b0a351016d03062ab4e0e0a3f", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3566": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops.", 
+        "fixes": "f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3567": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "ipv6: Fix data races around sk->sk_prot.", 
+        "fixes": "364f997b5cfe1db0d63a390fe7c801fa2b3115f6", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3577": {
+        "affected_versions": "unk to v5.19-rc1", 
+        "breaks": "", 
+        "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", 
+        "fixes": "fc4ef9d5724973193bfa5ebed181dba6de3a56db", 
+        "last_affected_version": "5.18.2", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3586": {
+        "affected_versions": "unk to v6.0-rc5", 
+        "breaks": "", 
+        "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+        "fixes": "9efd23297cca530bb35e1848665805d3fcdd7889", 
+        "last_affected_version": "5.19.8", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3594": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "r8152: Rate limit overflow messages", 
+        "fixes": "93e2be344a7db169b7119de21ac1bf253b8c6907", 
+        "last_modified": "2022-10-20"
+    }, 
+    "CVE-2022-3595": {
+        "affected_versions": "unk to v6.1-rc1", 
+        "breaks": "", 
+        "cmt_msg": "cifs: fix double-fault crash during ntlmssp", 
+        "fixes": "b854b4ee66437e6e1622fda90529c814978cb4ca", 
+        "last_modified": "2022-10-20"
+    }, 
     "CVE-2022-36123": {
         "affected_versions": "v2.6.12-rc2 to v5.19-rc6", 
         "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", 
@@ -73896,12 +74013,12 @@
         "last_modified": "2022-09-27"
     }, 
     "CVE-2022-41674": {
-        "affected_versions": "unk to v6.1-rc1", 
-        "breaks": "", 
+        "affected_versions": "v5.1-rc1 to v6.1-rc1", 
+        "breaks": "0b8fb8235be8be99a197e8d948fc0a2df8dc261a", 
         "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()", 
         "fixes": "aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d", 
         "last_affected_version": "5.19.15", 
-        "last_modified": "2022-10-17"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-41848": {
         "affected_versions": "unk to unk", 
@@ -73922,43 +74039,43 @@
         "last_modified": "2022-10-03"
     }, 
     "CVE-2022-42703": {
-        "affected_versions": "unk to v6.0-rc4", 
-        "breaks": "", 
+        "affected_versions": "v3.19-rc4 to v6.0-rc4", 
+        "breaks": "7a3ef208e662f4b63d43a23f61a64a129c525bbc", 
         "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", 
         "fixes": "2555283eb40df89945557273121e9393ef9b542b", 
         "last_affected_version": "5.19.6", 
-        "last_modified": "2022-10-12"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-42719": {
-        "affected_versions": "unk to v6.1-rc1", 
-        "breaks": "", 
+        "affected_versions": "v5.2-rc1 to v6.1-rc1", 
+        "breaks": "5023b14cf4df4d22e1a80738167f3438c9e62e5f", 
         "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free", 
         "fixes": "ff05d4b45dd89b922578dac497dcabf57cf771c6", 
         "last_affected_version": "5.19.15", 
-        "last_modified": "2022-10-17"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-42720": {
-        "affected_versions": "unk to v6.1-rc1", 
-        "breaks": "", 
+        "affected_versions": "v5.1-rc1 to v6.1-rc1", 
+        "breaks": "a3584f56de1c808d4383a275b4a74467b19e5645", 
         "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs", 
         "fixes": "0b7808818cb9df6680f98996b8e9a439fa7bcc2f", 
         "last_affected_version": "5.19.15", 
-        "last_modified": "2022-10-17"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-42721": {
-        "affected_versions": "unk to v6.1-rc1", 
-        "breaks": "", 
+        "affected_versions": "v5.1-rc1 to v6.1-rc1", 
+        "breaks": "0b8fb8235be8be99a197e8d948fc0a2df8dc261a", 
         "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption", 
         "fixes": "bcca852027e5878aec911a347407ecc88d6fff7f", 
         "last_affected_version": "5.19.15", 
-        "last_modified": "2022-10-17"
+        "last_modified": "2022-10-20"
     }, 
     "CVE-2022-42722": {
-        "affected_versions": "unk to v6.1-rc1", 
-        "breaks": "", 
+        "affected_versions": "v5.8-rc1 to v6.1-rc1", 
+        "breaks": "9eaf183af741e3d8393eb571ac8aec9ee7d6530e", 
         "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device", 
         "fixes": "b2d03cabe2b2e150ff5a381731ea0355459be09f", 
         "last_affected_version": "5.19.15", 
-        "last_modified": "2022-10-17"
+        "last_modified": "2022-10-20"
     }
 }
\ No newline at end of file
diff --git a/data/stream_data.json b/data/stream_data.json
index 231b912..b14e289 100644
--- a/data/stream_data.json
+++ b/data/stream_data.json
@@ -2351,6 +2351,9 @@
             "CVE-2020-10751": {
                 "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2021-4002": {
                 "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare"
             }, 
@@ -2387,6 +2390,15 @@
             "CVE-2017-6348": {
                 "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()."
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -2678,9 +2690,6 @@
             "CVE-2021-3178": {
                 "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export"
             }, 
-            "CVE-2022-42703": {
-                "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse"
-            }, 
             "CVE-2018-7754": {
                 "cmt_msg": "printk: hash addresses printed with %p"
             }, 
@@ -2774,9 +2783,6 @@
             "CVE-2015-4176": {
                 "cmt_msg": "mnt: Update detach_mounts to leave mounts connected"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -3053,6 +3059,9 @@
             "CVE-2017-16536": {
                 "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -3194,9 +3203,18 @@
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2024": {
                 "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2021-20261": {
                 "cmt_msg": "floppy: fix lock_fdc() signal handling"
             }, 
@@ -3218,15 +3236,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -3269,12 +3278,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -3515,18 +3536,9 @@
             "CVE-2022-20424": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
-            "CVE-2022-20422": {
-                "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2017-5549": {
                 "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -3548,9 +3560,6 @@
             "CVE-2022-3526": {
                 "cmt_msg": "macvlan: Fix leaking skb in source mode with nodst option"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2019-19377": {
                 "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
             }, 
@@ -3614,12 +3623,21 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -3710,6 +3728,9 @@
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -4865,6 +4886,18 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -5543,9 +5576,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -5630,6 +5660,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -5981,12 +6014,21 @@
             "CVE-2019-16995": {
                 "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
             "CVE-2017-9059": {
                 "cmt_msg": "NFSv4: Fix callback server shutdown"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -6008,15 +6050,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -6071,12 +6104,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -6425,12 +6470,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -6548,12 +6587,18 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
@@ -6566,6 +6611,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -7061,9 +7109,6 @@
             "CVE-2020-11609": {
                 "cmt_msg": "media: stv06xx: add missing descriptor sanity checks"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-27066": {
                 "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer"
             }, 
@@ -7082,6 +7127,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -8004,6 +8052,9 @@
             "CVE-2020-8647": {
                 "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region"
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0155": {
                 "cmt_msg": "drm/i915: Rename gen7 cmdparser tables"
             }, 
@@ -8013,6 +8064,15 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
             "CVE-2022-33740": {
                 "cmt_msg": "xen/netfront: fix leaking data in shared pages"
             }, 
@@ -8466,9 +8526,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-14386": {
                 "cmt_msg": "net/packet: fix overflow in tpacket_rcv"
             }, 
@@ -8550,6 +8607,9 @@
             "CVE-2018-18690": {
                 "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-28388": {
                 "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
@@ -8616,9 +8676,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -8688,6 +8745,9 @@
             "CVE-2019-17075": {
                 "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -8793,6 +8853,9 @@
             "CVE-2017-16536": {
                 "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2017-16538": {
                 "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start"
             }, 
@@ -9009,9 +9072,15 @@
             "CVE-2019-16994": {
                 "cmt_msg": "net: sit: fix memory leak in sit_init_net()"
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -9042,15 +9111,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -9096,12 +9156,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -9411,12 +9480,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -9522,12 +9585,18 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
@@ -9540,6 +9609,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
@@ -9690,6 +9762,9 @@
             "CVE-2022-36402": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-0399": {
                 "cmt_msg": ""
             }, 
@@ -10816,6 +10891,9 @@
             "CVE-2020-8647": {
                 "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region"
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0155": {
                 "cmt_msg": "drm/i915: Rename gen7 cmdparser tables"
             }, 
@@ -10825,6 +10903,15 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
             "CVE-2022-33740": {
                 "cmt_msg": "xen/netfront: fix leaking data in shared pages"
             }, 
@@ -11323,9 +11410,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-14386": {
                 "cmt_msg": "net/packet: fix overflow in tpacket_rcv"
             }, 
@@ -11410,6 +11494,9 @@
             "CVE-2018-18690": {
                 "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-28388": {
                 "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
@@ -11479,9 +11566,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -11548,6 +11632,9 @@
             "CVE-2019-17075": {
                 "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -11899,9 +11986,15 @@
             "CVE-2019-16994": {
                 "cmt_msg": "net: sit: fix memory leak in sit_init_net()"
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -11926,15 +12019,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -11986,12 +12070,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -12313,12 +12406,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -12427,12 +12514,18 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
@@ -12445,6 +12538,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
@@ -12601,6 +12697,9 @@
             "CVE-2017-12190": {
                 "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov"
             }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-0399": {
                 "cmt_msg": ""
             }, 
@@ -12928,6 +13027,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2019-16089": {
                 "cmt_msg": ""
             }, 
@@ -13713,6 +13815,18 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -14157,9 +14271,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-14386": {
                 "cmt_msg": "net/packet: fix overflow in tpacket_rcv"
             }, 
@@ -14232,6 +14343,9 @@
             "CVE-2018-18690": {
                 "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-28388": {
                 "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
@@ -14292,9 +14406,6 @@
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -14463,6 +14574,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -14661,9 +14775,15 @@
             "CVE-2019-16994": {
                 "cmt_msg": "net: sit: fix memory leak in sit_init_net()"
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-13099": {
                 "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -14688,15 +14808,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -14739,12 +14850,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -15036,9 +15159,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -15135,18 +15255,27 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
@@ -15258,6 +15387,9 @@
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -18775,10 +18907,6 @@
             "CVE-2022-20158": {
                 "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", 
                 "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
-                "cmt_id": "c7953cf03a26876d676145ce5d2ae6d8c9630b90"
             }
         }, 
         "4.14.274": {
@@ -19040,6 +19168,10 @@
             }
         }, 
         "4.14.293": {
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+                "cmt_id": "a7af71bb5ee6e887d49f098e212ef4f2f7cfbaf6"
+            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", 
                 "cmt_id": "229f47603dd306bc0eb1a831439adb8e48bb0eae"
@@ -19113,9 +19245,6 @@
             "CVE-2017-5753": {
                 "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2019-19377": {
                 "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
             }, 
@@ -19182,12 +19311,24 @@
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-43975": {
                 "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2017-1000405": {
                 "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()"
             }, 
@@ -19200,6 +19341,9 @@
             "CVE-2019-12378": {
                 "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2022-1786": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
@@ -19218,6 +19362,9 @@
             "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -19281,9 +19428,15 @@
             "CVE-2022-2586": {
                 "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2018-13095": {
                 "cmt_msg": "xfs: More robust inode extent count validation"
             }, 
@@ -19320,15 +19473,9 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -19347,12 +19494,21 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2019-19927": {
                 "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
             }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -19380,9 +19536,6 @@
             "CVE-2020-14304": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-0347": {
                 "cmt_msg": ""
             }, 
@@ -19437,6 +19590,9 @@
             "CVE-2021-4218": {
                 "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2022-23222": {
                 "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
             }, 
@@ -19452,20 +19608,20 @@
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
             "CVE-2020-15780": {
                 "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down"
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -19497,6 +19653,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -19548,6 +19707,9 @@
             "CVE-2015-2877": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2018-20449": {
                 "cmt_msg": "printk: hash addresses printed with %p"
             }, 
@@ -20312,6 +20474,18 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -20729,9 +20903,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-14386": {
                 "cmt_msg": "net/packet: fix overflow in tpacket_rcv"
             }, 
@@ -20801,6 +20972,9 @@
             "CVE-2019-10639": {
                 "cmt_msg": "netns: provide pure entropy for net_hash_mix()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-28388": {
                 "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
@@ -20861,9 +21035,6 @@
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -21023,6 +21194,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -21200,6 +21374,12 @@
             "CVE-2019-16994": {
                 "cmt_msg": "net: sit: fix memory leak in sit_init_net()"
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -21218,15 +21398,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -21269,12 +21440,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -21548,9 +21731,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -21647,18 +21827,27 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
@@ -21752,6 +21941,9 @@
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -22823,6 +23015,18 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -23255,9 +23459,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-14386": {
                 "cmt_msg": "net/packet: fix overflow in tpacket_rcv"
             }, 
@@ -23330,6 +23531,9 @@
             "CVE-2018-18690": {
                 "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-28388": {
                 "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
@@ -23393,9 +23597,6 @@
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -23567,6 +23768,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -23750,6 +23954,12 @@
             "CVE-2019-16994": {
                 "cmt_msg": "net: sit: fix memory leak in sit_init_net()"
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -23771,15 +23981,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -23822,12 +24023,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -24110,9 +24323,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -24209,18 +24419,27 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
@@ -24329,6 +24548,9 @@
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -27293,10 +27515,6 @@
             "CVE-2022-20158": {
                 "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", 
                 "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
-                "cmt_id": "138d4f739b35dfb40438a0d5d7054965763bfbe7"
             }
         }, 
         "4.19.237": {
@@ -27578,6 +27796,10 @@
             }
         }, 
         "4.19.258": {
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+                "cmt_id": "9245ed20950afe225bc6d1c4b9d28d55aa152e25"
+            }, 
             "CVE-2022-2663": {
                 "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", 
                 "cmt_id": "3275f7804f40de3c578d2253232349b07c25f146"
@@ -27700,12 +27922,24 @@
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-1789": {
                 "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID"
             }, 
@@ -27775,9 +28009,18 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20177": {
                 "cmt_msg": "netfilter: add and use nf_hook_slow_list()"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -27808,15 +28051,9 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
             }, 
@@ -27838,14 +28075,23 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-3524": {
                 "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()."
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
             }, 
             "CVE-2022-3523": {
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
@@ -27874,9 +28120,6 @@
             "CVE-2020-14304": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-0347": {
                 "cmt_msg": ""
             }, 
@@ -27928,6 +28171,9 @@
             "CVE-2021-4218": {
                 "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2011-4916": {
                 "cmt_msg": ""
             }, 
@@ -27937,20 +28183,20 @@
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
             "CVE-2020-15780": {
                 "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down"
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -27979,6 +28225,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -28033,6 +28282,9 @@
             "CVE-2015-2877": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-16089": {
                 "cmt_msg": ""
             }, 
@@ -28748,6 +29000,18 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -29228,6 +29492,9 @@
             "CVE-2019-10639": {
                 "cmt_msg": "netns: provide pure entropy for net_hash_mix()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-28388": {
                 "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
@@ -29288,9 +29555,6 @@
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -29447,6 +29711,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -29609,6 +29876,12 @@
             "CVE-2019-16994": {
                 "cmt_msg": "net: sit: fix memory leak in sit_init_net()"
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -29627,15 +29900,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -29681,12 +29945,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -29954,9 +30230,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -30050,6 +30323,12 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
@@ -30062,15 +30341,15 @@
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
             }, 
@@ -30152,6 +30431,9 @@
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -32066,9 +32348,6 @@
             "CVE-2019-19966": {
                 "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit"
             }, 
-            "CVE-2022-42703": {
-                "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse"
-            }, 
             "CVE-2022-1184": {
                 "cmt_msg": "ext4: verify dir block before splitting it"
             }, 
@@ -32570,9 +32849,18 @@
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2014-9922": {
                 "cmt_msg": "fs: limit filesystem stacking depth"
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -32654,6 +32942,9 @@
             "CVE-2018-12233": {
                 "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size"
             }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
             "CVE-2021-32078": {
                 "cmt_msg": "ARM: footbridge: remove personal server platform"
             }, 
@@ -33014,9 +33305,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -33155,9 +33443,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -33239,6 +33524,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-10942": {
                 "cmt_msg": "vhost: Check docket sk_family instead of call getname"
             }, 
@@ -33536,9 +33824,18 @@
             "CVE-2017-9984": {
                 "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-9454": {
                 "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2021-20261": {
                 "cmt_msg": "floppy: fix lock_fdc() signal handling"
             }, 
@@ -33566,15 +33863,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -33629,12 +33917,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -33947,15 +34247,6 @@
             "CVE-2014-9940": {
                 "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing"
             }, 
-            "CVE-2022-20422": {
-                "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
@@ -34058,6 +34349,9 @@
             "CVE-2017-9725": {
                 "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
@@ -34067,6 +34361,9 @@
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -34079,6 +34376,9 @@
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-38160": {
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
             }, 
@@ -34547,6 +34847,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -36174,6 +36477,9 @@
             "CVE-2020-10751": {
                 "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2021-4002": {
                 "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare"
             }, 
@@ -36213,9 +36519,15 @@
             "CVE-2017-6348": {
                 "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()."
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2014-9922": {
                 "cmt_msg": "fs: limit filesystem stacking depth"
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -36312,6 +36624,9 @@
             "CVE-2018-12233": {
                 "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size"
             }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
             "CVE-2021-32078": {
                 "cmt_msg": "ARM: footbridge: remove personal server platform"
             }, 
@@ -36708,9 +37023,6 @@
             "CVE-2016-3672": {
                 "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2015-9004": {
                 "cmt_msg": "perf: Tighten (and fix) the grouping condition"
             }, 
@@ -36864,9 +37176,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -36960,6 +37269,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-10942": {
                 "cmt_msg": "vhost: Check docket sk_family instead of call getname"
             }, 
@@ -37293,9 +37605,18 @@
             "CVE-2017-9984": {
                 "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-9454": {
                 "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2016-10088": {
                 "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS"
             }, 
@@ -37329,15 +37650,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -37395,12 +37707,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -37689,9 +38013,6 @@
             "CVE-2019-15222": {
                 "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check"
             }, 
-            "CVE-2022-42703": {
-                "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse"
-            }, 
             "CVE-2022-25265": {
                 "cmt_msg": ""
             }, 
@@ -37743,18 +38064,9 @@
             "CVE-2014-9940": {
                 "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing"
             }, 
-            "CVE-2022-20422": {
-                "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2017-5549": {
                 "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -37860,12 +38172,18 @@
             "CVE-2017-9725": {
                 "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -37881,6 +38199,9 @@
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -38415,6 +38736,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -41251,9 +41575,6 @@
             "CVE-2022-0487": {
                 "cmt_msg": "moxart: fix potential use-after-free on remove path"
             }, 
-            "CVE-2022-42703": {
-                "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse"
-            }, 
             "CVE-2021-0920": {
                 "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK"
             }, 
@@ -41509,6 +41830,18 @@
             "CVE-2019-0154": {
                 "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -41800,9 +42133,6 @@
             "CVE-2022-28390": {
                 "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -41929,6 +42259,9 @@
             "CVE-2014-7145": {
                 "cmt_msg": "[CIFS] Possible null ptr deref in SMB2_tcon"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2017-0750": {
                 "cmt_msg": "f2fs: do more integrity verification for superblock"
             }, 
@@ -41962,6 +42295,9 @@
             "CVE-2020-28374": {
                 "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -42070,6 +42406,15 @@
             "CVE-2021-3587": {
                 "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2021-20261": {
                 "cmt_msg": "floppy: fix lock_fdc() signal handling"
             }, 
@@ -42085,15 +42430,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -42118,6 +42454,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -42295,15 +42646,6 @@
             "CVE-2022-20424": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
-            "CVE-2022-20422": {
-                "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
@@ -42316,9 +42658,6 @@
             "CVE-2021-39698": {
                 "cmt_msg": "wait: add wake_up_pollfree()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2019-19377": {
                 "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
             }, 
@@ -42373,6 +42712,12 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -44942,9 +45287,6 @@
             "CVE-2018-10124": {
                 "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info"
             }, 
-            "CVE-2022-42703": {
-                "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse"
-            }, 
             "CVE-2021-0920": {
                 "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK"
             }, 
@@ -45335,6 +45677,18 @@
             "CVE-2019-0154": {
                 "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -45668,9 +46022,6 @@
             "CVE-2021-0941": {
                 "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -45773,9 +46124,6 @@
             "CVE-2018-7273": {
                 "cmt_msg": "printk: hash addresses printed with %p"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2022-23036": {
                 "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()"
             }, 
@@ -45932,6 +46280,9 @@
             "CVE-2018-3665": {
                 "cmt_msg": "x86, fpu: decouple non-lazy/eager fpu restore from xsave"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2019-2181": {
                 "cmt_msg": "binder: check for overflow when alloc for security context"
             }, 
@@ -46067,6 +46418,15 @@
             "CVE-2017-9984": {
                 "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2021-20261": {
                 "cmt_msg": "floppy: fix lock_fdc() signal handling"
             }, 
@@ -46082,12 +46442,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
             }, 
@@ -46139,12 +46493,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -46400,15 +46766,6 @@
             "CVE-2022-20424": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
-            "CVE-2022-20422": {
-                "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-4788": {
                 "cmt_msg": "powerpc/64s: flush L1D on kernel entry"
             }, 
@@ -46421,9 +46778,6 @@
             "CVE-2021-39698": {
                 "cmt_msg": "wait: add wake_up_pollfree()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2019-19377": {
                 "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
             }, 
@@ -46487,12 +46841,18 @@
             "CVE-2017-9725": {
                 "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2014-4027": {
                 "cmt_msg": "target/rd: Refactor rd_build_device_space + rd_release_device_space"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -46502,6 +46862,9 @@
             "CVE-2020-0543": {
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -46580,6 +46943,9 @@
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-25656": {
                 "cmt_msg": "vt: keyboard, extend func_buf_lock to readers"
             }, 
@@ -47239,9 +47605,6 @@
             "CVE-2017-5551": {
                 "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
@@ -47752,6 +48115,15 @@
             "CVE-2017-6348": {
                 "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()."
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -47776,6 +48148,9 @@
             "CVE-2020-0009": {
                 "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2018-7480": {
                 "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue"
             }, 
@@ -47845,6 +48220,9 @@
             "CVE-2020-0444": {
                 "cmt_msg": "audit: fix error handling in audit_data_to_entry()"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2018-10675": {
                 "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy"
             }, 
@@ -48460,9 +48838,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -48562,6 +48937,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-10942": {
                 "cmt_msg": "vhost: Check docket sk_family instead of call getname"
             }, 
@@ -48925,6 +49303,12 @@
             "CVE-2019-16995": {
                 "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
@@ -48958,15 +49342,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -49036,6 +49411,12 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2016-4794": {
                 "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction"
             }, 
@@ -49045,6 +49426,9 @@
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -49252,6 +49636,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-3169": {
                 "cmt_msg": ""
             }, 
@@ -49420,15 +49807,9 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2017-5549": {
                 "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2017-5547": {
                 "cmt_msg": "HID: corsair: fix DMA buffers on stack"
             }, 
@@ -49543,12 +49924,18 @@
             "CVE-2016-4569": {
                 "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -49558,6 +49945,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -50110,6 +50500,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -53808,8 +54201,8 @@
             "CVE-2022-0001": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
+            "CVE-2022-26365": {
+                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
             "CVE-2022-0002": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
@@ -53835,8 +54228,8 @@
             "CVE-2022-40133": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-36879": {
-                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
             }, 
             "CVE-2020-26560": {
                 "cmt_msg": ""
@@ -53862,6 +54255,9 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
+            "CVE-2022-38457": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27820": {
                 "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
             }, 
@@ -53946,21 +54342,33 @@
             "CVE-2022-1012": {
                 "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation"
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
             "CVE-2019-9453": {
                 "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary"
             }, 
-            "CVE-2022-38457": {
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-43975": {
                 "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2017-1000405": {
                 "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()"
             }, 
+            "CVE-2022-36946": {
+                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
             }, 
@@ -53973,6 +54381,9 @@
             "CVE-2022-23042": {
                 "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2022-0494": {
                 "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern"
             }, 
@@ -54000,8 +54411,11 @@
             "CVE-2022-41218": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
@@ -54090,6 +54504,9 @@
             "CVE-2022-2586": {
                 "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
@@ -54132,9 +54549,6 @@
             "CVE-2019-18885": {
                 "cmt_msg": "btrfs: merge btrfs_find_device and find_device"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
@@ -54168,9 +54582,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -54222,8 +54633,8 @@
             "CVE-2005-3660": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-3239": {
-                "cmt_msg": "media: em28xx: initialize refcount before kref_get"
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
             }, 
             "CVE-2022-1508": {
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
@@ -54237,14 +54648,17 @@
             "CVE-2020-11669": {
                 "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle"
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
             "CVE-2019-19922": {
                 "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
             }, 
             "CVE-2019-19927": {
                 "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
@@ -54309,6 +54723,9 @@
             "CVE-2022-33981": {
                 "cmt_msg": "floppy: disable FDRAWCMD by default"
             }, 
+            "CVE-2022-36879": {
+                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            }, 
             "CVE-2019-12615": {
                 "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()"
             }, 
@@ -54408,8 +54825,8 @@
             "CVE-2019-2025": {
                 "cmt_msg": "binder: fix race that allows malicious free of live buffer"
             }, 
-            "CVE-2022-36946": {
-                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2021-4218": {
                 "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler"
@@ -54435,9 +54852,6 @@
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
             "CVE-2018-7273": {
                 "cmt_msg": "printk: hash addresses printed with %p"
             }, 
@@ -54447,6 +54861,9 @@
             "CVE-2022-23036": {
                 "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()"
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-9465": {
                 "cmt_msg": "binder: fix proc->files use-after-free"
             }, 
@@ -54456,9 +54873,6 @@
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2016-5728": {
                 "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver"
             }, 
@@ -54537,8 +54951,8 @@
             "CVE-2020-12364": {
                 "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
             }, 
-            "CVE-2022-26966": {
-                "cmt_msg": "sr9700: sanity check for packet length"
+            "CVE-2022-3239": {
+                "cmt_msg": "media: em28xx: initialize refcount before kref_get"
             }, 
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
@@ -54546,6 +54960,9 @@
             "CVE-2022-41222": {
                 "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries."
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -54582,6 +54999,9 @@
             "CVE-2018-12928": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-33740": {
                 "cmt_msg": "xen/netfront: fix leaking data in shared pages"
             }, 
@@ -54621,8 +55041,8 @@
             "CVE-2022-20368": {
                 "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()"
             }, 
-            "CVE-2022-26365": {
-                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
+            "CVE-2022-26966": {
+                "cmt_msg": "sr9700: sanity check for packet length"
             }, 
             "CVE-2021-42739": {
                 "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()"
@@ -54906,9 +55326,6 @@
             "CVE-2017-5551": {
                 "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
@@ -55410,6 +55827,15 @@
             "CVE-2017-6348": {
                 "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()."
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -55434,6 +55860,9 @@
             "CVE-2020-0009": {
                 "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2018-7480": {
                 "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue"
             }, 
@@ -56094,9 +56523,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -56187,6 +56613,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -56547,9 +56976,18 @@
             "CVE-2019-16995": {
                 "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2016-10088": {
                 "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS"
             }, 
@@ -56571,15 +57009,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -56643,12 +57072,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -57018,15 +57459,9 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2017-5549": {
                 "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2017-5547": {
                 "cmt_msg": "HID: corsair: fix DMA buffers on stack"
             }, 
@@ -57147,12 +57582,18 @@
             "CVE-2021-20317": {
                 "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -57165,6 +57606,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -57717,6 +58161,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -58058,9 +58505,6 @@
             "CVE-2017-5551": {
                 "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
@@ -58568,6 +59012,15 @@
             "CVE-2017-6348": {
                 "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()."
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -58592,6 +59045,9 @@
             "CVE-2020-0009": {
                 "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2018-7480": {
                 "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue"
             }, 
@@ -59249,9 +59705,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -59345,6 +59798,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -59714,9 +60170,18 @@
             "CVE-2019-16995": {
                 "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2016-10088": {
                 "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS"
             }, 
@@ -59738,15 +60203,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -59813,12 +60269,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -60182,15 +60650,9 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2017-5549": {
                 "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2017-5547": {
                 "cmt_msg": "HID: corsair: fix DMA buffers on stack"
             }, 
@@ -60308,12 +60770,18 @@
             "CVE-2021-20317": {
                 "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -60326,6 +60794,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -60878,6 +61349,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -62789,6 +63263,18 @@
             "CVE-2019-0154": {
                 "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -63194,9 +63680,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -63317,9 +63800,6 @@
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -63488,6 +63968,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-26147": {
                 "cmt_msg": "mac80211: assure all fragments are encrypted"
             }, 
@@ -63665,9 +64148,18 @@
             "CVE-2019-16995": {
                 "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-2024": {
                 "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2021-20261": {
                 "cmt_msg": "floppy: fix lock_fdc() signal handling"
             }, 
@@ -63686,15 +64178,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -63743,12 +64226,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -64025,12 +64520,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -64127,18 +64616,27 @@
             "CVE-2017-9725": {
                 "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -64241,6 +64739,9 @@
             "CVE-2021-3483": {
                 "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-38300": {
                 "cmt_msg": "bpf, mips: Validate conditional branch offsets"
             }, 
@@ -64999,6 +65500,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -65164,6 +65668,18 @@
             "CVE-2021-20239": {
                 "cmt_msg": "net: pass a sockptr_t into ->setsockopt"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -65578,6 +66094,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-20226": {
                 "cmt_msg": "io_uring: don't rely on weak ->files references"
             }, 
@@ -65608,6 +66127,9 @@
             "CVE-2020-26556": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -65719,6 +66241,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -65737,9 +66268,6 @@
             "CVE-2020-24490": {
                 "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -65776,9 +66304,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -65965,9 +66505,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -66052,6 +66589,15 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -66591,6 +67137,9 @@
             "CVE-2016-10044": {
                 "cmt_msg": "aio: mark AIO pseudo-fs noexec"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2018-10940": {
                 "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()"
             }, 
@@ -66648,9 +67197,6 @@
             "CVE-2017-5551": {
                 "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
@@ -67170,12 +67716,24 @@
             "CVE-2019-0154": {
                 "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs"
             }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
             "CVE-2017-6348": {
                 "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()."
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -67200,6 +67758,9 @@
             "CVE-2020-0009": {
                 "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2018-7480": {
                 "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue"
             }, 
@@ -67821,6 +68382,9 @@
             "CVE-2018-18690": {
                 "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-19533": {
                 "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()"
             }, 
@@ -67911,9 +68475,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -68013,6 +68574,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-10942": {
                 "cmt_msg": "vhost: Check docket sk_family instead of call getname"
             }, 
@@ -68394,6 +68958,9 @@
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
@@ -68433,15 +69000,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -68508,6 +69066,9 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2015-8785": {
                 "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()"
             }, 
@@ -68523,6 +69084,9 @@
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -68739,6 +69303,9 @@
             "CVE-2021-0937": {
                 "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write"
             }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-3169": {
                 "cmt_msg": ""
             }, 
@@ -68910,15 +69477,9 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2017-5549": {
                 "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -69030,6 +69591,9 @@
             "CVE-2016-4569": {
                 "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
@@ -69039,6 +69603,9 @@
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
@@ -69054,6 +69621,9 @@
             "CVE-2019-15222": {
                 "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -69624,6 +70194,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -70005,6 +70578,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -70152,6 +70728,18 @@
             "CVE-2021-20239": {
                 "cmt_msg": "net: pass a sockptr_t into ->setsockopt"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
@@ -70524,6 +71112,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-20226": {
                 "cmt_msg": "io_uring: don't rely on weak ->files references"
             }, 
@@ -70545,6 +71136,9 @@
             "CVE-2020-28374": {
                 "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -70650,9 +71244,18 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20268": {
                 "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -70674,9 +71277,6 @@
             "CVE-2022-42720": {
                 "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -70710,9 +71310,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -70890,9 +71502,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -70974,6 +71583,15 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -71590,6 +72208,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -71734,6 +72355,18 @@
             "CVE-2021-20239": {
                 "cmt_msg": "net: pass a sockptr_t into ->setsockopt"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
@@ -72067,6 +72700,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -72088,6 +72724,9 @@
             "CVE-2020-28374": {
                 "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -72181,9 +72820,18 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20268": {
                 "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -72241,9 +72889,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -72406,9 +73066,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -72490,6 +73147,15 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -73057,6 +73723,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2020-26145": {
                 "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe"
             }, 
@@ -73189,6 +73858,18 @@
             "CVE-2022-23816": {
                 "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
@@ -73255,8 +73936,8 @@
             "CVE-2020-26559": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-26365": {
-                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
+            "CVE-2021-3542": {
+                "cmt_msg": ""
             }, 
             "CVE-2018-1121": {
                 "cmt_msg": ""
@@ -73519,6 +74200,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -73540,6 +74224,9 @@
             "CVE-2020-28374": {
                 "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27820": {
                 "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
             }, 
@@ -73621,9 +74308,18 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20268": {
                 "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -73681,9 +74377,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -73774,8 +74482,8 @@
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
-            "CVE-2021-3542": {
-                "cmt_msg": ""
+            "CVE-2022-26365": {
+                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
             "CVE-2022-20166": {
                 "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions"
@@ -73840,9 +74548,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -73912,6 +74617,15 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
@@ -77701,10 +78415,6 @@
             "CVE-2022-20158": {
                 "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", 
                 "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
-                "cmt_id": "8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b"
             }
         }, 
         "4.9.309": {
@@ -77911,6 +78621,10 @@
             "CVE-2022-2663": {
                 "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", 
                 "cmt_id": "eb4d8d6b44a23ff2b6e2af06c8240de73dff8a7d"
+            }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+                "cmt_id": "b5aa83141aa97f81c8e06051e4bd925bfb5474fb"
             }
         }, 
         "4.9.330": {
@@ -77950,9 +78664,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2018-20854": {
                 "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read"
             }, 
@@ -78052,15 +78763,27 @@
             "CVE-2022-40307": {
                 "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write"
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
             "CVE-2019-9453": {
                 "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-43975": {
                 "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2017-1000405": {
                 "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()"
             }, 
@@ -78073,6 +78796,9 @@
             "CVE-2019-12378": {
                 "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2022-1786": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
@@ -78094,6 +78820,9 @@
             "CVE-2020-8834": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm"
             }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
@@ -78115,6 +78844,9 @@
             "CVE-2021-4037": {
                 "cmt_msg": "xfs: fix up non-directory creation in SGID directories"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2019-1999": {
                 "cmt_msg": "binder: fix race between munmap() and direct reclaim"
             }, 
@@ -78166,9 +78898,15 @@
             "CVE-2022-2586": {
                 "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-34556": {
                 "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-39714": {
                 "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface"
             }, 
@@ -78229,15 +78967,9 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -78268,18 +79000,24 @@
             "CVE-2020-11669": {
                 "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle"
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
             "CVE-2019-19922": {
                 "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
             }, 
             "CVE-2019-19927": {
                 "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
             }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-16921": {
                 "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
             }, 
@@ -78313,9 +79051,6 @@
             "CVE-2020-14305": {
                 "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
             }, 
@@ -78412,20 +79147,20 @@
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
             "CVE-2018-7273": {
                 "cmt_msg": "printk: hash addresses printed with %p"
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -78460,6 +79195,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -78490,6 +79228,9 @@
             "CVE-2022-41222": {
                 "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries."
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -78845,9 +79586,6 @@
             "CVE-2017-5551": {
                 "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
@@ -79316,6 +80054,9 @@
             "CVE-2020-10751": {
                 "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2022-23042": {
                 "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()"
             }, 
@@ -79355,6 +80096,15 @@
             "CVE-2017-6348": {
                 "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()."
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -80033,9 +80783,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -80123,6 +80870,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -80480,9 +81230,18 @@
             "CVE-2019-16995": {
                 "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -80501,15 +81260,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -80573,12 +81323,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -80942,15 +81704,9 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2017-5549": {
                 "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling"
             }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2017-5547": {
                 "cmt_msg": "HID: corsair: fix DMA buffers on stack"
             }, 
@@ -81071,12 +81827,18 @@
             "CVE-2021-20317": {
                 "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-38096": {
                 "cmt_msg": ""
             }, 
@@ -81089,6 +81851,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -81638,6 +82403,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -82478,6 +83246,18 @@
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2018-19407": {
                 "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization"
             }, 
@@ -82982,9 +83762,6 @@
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-14386": {
                 "cmt_msg": "net/packet: fix overflow in tpacket_rcv"
             }, 
@@ -83132,9 +83909,6 @@
             "CVE-2019-19531": {
                 "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -83204,6 +83978,9 @@
             "CVE-2022-23960": {
                 "cmt_msg": "ARM: report Spectre v2 status through sysfs"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -83564,12 +84341,21 @@
             "CVE-2019-16995": {
                 "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-18075": {
                 "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances"
             }, 
             "CVE-2017-9059": {
                 "cmt_msg": "NFSv4: Fix callback server shutdown"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -83597,15 +84383,6 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -83657,12 +84434,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
             "CVE-2017-17975": {
                 "cmt_msg": "media: usbtv: prevent double free in error case"
             }, 
@@ -83987,12 +84776,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
-            "CVE-2022-20421": {
-                "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
-            }, 
             "CVE-2020-25643": {
                 "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()"
             }, 
@@ -84107,12 +84890,18 @@
             "CVE-2019-8980": {
                 "cmt_msg": "exec: Fix mem leak in kernel_read_file"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2018-14609": {
                 "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized"
             }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-28971": {
                 "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status"
             }, 
@@ -84125,6 +84914,9 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2021-45486": {
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
@@ -84626,6 +85418,9 @@
             "CVE-2020-9383": {
                 "cmt_msg": "floppy: check FDC index for errors before assigning it"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2021-38198": {
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
@@ -85108,9 +85903,6 @@
             "CVE-2021-3744": {
                 "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
             }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
             "CVE-2021-30002": {
                 "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy"
             }, 
@@ -85429,6 +86221,18 @@
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -85918,9 +86722,6 @@
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -85981,6 +86782,9 @@
             "CVE-2019-17075": {
                 "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -86059,6 +86863,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -86209,6 +87016,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -86230,15 +87046,9 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
             "CVE-2020-24490": {
                 "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -86278,12 +87088,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -86530,9 +87352,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -86623,21 +87442,27 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
             }, 
@@ -87410,6 +88235,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -87677,6 +88505,18 @@
             "CVE-2019-0154": {
                 "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -88223,6 +89063,9 @@
             "CVE-2019-17075": {
                 "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -88295,6 +89138,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -88427,6 +89273,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -88451,9 +89306,6 @@
             "CVE-2020-24490": {
                 "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -88493,12 +89345,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-19048": {
                 "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-19377": {
                 "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
             }, 
@@ -88754,9 +89618,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -88844,21 +89705,27 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
             }, 
@@ -89650,6 +90517,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -89878,6 +90748,18 @@
             "CVE-2019-0154": {
                 "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -90391,6 +91273,9 @@
             "CVE-2019-17075": {
                 "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-10942": {
                 "cmt_msg": "vhost: Check docket sk_family instead of call getname"
             }, 
@@ -90442,6 +91327,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -90574,6 +91462,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -90601,9 +91498,6 @@
             "CVE-2020-24490": {
                 "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -90643,6 +91537,9 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
@@ -90652,6 +91549,12 @@
             "CVE-2019-15794": {
                 "cmt_msg": "ovl: fix reference counting in ovl_mmap error path"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2019-19377": {
                 "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
             }, 
@@ -90895,9 +91798,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -90985,9 +91885,21 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
@@ -91653,8 +92565,8 @@
             "CVE-2022-0001": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
+            "CVE-2022-26365": {
+                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
             "CVE-2022-29156": {
                 "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
@@ -91683,8 +92595,8 @@
             "CVE-2022-0995": {
                 "cmt_msg": "watch_queue: Fix filter limit check"
             }, 
-            "CVE-2022-36879": {
-                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
             }, 
             "CVE-2022-0185": {
                 "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param"
@@ -91779,6 +92691,9 @@
             "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1015": {
                 "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace."
             }, 
@@ -91827,12 +92742,18 @@
             "CVE-2021-43976": {
                 "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-2977": {
                 "cmt_msg": "tpm: fix reference counting for struct tpm_chip"
             }, 
             "CVE-2022-1789": {
                 "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID"
             }, 
+            "CVE-2022-36946": {
+                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            }, 
             "CVE-2022-2078": {
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()"
             }, 
@@ -91881,6 +92802,9 @@
             "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -91899,6 +92823,9 @@
             "CVE-2021-4135": {
                 "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -91908,6 +92835,9 @@
             "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-2964": {
                 "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup"
             }, 
@@ -91923,8 +92853,8 @@
             "CVE-2022-0171": {
                 "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues"
             }, 
-            "CVE-2022-26966": {
-                "cmt_msg": "sr9700: sanity check for packet length"
+            "CVE-2022-29901": {
+                "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
             }, 
             "CVE-2010-4563": {
                 "cmt_msg": ""
@@ -92118,11 +93048,14 @@
             "CVE-2022-1508": {
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
             }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
-                "cmt_msg": ""
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
             }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
@@ -92130,9 +93063,18 @@
             "CVE-2022-3524": {
                 "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()."
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-41674": {
                 "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-0286": {
                 "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()"
             }, 
@@ -92190,6 +93132,9 @@
             "CVE-2022-33981": {
                 "cmt_msg": "floppy: disable FDRAWCMD by default"
             }, 
+            "CVE-2022-36879": {
+                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            }, 
             "CVE-2021-3714": {
                 "cmt_msg": ""
             }, 
@@ -92217,6 +93162,9 @@
             "CVE-2021-20320": {
                 "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions"
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-4197": {
                 "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks"
             }, 
@@ -92301,8 +93249,8 @@
             "CVE-2022-1043": {
                 "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check"
             }, 
-            "CVE-2022-36946": {
-                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            "CVE-2022-3532": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-1204": {
                 "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
@@ -92337,6 +93285,9 @@
             "CVE-2022-24448": {
                 "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
@@ -92349,6 +93300,9 @@
             "CVE-2022-23036": {
                 "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()"
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
@@ -92358,8 +93312,8 @@
             "CVE-2022-29582": {
                 "cmt_msg": "io_uring: fix race between timeout flush and removal"
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -92406,6 +93360,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -92487,8 +93444,8 @@
             "CVE-2021-45402": {
                 "cmt_msg": "bpf: Fix signed bounds propagation after mov32"
             }, 
-            "CVE-2022-29901": {
-                "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
             }, 
             "CVE-2019-16089": {
                 "cmt_msg": ""
@@ -92502,8 +93459,8 @@
             "CVE-2022-1158": {
                 "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
             }, 
-            "CVE-2022-26365": {
-                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
+            "CVE-2022-26966": {
+                "cmt_msg": "sr9700: sanity check for packet length"
             }, 
             "CVE-2021-42739": {
                 "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()"
@@ -92541,6 +93498,9 @@
             "CVE-2022-30594": {
                 "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2022-39188": {
                 "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
@@ -92772,6 +93732,9 @@
             "CVE-2020-35501": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-45095": {
                 "cmt_msg": "phonet: refcount leak in pep_sock_accep"
             }, 
@@ -92784,8 +93747,8 @@
             "CVE-2022-0001": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
+            "CVE-2022-26365": {
+                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
             "CVE-2022-29156": {
                 "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
@@ -92811,8 +93774,8 @@
             "CVE-2022-0995": {
                 "cmt_msg": "watch_queue: Fix filter limit check"
             }, 
-            "CVE-2022-36879": {
-                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
             }, 
             "CVE-2021-4095": {
                 "cmt_msg": "KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty"
@@ -92901,6 +93864,9 @@
             "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1015": {
                 "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace."
             }, 
@@ -92937,7 +93903,7 @@
             "CVE-2021-39685": {
                 "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests"
             }, 
-            "CVE-2022-38457": {
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-26934": {
@@ -92946,12 +93912,18 @@
             "CVE-2021-43976": {
                 "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-2977": {
                 "cmt_msg": "tpm: fix reference counting for struct tpm_chip"
             }, 
             "CVE-2022-1789": {
                 "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID"
             }, 
+            "CVE-2022-36946": {
+                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            }, 
             "CVE-2022-2078": {
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()"
             }, 
@@ -93015,6 +93987,9 @@
             "CVE-2021-4135": {
                 "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -93024,6 +93999,9 @@
             "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-2964": {
                 "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup"
             }, 
@@ -93039,8 +94017,8 @@
             "CVE-2022-0171": {
                 "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues"
             }, 
-            "CVE-2022-26966": {
-                "cmt_msg": "sr9700: sanity check for packet length"
+            "CVE-2022-29901": {
+                "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
             }, 
             "CVE-2010-4563": {
                 "cmt_msg": ""
@@ -93069,6 +94047,9 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-28715": {
                 "cmt_msg": "xen/netback: don't queue unlimited number of packages"
             }, 
@@ -93246,9 +94227,18 @@
             "CVE-2022-3524": {
                 "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()."
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-41674": {
                 "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-1158": {
                 "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
             }, 
@@ -93303,6 +94293,9 @@
             "CVE-2022-33981": {
                 "cmt_msg": "floppy: disable FDRAWCMD by default"
             }, 
+            "CVE-2022-36879": {
+                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            }, 
             "CVE-2021-3714": {
                 "cmt_msg": ""
             }, 
@@ -93408,8 +94401,8 @@
             "CVE-2022-1199": {
                 "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device"
             }, 
-            "CVE-2022-36946": {
-                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            "CVE-2022-3532": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-1204": {
                 "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
@@ -93444,6 +94437,9 @@
             "CVE-2022-24448": {
                 "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
@@ -93456,6 +94452,9 @@
             "CVE-2022-23036": {
                 "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()"
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
@@ -93465,8 +94464,8 @@
             "CVE-2022-29582": {
                 "cmt_msg": "io_uring: fix race between timeout flush and removal"
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -93507,6 +94506,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -93573,14 +94575,17 @@
             "CVE-2020-25220": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-38457": {
+                "cmt_msg": ""
+            }, 
             "CVE-2015-2877": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-45402": {
                 "cmt_msg": "bpf: Fix signed bounds propagation after mov32"
             }, 
-            "CVE-2022-29901": {
-                "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
             }, 
             "CVE-2019-16089": {
                 "cmt_msg": ""
@@ -93591,8 +94596,8 @@
             "CVE-2022-1679": {
                 "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
-            "CVE-2022-26365": {
-                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
+            "CVE-2022-26966": {
+                "cmt_msg": "sr9700: sanity check for packet length"
             }, 
             "CVE-2021-42739": {
                 "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()"
@@ -93630,6 +94635,9 @@
             "CVE-2022-30594": {
                 "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
@@ -94697,10 +95705,6 @@
             "CVE-2022-27666": {
                 "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", 
                 "cmt_id": "9248694dac20eda06e22d8503364dc9d03df4e2f"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
-                "cmt_id": "28bc0267399f42f987916a7174e2e32f0833cc65"
             }
         }, 
         "5.10.109": {
@@ -94901,6 +95905,10 @@
             "CVE-2022-1184": {
                 "cmt_msg": "ext4: verify dir block before splitting it", 
                 "cmt_id": "da2f05919238c7bdc6e28c79539f55c8355408bb"
+            }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", 
+                "cmt_id": "296f8ca0f73f5268cd9b85cf72ff783596b2264e"
             }
         }, 
         "5.10.122": {
@@ -95085,6 +96093,10 @@
             "CVE-2022-40307": {
                 "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", 
                 "cmt_id": "918d9c4a4bdf5205f2fb3f64dddfb56c9a1d01d6"
+            }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+                "cmt_id": "2ee85ac1b29dbd2ebd2d8e5ac1dd5793235d516b"
             }
         }, 
         "5.10.145": {
@@ -95133,6 +96145,12 @@
                 "cmt_id": "fce793a056c604b41a298317cf704dae255f1b36"
             }
         }, 
+        "5.10.149": {
+            "CVE-2022-42719": {
+                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free", 
+                "cmt_id": "31ce5da48a845bac48930bbde1d45e7449591728"
+            }
+        }, 
         "outstanding": {
             "CVE-2020-26556": {
                 "cmt_msg": ""
@@ -95206,12 +96224,24 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-3176": {
                 "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling"
             }, 
@@ -95236,6 +96266,9 @@
             "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -95263,6 +96296,15 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -95311,9 +96353,21 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-3523": {
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
             }, 
@@ -95335,9 +96389,6 @@
             "CVE-2020-14304": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-0347": {
                 "cmt_msg": ""
             }, 
@@ -95389,14 +96440,20 @@
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -95422,6 +96479,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -95857,6 +96917,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2020-26145": {
                 "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe"
             }, 
@@ -95908,8 +96971,8 @@
             "CVE-2022-39189": {
                 "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries"
             }, 
-            "CVE-2022-39188": {
-                "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
+            "CVE-2021-38166": {
+                "cmt_msg": "bpf: Fix integer overflow involving bucket_size"
             }, 
             "CVE-2022-0998": {
                 "cmt_msg": "vdpa: clean up get_config_size ret value handling"
@@ -95974,6 +97037,18 @@
             "CVE-2022-23816": {
                 "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-3573": {
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
@@ -96037,8 +97112,8 @@
             "CVE-2020-26559": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-26365": {
-                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
+            "CVE-2021-3542": {
+                "cmt_msg": ""
             }, 
             "CVE-2018-1121": {
                 "cmt_msg": ""
@@ -96250,6 +97325,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -96265,6 +97343,9 @@
             "CVE-2021-0920": {
                 "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27820": {
                 "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
             }, 
@@ -96337,6 +97418,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -96376,12 +97466,27 @@
             "CVE-2021-3760": {
                 "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object"
             }, 
+            "CVE-2022-36123": {
+                "cmt_msg": "x86: Clear .brk area at early boot"
+            }, 
             "CVE-2022-1508": {
                 "cmt_msg": "io_uring: reexpand under-reexpanded iters"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2020-0347": {
                 "cmt_msg": ""
             }, 
@@ -96454,8 +97559,8 @@
             "CVE-2022-1048": {
                 "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
             }, 
-            "CVE-2021-3542": {
-                "cmt_msg": ""
+            "CVE-2022-26365": {
+                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
@@ -96496,8 +97601,8 @@
             "CVE-2022-21499": {
                 "cmt_msg": "lockdown: also lock down previous kgdb use"
             }, 
-            "CVE-2021-38166": {
-                "cmt_msg": "bpf: Fix integer overflow involving bucket_size"
+            "CVE-2022-39188": {
+                "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas"
             }, 
             "CVE-2022-2663": {
                 "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic"
@@ -96511,9 +97616,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -96574,6 +97676,15 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
@@ -96604,9 +97715,6 @@
             "CVE-2021-4028": {
                 "cmt_msg": "RDMA/cma: Do not change route.addr.src_addr.ss_family"
             }, 
-            "CVE-2021-45485": {
-                "cmt_msg": "ipv6: use prandom_u32() for ID generation"
-            }, 
             "CVE-2021-4023": {
                 "cmt_msg": "io-wq: fix cancellation on create-worker failure"
             }, 
@@ -96823,8 +97931,8 @@
             "CVE-2022-3077": {
                 "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
             }, 
-            "CVE-2022-36123": {
-                "cmt_msg": "x86: Clear .brk area at early boot"
+            "CVE-2021-45485": {
+                "cmt_msg": "ipv6: use prandom_u32() for ID generation"
             }, 
             "CVE-2022-3078": {
                 "cmt_msg": "media: vidtv: Check for null return of vzalloc"
@@ -97074,10 +98182,6 @@
             "CVE-2022-20158": {
                 "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", 
                 "cmt_id": "ef591b35176029fdefea38e8388ffa371e18f4b2"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
-                "cmt_id": "df7e088d51cdf78b1a0bf1f3d405c2593295c7b0"
             }
         }, 
         "5.16.18": {
@@ -97226,8 +98330,8 @@
             "CVE-2022-29581": {
                 "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()"
             }, 
-            "CVE-2022-36879": {
-                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
             }, 
             "CVE-2022-0998": {
                 "cmt_msg": "vdpa: clean up get_config_size ret value handling"
@@ -97268,6 +98372,9 @@
             "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
@@ -97289,9 +98396,18 @@
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-1789": {
                 "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID"
             }, 
@@ -97325,6 +98441,9 @@
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -97367,9 +98486,18 @@
             "CVE-2022-2586": {
                 "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2585": {
                 "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -97406,8 +98534,8 @@
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
+            "CVE-2022-36879": {
+                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
             }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
@@ -97442,15 +98570,24 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
-                "cmt_msg": ""
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
             }, 
             "CVE-2022-24122": {
                 "cmt_msg": "ucount:  Make get_ucount a safe get_user replacement"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-41674": {
                 "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-3523": {
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
             }, 
@@ -97505,6 +98642,9 @@
             "CVE-2021-3892": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-33655": {
                 "cmt_msg": "fbcon: Disallow setting font bigger than screen size"
             }, 
@@ -97571,6 +98711,15 @@
             "CVE-2022-42720": {
                 "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-42722": {
+                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
@@ -97580,8 +98729,8 @@
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -97610,6 +98759,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -97646,6 +98798,9 @@
             "CVE-2022-1204": {
                 "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-16089": {
                 "cmt_msg": ""
             }, 
@@ -97939,6 +99094,10 @@
             "CVE-2022-1973": {
                 "cmt_msg": "fs/ntfs3: Fix invalid free in log_replay", 
                 "cmt_id": "2088cc00491e8d25a99d0f247df843e9c3df2040"
+            }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", 
+                "cmt_id": "2ab0a30f4f709f462d253bbb36fc64bb6de5a135"
             }
         }, 
         "5.17.15": {
@@ -97992,8 +99151,8 @@
             "CVE-2022-3061": {
                 "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero"
             }, 
-            "CVE-2022-36879": {
-                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
             }, 
             "CVE-2022-2663": {
                 "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic"
@@ -98037,12 +99196,24 @@
             "CVE-2022-21123": {
                 "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data"
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
             }, 
@@ -98067,6 +99238,9 @@
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -98103,9 +99277,18 @@
             "CVE-2022-2586": {
                 "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2585": {
                 "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -98133,8 +99316,8 @@
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
+            "CVE-2022-36879": {
+                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
             }, 
             "CVE-2012-4542": {
                 "cmt_msg": ""
@@ -98154,12 +99337,24 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-41674": {
                 "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-3523": {
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
             }, 
@@ -98262,6 +99457,15 @@
             "CVE-2022-42720": {
                 "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-42722": {
+                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
@@ -98271,8 +99475,8 @@
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -98301,6 +99505,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -98571,8 +99778,8 @@
             "CVE-2022-0001": {
                 "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
+            "CVE-2022-26365": {
+                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
             }, 
             "CVE-2022-29156": {
                 "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
@@ -98595,8 +99802,8 @@
             "CVE-2022-0995": {
                 "cmt_msg": "watch_queue: Fix filter limit check"
             }, 
-            "CVE-2022-36879": {
-                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
             }, 
             "CVE-2022-0998": {
                 "cmt_msg": "vdpa: clean up get_config_size ret value handling"
@@ -98664,6 +99871,9 @@
             "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-1015": {
                 "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace."
             }, 
@@ -98691,10 +99901,13 @@
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
             "CVE-2021-39685": {
                 "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests"
             }, 
-            "CVE-2022-38457": {
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-43975": {
@@ -98703,12 +99916,18 @@
             "CVE-2021-43976": {
                 "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()"
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-2977": {
                 "cmt_msg": "tpm: fix reference counting for struct tpm_chip"
             }, 
             "CVE-2022-1789": {
                 "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID"
             }, 
+            "CVE-2022-36946": {
+                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            }, 
             "CVE-2022-2078": {
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()"
             }, 
@@ -98766,6 +99985,9 @@
             "CVE-2021-4135": {
                 "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -98775,6 +99997,9 @@
             "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-2964": {
                 "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup"
             }, 
@@ -98790,8 +100015,8 @@
             "CVE-2022-0171": {
                 "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues"
             }, 
-            "CVE-2022-26966": {
-                "cmt_msg": "sr9700: sanity check for packet length"
+            "CVE-2022-29901": {
+                "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
             }, 
             "CVE-2010-4563": {
                 "cmt_msg": ""
@@ -98820,6 +100045,9 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-28715": {
                 "cmt_msg": "xen/netback: don't queue unlimited number of packages"
             }, 
@@ -98964,8 +100192,8 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
-                "cmt_msg": ""
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
             }, 
             "CVE-2022-24122": {
                 "cmt_msg": "ucount:  Make get_ucount a safe get_user replacement"
@@ -98973,9 +100201,18 @@
             "CVE-2022-3524": {
                 "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()."
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-41674": {
                 "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-1158": {
                 "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
             }, 
@@ -99027,6 +100264,9 @@
             "CVE-2022-33981": {
                 "cmt_msg": "floppy: disable FDRAWCMD by default"
             }, 
+            "CVE-2022-36879": {
+                "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()"
+            }, 
             "CVE-2021-3714": {
                 "cmt_msg": ""
             }, 
@@ -99048,6 +100288,9 @@
             "CVE-2022-28356": {
                 "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()"
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-27820": {
                 "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
             }, 
@@ -99117,8 +100360,8 @@
             "CVE-2022-1199": {
                 "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device"
             }, 
-            "CVE-2022-36946": {
-                "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset"
+            "CVE-2022-3532": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-1204": {
                 "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
@@ -99153,6 +100396,9 @@
             "CVE-2022-24448": {
                 "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
@@ -99162,6 +100408,9 @@
             "CVE-2022-23036": {
                 "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()"
             }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
@@ -99171,8 +100420,8 @@
             "CVE-2022-29582": {
                 "cmt_msg": "io_uring: fix race between timeout flush and removal"
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -99210,6 +100459,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -99273,14 +100525,17 @@
             "CVE-2020-25220": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-38457": {
+                "cmt_msg": ""
+            }, 
             "CVE-2015-2877": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-45402": {
                 "cmt_msg": "bpf: Fix signed bounds propagation after mov32"
             }, 
-            "CVE-2022-29901": {
-                "cmt_msg": "x86/kvm/vmx: Make noinstr clean"
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
             }, 
             "CVE-2019-16089": {
                 "cmt_msg": ""
@@ -99291,8 +100546,8 @@
             "CVE-2022-1679": {
                 "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
-            "CVE-2022-26365": {
-                "cmt_msg": "xen/blkfront: fix leaking data in shared pages"
+            "CVE-2022-26966": {
+                "cmt_msg": "sr9700: sanity check for packet length"
             }, 
             "CVE-2022-26490": {
                 "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
@@ -99737,10 +100992,6 @@
             "CVE-2022-20158": {
                 "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", 
                 "cmt_id": "a055f5f2841f7522b44a2b1eccb1951b4b03d51a"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
-                "cmt_id": "56b38e3ca4064041d93c1ca18828c8cedad2e16c"
             }
         }, 
         "5.15.32": {
@@ -99987,6 +101238,10 @@
             "CVE-2022-1973": {
                 "cmt_msg": "fs/ntfs3: Fix invalid free in log_replay", 
                 "cmt_id": "61decb58486d7c0cbded25fe4d301ab4fa148cd8"
+            }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", 
+                "cmt_id": "22e0b0b84c538b60bdf8eeceee7ab3cebf4a1a09"
             }
         }, 
         "5.15.47": {
@@ -100171,6 +101426,10 @@
             "CVE-2022-40307": {
                 "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", 
                 "cmt_id": "dd291e070be0eca8807476b022bda00c891d9066"
+            }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+                "cmt_id": "1a889da60afc017050e1f517b3b976b462846668"
             }
         }, 
         "5.15.70": {
@@ -100268,18 +101527,33 @@
             "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
             "CVE-2008-4609": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-24122": {
+                "cmt_msg": "ucount:  Make get_ucount a safe get_user replacement"
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
             }, 
@@ -100295,6 +101569,9 @@
             "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -100319,6 +101596,15 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -100355,11 +101641,20 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-24122": {
-                "cmt_msg": "ucount:  Make get_ucount a safe get_user replacement"
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
             }, 
             "CVE-2022-3523": {
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
@@ -100406,6 +101701,12 @@
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
@@ -100415,8 +101716,8 @@
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -100442,6 +101743,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -100779,9 +102083,6 @@
             "CVE-2021-3744": {
                 "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
             }, 
-            "CVE-2022-42720": {
-                "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
-            }, 
             "CVE-2021-30002": {
                 "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy"
             }, 
@@ -101124,6 +102425,18 @@
             "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -101640,9 +102953,6 @@
             "CVE-2022-2153": {
                 "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
             }, 
-            "CVE-2022-41674": {
-                "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
-            }, 
             "CVE-2018-12930": {
                 "cmt_msg": ""
             }, 
@@ -101709,6 +103019,9 @@
             "CVE-2019-17075": {
                 "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2019-0146": {
                 "cmt_msg": "i40e: add num_vectors checker in iwarp handler"
             }, 
@@ -101790,6 +103103,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -101949,6 +103265,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
@@ -101970,15 +103295,9 @@
             "CVE-2017-13694": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42721": {
-                "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption"
-            }, 
             "CVE-2020-24490": {
                 "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -102021,12 +103340,24 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
             "CVE-2019-0136": {
                 "cmt_msg": "mac80211: drop robust management frames from unknown TA"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -102288,9 +103619,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -102384,21 +103712,27 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
                 "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
             }, 
@@ -104573,10 +105907,6 @@
             "CVE-2022-20158": {
                 "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", 
                 "cmt_id": "268dcf1f7b3193bc446ec3d14e08a240e9561e4d"
-            }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", 
-                "cmt_id": "21829376268397f9fd2c35cfa9135937b6aa3a1e"
             }
         }, 
         "5.4.188": {
@@ -104736,6 +106066,10 @@
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
                 "cmt_id": "f36736fbd48491a8d85cd22f4740d542c5a1546e"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", 
+                "cmt_id": "00771de7cc28e405f5ae19ca46facd83a534bb8f"
+            }, 
             "CVE-2022-32981": {
                 "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", 
                 "cmt_id": "0c4bc0a2f8257f79a70fe02b9a698eb14695a64b"
@@ -104876,6 +106210,10 @@
             }
         }, 
         "5.4.213": {
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+                "cmt_id": "279c7668e354fa151d5fd2e8c42b5153a1de3135"
+            }, 
             "CVE-2022-2663": {
                 "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", 
                 "cmt_id": "36f7b71f8ad8e4d224b45f7d6ecfeff63b091547"
@@ -104931,6 +106269,12 @@
                 "cmt_id": "020402c7dd587a8a4725d32bbd172a5f7ecc5f8f"
             }
         }, 
+        "5.4.219": {
+            "CVE-2022-42719": {
+                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free", 
+                "cmt_id": "0cb5be43dc4b79da010522f79a06fa56f944d3cd"
+            }
+        }, 
         "outstanding": {
             "CVE-2021-0929": {
                 "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
@@ -105016,12 +106360,24 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2022-1789": {
                 "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID"
             }, 
@@ -105052,6 +106408,9 @@
             "CVE-2022-34918": {
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -105079,9 +106438,18 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20177": {
                 "cmt_msg": "netfilter: add and use nf_hook_slow_list()"
             }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -105109,9 +106477,6 @@
             "CVE-2020-36516": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4148": {
                 "cmt_msg": "mm: khugepaged: skip huge page collapse for special files"
             }, 
@@ -105133,9 +106498,21 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-3523": {
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
             }, 
@@ -105160,9 +106537,6 @@
             "CVE-2020-14304": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-42719": {
-                "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free"
-            }, 
             "CVE-2020-0347": {
                 "cmt_msg": ""
             }, 
@@ -105220,14 +106594,20 @@
             "CVE-2019-15290": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -105262,6 +106642,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -105384,6 +106767,10 @@
             "CVE-2022-1973": {
                 "cmt_msg": "fs/ntfs3: Fix invalid free in log_replay", 
                 "cmt_id": "2aafbe9fb210a355d6e0e92a91f294dee80e5d44"
+            }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", 
+                "cmt_id": "50db547e5f25218e1aec3864d77cac0cb2fc51ca"
             }
         }, 
         "5.18.4": {
@@ -105567,6 +106954,9 @@
             "CVE-2022-2785": {
                 "cmt_msg": "bpf: Disallow bpf programs call prog_run command."
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2022-2663": {
                 "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic"
             }, 
@@ -105600,12 +106990,24 @@
             "CVE-2008-4609": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2016-8660": {
                 "cmt_msg": ""
             }, 
@@ -105624,6 +107026,9 @@
             "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2019-15239": {
                 "cmt_msg": "unknown"
             }, 
@@ -105651,6 +107056,15 @@
             "CVE-2022-39190": {
                 "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -105693,12 +107107,24 @@
             "CVE-2022-3424": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-41674": {
                 "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2022-3523": {
                 "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
             }, 
@@ -105765,6 +107191,12 @@
             "CVE-2022-42720": {
                 "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
@@ -105774,8 +107206,8 @@
             "CVE-2022-41849": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
             }, 
             "CVE-2022-1116": {
                 "cmt_msg": ""
@@ -105801,6 +107233,9 @@
             "CVE-2021-39802": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-36280": {
                 "cmt_msg": ""
             }, 
@@ -105922,6 +107357,10 @@
             "CVE-2022-40307": {
                 "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", 
                 "cmt_id": "d46815a8f26ca6db2336106a148265239f73b0af"
+            }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", 
+                "cmt_id": "8f796f36f5ba839c11eb4685150ebeed496c546f"
             }
         }, 
         "5.19.14": {
@@ -105957,108 +107396,102 @@
             }
         }, 
         "outstanding": {
-            "CVE-2018-17977": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-26878": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-15802": {
+            "CVE-2020-26556": {
                 "cmt_msg": ""
             }, 
             "CVE-2020-26557": {
                 "cmt_msg": ""
             }, 
-            "CVE-2008-2544": {
+            "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
-            "CVE-2010-5321": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2018-12930": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2018-12931": {
+            "CVE-2020-26559": {
                 "cmt_msg": ""
             }, 
             "CVE-2020-35501": {
                 "cmt_msg": ""
             }, 
-            "CVE-2020-26556": {
+            "CVE-2022-38457": {
                 "cmt_msg": ""
             }, 
-            "CVE-2019-15902": {
-                "cmt_msg": "unknown"
+            "CVE-2018-1121": {
+                "cmt_msg": ""
             }, 
-            "CVE-2022-38096": {
+            "CVE-2019-19378": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-24503": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-24502": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-11725": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-23825": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3864": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-3523": {
-                "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
+            "CVE-2008-4609": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-38096": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-2978": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-26934": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
+            "CVE-2016-8660": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-3524": {
                 "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()."
             }, 
-            "CVE-2021-39801": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2021-39800": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3169": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2021-39802": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2019-15239": {
-                "cmt_msg": "unknown"
-            }, 
-            "CVE-2018-1121": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3521": {
-                "cmt_msg": "kcm: avoid potential race in kcm_tx_work"
-            }, 
-            "CVE-2007-3719": {
+            "CVE-2020-15802": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-3522": {
                 "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check"
             }, 
-            "CVE-2019-19378": {
+            "CVE-2008-2544": {
                 "cmt_msg": ""
             }, 
-            "CVE-2021-0695": {
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
+            "CVE-2019-15239": {
+                "cmt_msg": "unknown"
+            }, 
+            "CVE-2007-3719": {
                 "cmt_msg": ""
             }, 
-            "CVE-2008-4609": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-41850": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-14304": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2005-3660": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2021-3542": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-0347": {
+            "CVE-2022-2961": {
                 "cmt_msg": ""
             }, 
             "CVE-2022-40133": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-38457": {
-                "cmt_msg": ""
-            }, 
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
@@ -106071,10 +107504,82 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
-            "CVE-2020-24503": {
+            "CVE-2022-3531": {
                 "cmt_msg": ""
             }, 
-            "CVE-2020-24502": {
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
+            "CVE-2022-1247": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3435": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-10708": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2017-13693": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-0399": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2017-13694": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-36516": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2012-4542": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2013-7445": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2005-3660": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3424": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
+            "CVE-2022-3523": {
+                "cmt_msg": "mm/memory.c: fix race when faulting a device private page"
+            }, 
+            "CVE-2022-36402": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-0695": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3521": {
+                "cmt_msg": "kcm: avoid potential race in kcm_tx_work"
+            }, 
+            "CVE-2020-14304": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2020-0347": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3714": {
                 "cmt_msg": ""
             }, 
             "CVE-2019-12456": {
@@ -106086,10 +107591,70 @@
             "CVE-2021-3892": {
                 "cmt_msg": ""
             }, 
-            "CVE-2019-20794": {
+            "CVE-2022-41850": {
                 "cmt_msg": ""
             }, 
-            "CVE-2021-3714": {
+            "CVE-2022-41218": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2011-4917": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2019-15902": {
+                "cmt_msg": "unknown"
+            }, 
+            "CVE-2019-15290": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2018-17977": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-26878": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-41849": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-1116": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2010-5321": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12930": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2018-12931": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39801": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39800": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3169": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-39802": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-41848": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-36280": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
             "CVE-2018-12929": {
@@ -106098,107 +107663,26 @@
             "CVE-2018-12928": {
                 "cmt_msg": ""
             }, 
-            "CVE-2020-11725": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-26559": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-25220": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1116": {
-                "cmt_msg": ""
-            }, 
             "CVE-2015-2877": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-23825": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3435": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-16089": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-36280": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-41848": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-0400": {
                 "cmt_msg": ""
             }, 
-            "CVE-2021-3864": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2019-19814": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2020-10708": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-1247": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2961": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2017-13693": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2021-0399": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-3424": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-2978": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-41218": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-25265": {
                 "cmt_msg": ""
             }, 
-            "CVE-2011-4917": {
-                "cmt_msg": ""
-            }, 
             "CVE-2011-4916": {
                 "cmt_msg": ""
-            }, 
-            "CVE-2020-36516": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2017-13694": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2012-4542": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-36402": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2019-15290": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2016-8660": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2021-26934": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2022-41849": {
-                "cmt_msg": ""
-            }, 
-            "CVE-2013-7445": {
-                "cmt_msg": ""
             }
         }
     }, 
@@ -106686,6 +108170,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -106887,6 +108374,18 @@
             "CVE-2021-20239": {
                 "cmt_msg": "net: pass a sockptr_t into ->setsockopt"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -107364,6 +108863,9 @@
             "CVE-2022-2978": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2020-10942": {
                 "cmt_msg": "vhost: Check docket sk_family instead of call getname"
             }, 
@@ -107412,6 +108914,9 @@
             "CVE-2019-14895": {
                 "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -107541,6 +109046,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -107565,9 +109079,6 @@
             "CVE-2020-24490": {
                 "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -107604,12 +109115,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
             "CVE-2020-14416": {
                 "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU"
             }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2020-28588": {
                 "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms"
             }, 
@@ -107823,9 +109343,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -107910,9 +109427,21 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
             "CVE-2022-23041": {
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
@@ -108541,6 +110070,9 @@
             "CVE-2022-3202": {
                 "cmt_msg": "jfs: prevent NULL deref in diFree"
             }, 
+            "CVE-2022-2602": {
+                "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release"
+            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -108694,6 +110226,18 @@
             "CVE-2021-20239": {
                 "cmt_msg": "net: pass a sockptr_t into ->setsockopt"
             }, 
+            "CVE-2022-3567": {
+                "cmt_msg": "ipv6: Fix data races around sk->sk_prot."
+            }, 
+            "CVE-2022-3566": {
+                "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops."
+            }, 
+            "CVE-2022-3565": {
+                "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers"
+            }, 
+            "CVE-2022-3564": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-36386": {
                 "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()"
             }, 
@@ -109072,6 +110616,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-3577": {
+                "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe"
+            }, 
             "CVE-2021-20226": {
                 "cmt_msg": "io_uring: don't rely on weak ->files references"
             }, 
@@ -109099,6 +110646,9 @@
             "CVE-2020-28374": {
                 "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup"
             }, 
+            "CVE-2022-3586": {
+                "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child"
+            }, 
             "CVE-2020-27825": {
                 "cmt_msg": "tracing: Fix race in trace_open and buffer resize call"
             }, 
@@ -109210,6 +110760,15 @@
             "CVE-2021-44733": {
                 "cmt_msg": "tee: handle lookup of shm with reference count 0"
             }, 
+            "CVE-2022-3531": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3532": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3535": {
+                "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak"
+            }, 
             "CVE-2022-3435": {
                 "cmt_msg": ""
             }, 
@@ -109231,9 +110790,6 @@
             "CVE-2020-24490": {
                 "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report"
             }, 
-            "CVE-2022-42722": {
-                "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device"
-            }, 
             "CVE-2021-4149": {
                 "cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
             }, 
@@ -109267,9 +110823,21 @@
             "CVE-2021-39648": {
                 "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
             }, 
+            "CVE-2022-3545": {
+                "cmt_msg": "nfp: fix use-after-free in area_cache_get()"
+            }, 
             "CVE-2021-43056": {
                 "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest"
             }, 
+            "CVE-2022-3541": {
+                "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address"
+            }, 
+            "CVE-2022-3543": {
+                "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb."
+            }, 
+            "CVE-2022-3542": {
+                "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()"
+            }, 
             "CVE-2021-21781": {
                 "cmt_msg": "ARM: ensure the signal page contains defined contents"
             }, 
@@ -109450,9 +111018,6 @@
             "CVE-2022-20422": {
                 "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls"
             }, 
-            "CVE-2022-20423": {
-                "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()"
-            }, 
             "CVE-2022-20421": {
                 "cmt_msg": "binder: fix UAF of ref->proc caused by race condition"
             }, 
@@ -109540,6 +111105,15 @@
             "CVE-2021-37576": {
                 "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow"
             }, 
+            "CVE-2022-3594": {
+                "cmt_msg": "r8152: Rate limit overflow messages"
+            }, 
+            "CVE-2022-3544": {
+                "cmt_msg": ""
+            }, 
+            "CVE-2022-3595": {
+                "cmt_msg": "cifs: fix double-fault crash during ntlmssp"
+            }, 
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
diff --git a/data/stream_fixes.json b/data/stream_fixes.json
index 5f0d79b..cf43714 100644
--- a/data/stream_fixes.json
+++ b/data/stream_fixes.json
@@ -33839,6 +33839,58 @@
             "fixed_version": "5.17.4"
         }
     }, 
+    "CVE-2022-3577": {
+        "5.10": {
+            "cmt_id": "296f8ca0f73f5268cd9b85cf72ff783596b2264e", 
+            "fixed_version": "5.10.121"
+        }, 
+        "5.15": {
+            "cmt_id": "22e0b0b84c538b60bdf8eeceee7ab3cebf4a1a09", 
+            "fixed_version": "5.15.46"
+        }, 
+        "5.17": {
+            "cmt_id": "2ab0a30f4f709f462d253bbb36fc64bb6de5a135", 
+            "fixed_version": "5.17.14"
+        }, 
+        "5.18": {
+            "cmt_id": "50db547e5f25218e1aec3864d77cac0cb2fc51ca", 
+            "fixed_version": "5.18.3"
+        }, 
+        "5.4": {
+            "cmt_id": "00771de7cc28e405f5ae19ca46facd83a534bb8f", 
+            "fixed_version": "5.4.198"
+        }
+    }, 
+    "CVE-2022-3586": {
+        "4.14": {
+            "cmt_id": "a7af71bb5ee6e887d49f098e212ef4f2f7cfbaf6", 
+            "fixed_version": "4.14.293"
+        }, 
+        "4.19": {
+            "cmt_id": "9245ed20950afe225bc6d1c4b9d28d55aa152e25", 
+            "fixed_version": "4.19.258"
+        }, 
+        "4.9": {
+            "cmt_id": "b5aa83141aa97f81c8e06051e4bd925bfb5474fb", 
+            "fixed_version": "4.9.328"
+        }, 
+        "5.10": {
+            "cmt_id": "2ee85ac1b29dbd2ebd2d8e5ac1dd5793235d516b", 
+            "fixed_version": "5.10.143"
+        }, 
+        "5.15": {
+            "cmt_id": "1a889da60afc017050e1f517b3b976b462846668", 
+            "fixed_version": "5.15.68"
+        }, 
+        "5.19": {
+            "cmt_id": "8f796f36f5ba839c11eb4685150ebeed496c546f", 
+            "fixed_version": "5.19.9"
+        }, 
+        "5.4": {
+            "cmt_id": "279c7668e354fa151d5fd2e8c42b5153a1de3135", 
+            "fixed_version": "5.4.213"
+        }
+    }, 
     "CVE-2022-36123": {
         "4.14": {
             "cmt_id": "a24eebede57ff42d5123cca948c5077ccddbffcb", 
@@ -34094,6 +34146,10 @@
         }
     }, 
     "CVE-2022-42719": {
+        "5.10": {
+            "cmt_id": "31ce5da48a845bac48930bbde1d45e7449591728", 
+            "fixed_version": "5.10.149"
+        }, 
         "5.15": {
             "cmt_id": "de124365a7d2deed22cf706583930f28d537ff0f", 
             "fixed_version": "5.15.74"
@@ -34101,6 +34157,10 @@
         "5.19": {
             "cmt_id": "e6d77ac0132da7e73fdcc4a38dd4c40ac0226466", 
             "fixed_version": "5.19.16"
+        }, 
+        "5.4": {
+            "cmt_id": "0cb5be43dc4b79da010522f79a06fa56f944d3cd", 
+            "fixed_version": "5.4.219"
         }
     }, 
     "CVE-2022-42720": {