Update 22Aug22
diff --git a/CHANGES.md b/CHANGES.md
index fbf5ae2..a395cf7 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1,10 +1,31 @@
 
 # **Linux Kernel CVE Changes**
 
-## Last Update - 16Aug22 13:19
+## Last Update - 22Aug22 16:56
+
+### **New CVEs Added:**
+
+[CVE-2022-2308](cves/CVE-2022-2308)  
+[CVE-2022-2503](cves/CVE-2022-2503)  
+[CVE-2022-2873](cves/CVE-2022-2873)  
+
+
+### **New Versions Checked:**
+
+[5.10.137](streams/5.10)  
+[5.15.62](streams/5.15)  
+[5.18.19](streams/5.18)  
+[5.19.3](streams/5.19)  
+
 
 ### **Updated CVEs:**
 
+[CVE-2021-33656](cves/CVE-2021-33656)  
+[CVE-2022-1462](cves/CVE-2022-1462)  
+[CVE-2022-1679](cves/CVE-2022-1679)  
+[CVE-2022-1882](cves/CVE-2022-1882)  
+[CVE-2022-2153](cves/CVE-2022-2153)  
+[CVE-2022-2327](cves/CVE-2022-2327)  
+[CVE-2022-2585](cves/CVE-2022-2585)  
 [CVE-2022-2586](cves/CVE-2022-2586)  
 [CVE-2022-2588](cves/CVE-2022-2588)  
-[CVE-2022-26373](cves/CVE-2022-26373)  
diff --git a/data/3.12/3.12_CVEs.txt b/data/3.12/3.12_CVEs.txt
index 23b54e0..48a5687 100644
--- a/data/3.12/3.12_CVEs.txt
+++ b/data/3.12/3.12_CVEs.txt
@@ -1105,13 +1105,12 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -1134,6 +1133,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1143,6 +1143,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
@@ -1154,6 +1155,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
diff --git a/data/3.12/3.12_security.txt b/data/3.12/3.12_security.txt
index ac7303e..87403dc 100644
--- a/data/3.12/3.12_security.txt
+++ b/data/3.12/3.12_security.txt
@@ -1243,13 +1243,12 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -1272,6 +1271,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1281,6 +1281,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
@@ -1292,6 +1293,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
diff --git a/data/3.14/3.14_CVEs.txt b/data/3.14/3.14_CVEs.txt
index b580feb..5cb2236 100644
--- a/data/3.14/3.14_CVEs.txt
+++ b/data/3.14/3.14_CVEs.txt
@@ -1073,13 +1073,12 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -1102,6 +1101,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1111,6 +1111,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
@@ -1122,6 +1123,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
diff --git a/data/3.14/3.14_security.txt b/data/3.14/3.14_security.txt
index 6c8f648..644b24d 100644
--- a/data/3.14/3.14_security.txt
+++ b/data/3.14/3.14_security.txt
@@ -1207,13 +1207,12 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -1236,6 +1235,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1245,6 +1245,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
@@ -1256,6 +1257,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
diff --git a/data/3.16/3.16_CVEs.txt b/data/3.16/3.16_CVEs.txt
index bc1b85e..284aa79 100644
--- a/data/3.16/3.16_CVEs.txt
+++ b/data/3.16/3.16_CVEs.txt
@@ -1054,13 +1054,12 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -1083,6 +1082,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1092,6 +1092,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -1104,6 +1105,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
diff --git a/data/3.16/3.16_security.txt b/data/3.16/3.16_security.txt
index 6c87486..49fe992 100644
--- a/data/3.16/3.16_security.txt
+++ b/data/3.16/3.16_security.txt
@@ -1160,13 +1160,12 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -1189,6 +1188,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1198,6 +1198,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -1210,6 +1211,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
diff --git a/data/3.18/3.18_CVEs.txt b/data/3.18/3.18_CVEs.txt
index ac603c3..1329c7d 100644
--- a/data/3.18/3.18_CVEs.txt
+++ b/data/3.18/3.18_CVEs.txt
@@ -1038,13 +1038,12 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -1067,6 +1066,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1076,6 +1076,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -1089,6 +1090,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
diff --git a/data/3.18/3.18_security.txt b/data/3.18/3.18_security.txt
index 358964f..39e98ac 100644
--- a/data/3.18/3.18_security.txt
+++ b/data/3.18/3.18_security.txt
@@ -1272,13 +1272,12 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -1301,6 +1300,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1310,6 +1310,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -1323,6 +1324,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
diff --git a/data/3.2/3.2_CVEs.txt b/data/3.2/3.2_CVEs.txt
index 4c61042..741585c 100644
--- a/data/3.2/3.2_CVEs.txt
+++ b/data/3.2/3.2_CVEs.txt
@@ -1091,13 +1091,12 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-20132: Fix not seen in stream
@@ -1118,6 +1117,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1126,6 +1126,7 @@
 CVE-2022-23825: Fix unknown
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
@@ -1135,6 +1136,7 @@
 CVE-2022-2639: Fix not seen in stream
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-32296: Fix not seen in stream
diff --git a/data/3.2/3.2_security.txt b/data/3.2/3.2_security.txt
index 95bd124..0732ff4 100644
--- a/data/3.2/3.2_security.txt
+++ b/data/3.2/3.2_security.txt
@@ -1247,13 +1247,12 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-20132: (unk) HID: add hid_is_usb() function to make it simpler for USB detection 
@@ -1274,6 +1273,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1282,6 +1282,7 @@
   CVE-2022-23825: (unk)  
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
@@ -1291,6 +1292,7 @@
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-32296: (unk) tcp: increase source port perturb table to 2^16 
diff --git a/data/4.1/4.1_CVEs.txt b/data/4.1/4.1_CVEs.txt
index 4958320..5339a03 100644
--- a/data/4.1/4.1_CVEs.txt
+++ b/data/4.1/4.1_CVEs.txt
@@ -995,14 +995,13 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -1025,6 +1024,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1034,6 +1034,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -1048,6 +1049,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-32250: Fix not seen in stream
diff --git a/data/4.1/4.1_security.txt b/data/4.1/4.1_security.txt
index 9667c80..e9c7e8d 100644
--- a/data/4.1/4.1_security.txt
+++ b/data/4.1/4.1_security.txt
@@ -1091,14 +1091,13 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -1121,6 +1120,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1130,6 +1130,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -1144,6 +1145,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-32250: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
diff --git a/data/4.10/4.10_CVEs.txt b/data/4.10/4.10_CVEs.txt
index f8943d0..5a078d1 100644
--- a/data/4.10/4.10_CVEs.txt
+++ b/data/4.10/4.10_CVEs.txt
@@ -890,15 +890,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -921,6 +920,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -930,6 +930,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -944,6 +945,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.10/4.10_security.txt b/data/4.10/4.10_security.txt
index 032bb61..e880268 100644
--- a/data/4.10/4.10_security.txt
+++ b/data/4.10/4.10_security.txt
@@ -924,15 +924,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -955,6 +954,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -964,6 +964,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -978,6 +979,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.11/4.11_CVEs.txt b/data/4.11/4.11_CVEs.txt
index b374928..2a8f397 100644
--- a/data/4.11/4.11_CVEs.txt
+++ b/data/4.11/4.11_CVEs.txt
@@ -861,15 +861,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -892,6 +891,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -901,6 +901,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -916,6 +917,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.11/4.11_security.txt b/data/4.11/4.11_security.txt
index 4fbc171..4ef336f 100644
--- a/data/4.11/4.11_security.txt
+++ b/data/4.11/4.11_security.txt
@@ -883,15 +883,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -914,6 +913,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -923,6 +923,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -938,6 +939,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.12/4.12_CVEs.txt b/data/4.12/4.12_CVEs.txt
index 3e03e6e..5bdec04 100644
--- a/data/4.12/4.12_CVEs.txt
+++ b/data/4.12/4.12_CVEs.txt
@@ -841,15 +841,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -873,6 +872,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -882,6 +882,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -898,6 +899,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.12/4.12_security.txt b/data/4.12/4.12_security.txt
index efcfb57..116d03c 100644
--- a/data/4.12/4.12_security.txt
+++ b/data/4.12/4.12_security.txt
@@ -867,15 +867,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -899,6 +898,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -908,6 +908,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -924,6 +925,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.13/4.13_CVEs.txt b/data/4.13/4.13_CVEs.txt
index 0d061f2..51bbe2d 100644
--- a/data/4.13/4.13_CVEs.txt
+++ b/data/4.13/4.13_CVEs.txt
@@ -824,15 +824,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -856,6 +855,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -865,6 +865,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -881,6 +882,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.13/4.13_security.txt b/data/4.13/4.13_security.txt
index f234cf3..4ee1456 100644
--- a/data/4.13/4.13_security.txt
+++ b/data/4.13/4.13_security.txt
@@ -852,15 +852,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -884,6 +883,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -893,6 +893,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -909,6 +910,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt
index 1153908..9a546fc 100644
--- a/data/4.14/4.14_CVEs.txt
+++ b/data/4.14/4.14_CVEs.txt
@@ -789,15 +789,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fixed with 4.14.276
 CVE-2022-1419: Fixed with 4.14.278
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fixed with 4.14.290
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fixed with 4.14.281
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fixed with 4.14.281
 CVE-2022-1734: Fixed with 4.14.278
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fixed with 4.14.278
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fixed with 4.14.283
 CVE-2022-1974: Fixed with 4.14.278
 CVE-2022-1975: Fixed with 4.14.278
@@ -823,6 +822,7 @@
 CVE-2022-23040: Fixed with 4.14.271
 CVE-2022-23041: Fixed with 4.14.271
 CVE-2022-23042: Fixed with 4.14.271
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fixed with 4.14.287
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -832,6 +832,7 @@
 CVE-2022-23960: Fixed with 4.14.271
 CVE-2022-24448: Fixed with 4.14.265
 CVE-2022-24958: Fixed with 4.14.270
+CVE-2022-2503: Fixed with 4.14.282
 CVE-2022-25258: Fixed with 4.14.267
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fixed with 4.14.267
@@ -848,6 +849,7 @@
 CVE-2022-28388: Fixed with 4.14.277
 CVE-2022-28389: Fixed with 4.14.276
 CVE-2022-28390: Fixed with 4.14.276
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fixed with 4.14.278
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt
index da969ea..fc26b52 100644
--- a/data/4.14/4.14_security.txt
+++ b/data/4.14/4.14_security.txt
@@ -1148,6 +1148,7 @@
 CVEs fixed in 4.14.282:
   CVE-2022-0494: 4f3ea768c56e8dce55ae538f18b37420366c5c22 block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern
   CVE-2022-1012: 40d20f3186ddd9b6b94598f4ef3d07644b0fa43c secure_seq: use the 64 bits of the siphash for port offset calculation
+  CVE-2022-2503: 388bc1e69663956f8cee43af3bd02bd3061d222d dm verity: set DM_TARGET_IMMUTABLE feature flag
 
 CVEs fixed in 4.14.283:
   CVE-2022-1184: d27d3caddbeff10871982d5e25e6557be0fdc29a ext4: verify dir block before splitting it
@@ -1182,6 +1183,7 @@
   CVE-2022-36123: a24eebede57ff42d5123cca948c5077ccddbffcb x86: Clear .brk area at early boot
 
 CVEs fixed in 4.14.290:
+  CVE-2022-1462: e9274a2732e1de3ca36076126284b4e5ffe6d587 tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
   CVE-2022-36879: 2c9d93e35cb857fc613ec9d58d690d332252747b xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
 
 Outstanding CVEs:
@@ -1317,17 +1319,16 @@
   CVE-2022-1247: (unk)  
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
-  CVE-2022-1462: (unk)  
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
-  CVE-2022-1882: (unk)  
   CVE-2022-20148: (unk) f2fs: fix UAF in f2fs_available_free_memory 
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-21499: (unk) lockdown: also lock down previous kgdb use 
   CVE-2022-2153: (unk) KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
   CVE-2022-23816: (unk)  
@@ -1336,6 +1337,7 @@
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
diff --git a/data/4.15/4.15_CVEs.txt b/data/4.15/4.15_CVEs.txt
index 90eeae7..367daeb 100644
--- a/data/4.15/4.15_CVEs.txt
+++ b/data/4.15/4.15_CVEs.txt
@@ -739,15 +739,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -773,6 +772,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -782,6 +782,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -798,6 +799,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/4.15/4.15_security.txt b/data/4.15/4.15_security.txt
index 6bcd55b..b7bd490 100644
--- a/data/4.15/4.15_security.txt
+++ b/data/4.15/4.15_security.txt
@@ -771,15 +771,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -805,6 +804,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -814,6 +814,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -830,6 +831,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/4.16/4.16_CVEs.txt b/data/4.16/4.16_CVEs.txt
index 54383d5..5a81353 100644
--- a/data/4.16/4.16_CVEs.txt
+++ b/data/4.16/4.16_CVEs.txt
@@ -717,15 +717,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -752,6 +751,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -761,6 +761,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -777,6 +778,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/4.16/4.16_security.txt b/data/4.16/4.16_security.txt
index 16c946b..9020361 100644
--- a/data/4.16/4.16_security.txt
+++ b/data/4.16/4.16_security.txt
@@ -749,15 +749,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -784,6 +783,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -793,6 +793,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -809,6 +810,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/4.17/4.17_CVEs.txt b/data/4.17/4.17_CVEs.txt
index fb6eb9f..2b3aa51 100644
--- a/data/4.17/4.17_CVEs.txt
+++ b/data/4.17/4.17_CVEs.txt
@@ -697,15 +697,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -732,6 +731,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -741,6 +741,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -757,6 +758,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/4.17/4.17_security.txt b/data/4.17/4.17_security.txt
index e756e05..2838eb0 100644
--- a/data/4.17/4.17_security.txt
+++ b/data/4.17/4.17_security.txt
@@ -729,15 +729,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -764,6 +763,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -773,6 +773,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -789,6 +790,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/4.18/4.18_CVEs.txt b/data/4.18/4.18_CVEs.txt
index 24fb7a6..b9819c7 100644
--- a/data/4.18/4.18_CVEs.txt
+++ b/data/4.18/4.18_CVEs.txt
@@ -674,16 +674,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
 CVE-2022-1678: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -710,6 +709,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -719,6 +719,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -735,6 +736,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/4.18/4.18_security.txt b/data/4.18/4.18_security.txt
index cac9f6f..6b5375f 100644
--- a/data/4.18/4.18_security.txt
+++ b/data/4.18/4.18_security.txt
@@ -706,16 +706,15 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
   CVE-2022-1678: (unk) tcp: optimize tcp internal pacing 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -742,6 +741,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -751,6 +751,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -767,6 +768,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt
index 93c57ab..1fd0ca5 100644
--- a/data/4.19/4.19_CVEs.txt
+++ b/data/4.19/4.19_CVEs.txt
@@ -647,17 +647,16 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fixed with 4.19.238
 CVE-2022-1419: Fixed with 4.19.242
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fixed with 4.19.254
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fixed with 4.19.245
 CVE-2022-1678: Fixed with 4.19.228
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fixed with 4.19.245
 CVE-2022-1734: Fixed with 4.19.242
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fixed with 4.19.241
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fixed with 4.19.247
 CVE-2022-1974: Fixed with 4.19.242
 CVE-2022-1975: Fixed with 4.19.242
@@ -684,6 +683,7 @@
 CVE-2022-23040: Fixed with 4.19.234
 CVE-2022-23041: Fixed with 4.19.234
 CVE-2022-23042: Fixed with 4.19.234
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fixed with 4.19.251
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -694,6 +694,7 @@
 CVE-2022-24448: Fixed with 4.19.228
 CVE-2022-24958: Fixed with 4.19.233
 CVE-2022-24959: Fixed with 4.19.228
+CVE-2022-2503: Fixed with 4.19.246
 CVE-2022-25258: Fixed with 4.19.230
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fixed with 4.19.230
@@ -710,6 +711,7 @@
 CVE-2022-28388: Fixed with 4.19.240
 CVE-2022-28389: Fixed with 4.19.238
 CVE-2022-28390: Fixed with 4.19.238
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fixed with 4.19.241
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt
index d9a0ed5..1183e75 100644
--- a/data/4.19/4.19_security.txt
+++ b/data/4.19/4.19_security.txt
@@ -956,6 +956,7 @@
 CVEs fixed in 4.19.246:
   CVE-2022-0494: 18243d8479fd77952bdb6340024169d30b173a40 block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern
   CVE-2022-1012: 695309c5c71526d32f5539f008bbf20ed2218528 secure_seq: use the 64 bits of the siphash for port offset calculation
+  CVE-2022-2503: 6bff6107d1364c95109609c3fd680e6c8d7fa503 dm verity: set DM_TARGET_IMMUTABLE feature flag
 
 CVEs fixed in 4.19.247:
   CVE-2022-1184: 78398c2b2cc14f9a9c8592cf6d334c5a479ed611 ext4: verify dir block before splitting it
@@ -990,6 +991,7 @@
   CVE-2022-36123: 36e2f161fb01795722f2ff1a24d95f08100333dd x86: Clear .brk area at early boot
 
 CVEs fixed in 4.19.254:
+  CVE-2022-1462: eb059bf8c237fe41fbaed4a6cccacce687b83222 tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
   CVE-2022-36879: fdb4fba1ba8512fa579a9d091dcb6c410f82f96a xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
 
 CVEs fixed in 4.19.255:
@@ -1108,18 +1110,17 @@
   CVE-2022-1247: (unk)  
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
-  CVE-2022-1462: (unk)  
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
-  CVE-2022-1882: (unk)  
   CVE-2022-20148: (unk) f2fs: fix UAF in f2fs_available_free_memory 
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-21499: (unk) lockdown: also lock down previous kgdb use 
   CVE-2022-2153: (unk) KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
   CVE-2022-23816: (unk)  
@@ -1127,6 +1128,7 @@
   CVE-2022-25265: (unk)  
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
diff --git a/data/4.20/4.20_CVEs.txt b/data/4.20/4.20_CVEs.txt
index c764b20..f8c82ec 100644
--- a/data/4.20/4.20_CVEs.txt
+++ b/data/4.20/4.20_CVEs.txt
@@ -636,16 +636,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -672,6 +671,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -682,6 +682,7 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -698,6 +699,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/4.20/4.20_security.txt b/data/4.20/4.20_security.txt
index f53b996..13800b4 100644
--- a/data/4.20/4.20_security.txt
+++ b/data/4.20/4.20_security.txt
@@ -668,16 +668,15 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -704,6 +703,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -714,6 +714,7 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -730,6 +731,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/4.3/4.3_CVEs.txt b/data/4.3/4.3_CVEs.txt
index e379242..5ae97d2 100644
--- a/data/4.3/4.3_CVEs.txt
+++ b/data/4.3/4.3_CVEs.txt
@@ -991,14 +991,13 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -1021,6 +1020,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1030,6 +1030,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -1044,6 +1045,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.3/4.3_security.txt b/data/4.3/4.3_security.txt
index a81b507..cf2826f 100644
--- a/data/4.3/4.3_security.txt
+++ b/data/4.3/4.3_security.txt
@@ -1007,14 +1007,13 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -1037,6 +1036,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1046,6 +1046,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -1060,6 +1061,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt
index e548aaa..21b81d0 100644
--- a/data/4.4/4.4_CVEs.txt
+++ b/data/4.4/4.4_CVEs.txt
@@ -970,15 +970,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -1001,6 +1000,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -1010,6 +1010,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -1024,6 +1025,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt
index 77d81db..fc10f59 100644
--- a/data/4.4/4.4_security.txt
+++ b/data/4.4/4.4_security.txt
@@ -1456,15 +1456,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -1485,6 +1484,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1494,6 +1494,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -1508,6 +1509,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.5/4.5_CVEs.txt b/data/4.5/4.5_CVEs.txt
index 60edd91..ae0eb70 100644
--- a/data/4.5/4.5_CVEs.txt
+++ b/data/4.5/4.5_CVEs.txt
@@ -952,15 +952,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -983,6 +982,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -992,6 +992,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -1006,6 +1007,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.5/4.5_security.txt b/data/4.5/4.5_security.txt
index 798384b..3ed644d 100644
--- a/data/4.5/4.5_security.txt
+++ b/data/4.5/4.5_security.txt
@@ -968,15 +968,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -999,6 +998,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -1008,6 +1008,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -1022,6 +1023,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.6/4.6_CVEs.txt b/data/4.6/4.6_CVEs.txt
index 5046a30..7b3ac2f 100644
--- a/data/4.6/4.6_CVEs.txt
+++ b/data/4.6/4.6_CVEs.txt
@@ -924,15 +924,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -955,6 +954,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -964,6 +964,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -978,6 +979,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.6/4.6_security.txt b/data/4.6/4.6_security.txt
index 6b834ce..09695f4 100644
--- a/data/4.6/4.6_security.txt
+++ b/data/4.6/4.6_security.txt
@@ -942,15 +942,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -973,6 +972,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -982,6 +982,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -996,6 +997,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.7/4.7_CVEs.txt b/data/4.7/4.7_CVEs.txt
index 9c9f8e2..343fd3b 100644
--- a/data/4.7/4.7_CVEs.txt
+++ b/data/4.7/4.7_CVEs.txt
@@ -906,15 +906,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -937,6 +936,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -946,6 +946,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -960,6 +961,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.7/4.7_security.txt b/data/4.7/4.7_security.txt
index 61560aa..80cd0b6 100644
--- a/data/4.7/4.7_security.txt
+++ b/data/4.7/4.7_security.txt
@@ -926,15 +926,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -957,6 +956,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -966,6 +966,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -980,6 +981,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.8/4.8_CVEs.txt b/data/4.8/4.8_CVEs.txt
index b6bbdd0..7b70716 100644
--- a/data/4.8/4.8_CVEs.txt
+++ b/data/4.8/4.8_CVEs.txt
@@ -910,15 +910,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -941,6 +940,7 @@
 CVE-2022-23039: Fix not seen in stream
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -950,6 +950,7 @@
 CVE-2022-23960: Fix not seen in stream
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -964,6 +965,7 @@
 CVE-2022-28356: Fix not seen in stream
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fix not seen in stream
diff --git a/data/4.8/4.8_security.txt b/data/4.8/4.8_security.txt
index 23fcff1..6906cd7 100644
--- a/data/4.8/4.8_security.txt
+++ b/data/4.8/4.8_security.txt
@@ -940,15 +940,14 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -971,6 +970,7 @@
   CVE-2022-23039: (unk) xen/gntalloc: don't use gnttab_query_foreign_access() 
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -980,6 +980,7 @@
   CVE-2022-23960: (unk) ARM: report Spectre v2 status through sysfs 
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -994,6 +995,7 @@
   CVE-2022-28356: (unk) llc: fix netdevice reference leaks in llc_ui_bind() 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-30594: (unk) ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE 
diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt
index ba1fbbe..469d393 100644
--- a/data/4.9/4.9_CVEs.txt
+++ b/data/4.9/4.9_CVEs.txt
@@ -909,15 +909,14 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fixed with 4.9.311
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fixed with 4.9.325
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fixed with 4.9.316
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fixed with 4.9.316
 CVE-2022-1734: Fixed with 4.9.313
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1836: Fixed with 4.9.313
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fixed with 4.9.318
 CVE-2022-1974: Fixed with 4.9.313
 CVE-2022-1975: Fixed with 4.9.313
@@ -940,6 +939,7 @@
 CVE-2022-23039: Fixed with 4.9.306
 CVE-2022-23040: Fixed with 4.9.306
 CVE-2022-23042: Fixed with 4.9.306
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fixed with 4.9.322
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -949,6 +949,7 @@
 CVE-2022-23960: Fixed with 4.9.306
 CVE-2022-24448: Fixed with 4.9.300
 CVE-2022-24958: Fixed with 4.9.305
+CVE-2022-2503: Fixed with 4.9.317
 CVE-2022-25258: Fixed with 4.9.302
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fixed with 4.9.302
@@ -963,6 +964,7 @@
 CVE-2022-28356: Fixed with 4.9.309
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28390: Fixed with 4.9.311
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
 CVE-2022-30594: Fixed with 4.9.311
diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt
index 37c4419..124b48e 100644
--- a/data/4.9/4.9_security.txt
+++ b/data/4.9/4.9_security.txt
@@ -1273,6 +1273,7 @@
 
 CVEs fixed in 4.9.317:
   CVE-2022-0494: d59073bedb7cf752b8cd4027dd0f67cf7ac4330f block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern
+  CVE-2022-2503: 27798cca4e54fe9c390396c4cc655480f827bbd5 dm verity: set DM_TARGET_IMMUTABLE feature flag
 
 CVEs fixed in 4.9.318:
   CVE-2022-1184: 93bbf0498ba20eadcd7132bd3cfdaff54eb72751 ext4: verify dir block before splitting it
@@ -1306,6 +1307,7 @@
   CVE-2022-36123: b3d7c509bcbd4384d4964dcdf028b3c3e0adb7f7 x86: Clear .brk area at early boot
 
 CVEs fixed in 4.9.325:
+  CVE-2022-1462: 41ce14090db93fc2f0c8a27ce8a324b0192da7b5 tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
   CVE-2022-36879: 5aff12fa09504c6ea88fc17749a39cda2c4d6ef7 xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
 
 Outstanding CVEs:
@@ -1478,17 +1480,16 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
-  CVE-2022-1882: (unk)  
   CVE-2022-20148: (unk) f2fs: fix UAF in f2fs_available_free_memory 
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-20369: (unk) media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 
   CVE-2022-21499: (unk) lockdown: also lock down previous kgdb use 
   CVE-2022-2153: (unk) KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
   CVE-2022-23816: (unk)  
@@ -1498,6 +1499,7 @@
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
diff --git a/data/5.0/5.0_CVEs.txt b/data/5.0/5.0_CVEs.txt
index 0525dcd..743289f 100644
--- a/data/5.0/5.0_CVEs.txt
+++ b/data/5.0/5.0_CVEs.txt
@@ -616,16 +616,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -652,6 +651,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -662,6 +662,7 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -678,6 +679,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
 CVE-2022-29901: Fix not seen in stream
diff --git a/data/5.0/5.0_security.txt b/data/5.0/5.0_security.txt
index 87b000b..a63e721 100644
--- a/data/5.0/5.0_security.txt
+++ b/data/5.0/5.0_security.txt
@@ -664,16 +664,15 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -700,6 +699,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -710,6 +710,7 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -726,6 +727,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/5.1/5.1_CVEs.txt b/data/5.1/5.1_CVEs.txt
index 18b2bd1..d82f657 100644
--- a/data/5.1/5.1_CVEs.txt
+++ b/data/5.1/5.1_CVEs.txt
@@ -584,16 +584,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -620,6 +619,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -630,6 +630,7 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -646,6 +647,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
diff --git a/data/5.1/5.1_security.txt b/data/5.1/5.1_security.txt
index 457d1f5..ba41ff2 100644
--- a/data/5.1/5.1_security.txt
+++ b/data/5.1/5.1_security.txt
@@ -620,16 +620,15 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -656,6 +655,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -666,6 +666,7 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -682,6 +683,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt
index b98fa83..73c6382 100644
--- a/data/5.10/5.10_CVEs.txt
+++ b/data/5.10/5.10_CVEs.txt
@@ -289,17 +289,16 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fixed with 5.10.110
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fixed with 5.10.134
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fixed with 5.10.110
 CVE-2022-1652: Fixed with 5.10.118
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fixed with 5.10.137
 CVE-2022-1729: Fixed with 5.10.118
 CVE-2022-1734: Fixed with 5.10.115
 CVE-2022-1786: Fixed with 5.10.117
 CVE-2022-1789: Fixed with 5.10.119
 CVE-2022-1836: Fixed with 5.10.114
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fixed with 5.10.120
 CVE-2022-1972: Fixed with 5.10.120
 CVE-2022-1974: Fixed with 5.10.115
@@ -318,7 +317,7 @@
 CVE-2022-21166: Fixed with 5.10.123
 CVE-2022-21499: Fixed with 5.10.119
 CVE-2022-21505: Fixed with 5.10.134
-CVE-2022-2153: Fix not seen in stream
+CVE-2022-2153: Fixed with 5.10.137
 CVE-2022-2209: Fix unknown
 CVE-2022-22942: Fixed with 5.10.95
 CVE-2022-23036: Fixed with 5.10.105
@@ -328,6 +327,7 @@
 CVE-2022-23040: Fixed with 5.10.105
 CVE-2022-23041: Fixed with 5.10.105
 CVE-2022-23042: Fixed with 5.10.105
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fixed with 5.10.129
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -338,13 +338,14 @@
 CVE-2022-24448: Fixed with 5.10.96
 CVE-2022-24958: Fixed with 5.10.104
 CVE-2022-24959: Fixed with 5.10.96
+CVE-2022-2503: Fixed with 5.10.120
 CVE-2022-25258: Fixed with 5.10.101
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fixed with 5.10.101
 CVE-2022-25636: Fixed with 5.10.103
-CVE-2022-2585: Fix unknown
-CVE-2022-2586: Fix not seen in stream
-CVE-2022-2588: Fix not seen in stream
+CVE-2022-2585: Fixed with 5.10.137
+CVE-2022-2586: Fixed with 5.10.137
+CVE-2022-2588: Fixed with 5.10.137
 CVE-2022-26365: Fixed with 5.10.129
 CVE-2022-26373: Fixed with 5.10.136
 CVE-2022-2639: Fixed with 5.10.113
@@ -356,6 +357,7 @@
 CVE-2022-28388: Fixed with 5.10.110
 CVE-2022-28389: Fixed with 5.10.110
 CVE-2022-28390: Fixed with 5.10.110
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fixed with 5.10.117
 CVE-2022-29581: Fixed with 5.10.113
 CVE-2022-29582: Fixed with 5.10.111
diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt
index 5124869..3e7ca65 100644
--- a/data/5.10/5.10_security.txt
+++ b/data/5.10/5.10_security.txt
@@ -430,6 +430,7 @@
   CVE-2022-1966: ea62d169b6e731e0b54abda1d692406f6bc6a696 netfilter: nf_tables: disallow non-stateful expression in sets earlier
   CVE-2022-1972: c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
   CVE-2022-2078: c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
+  CVE-2022-2503: 8df42bcd364cc3b41105215d841792aea787b133 dm verity: set DM_TARGET_IMMUTABLE feature flag
   CVE-2022-32250: ea62d169b6e731e0b54abda1d692406f6bc6a696 netfilter: nf_tables: disallow non-stateful expression in sets earlier
 
 CVEs fixed in 5.10.121:
@@ -470,6 +471,7 @@
   CVE-2022-29901: 7070bbb66c5303117e4c7651711ea7daae4c64b5 x86/kvm/vmx: Make noinstr clean
 
 CVEs fixed in 5.10.134:
+  CVE-2022-1462: 08afa87f58d83dfe040572ed591b47e8cb9e225c tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
   CVE-2022-21505: ab5050fd7430dde3a9f073129036d3da3facc8ec lockdown: Fix kexec lockdown bypass with ima policy
   CVE-2022-36879: 47b696dd654450cdec3103a833e5bf29c4b83bfa xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
 
@@ -479,6 +481,13 @@
 CVEs fixed in 5.10.136:
   CVE-2022-26373: 509c2c9fe75ea7493eebbb6bb2f711f37530ae19 x86/speculation: Add RSB VM Exit protections
 
+CVEs fixed in 5.10.137:
+  CVE-2022-1679: eccd7c3e2596b574241a7670b5b53f5322f470e5 ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
+  CVE-2022-2153: ac7de8c2ba1292856fdd4a4c0764669b9607cf0a KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
+  CVE-2022-2585: 541840859ace9c2ccebc32fa9e376c7bd3def490 posix-cpu-timers: Cleanup CPU timers before freeing them during exec
+  CVE-2022-2586: 1a4b18b1ff11ba26f9a852019d674fde9d1d1cff netfilter: nf_tables: do not allow SET_ID to refer to another table
+  CVE-2022-2588: 7018f03d97daf344e49b16200caf4363a1407cab net_sched: cls_route: remove from list when handle is 0
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -560,18 +569,13 @@
   CVE-2022-1247: (unk)  
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
-  CVE-2022-1462: (unk)  
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
-  CVE-2022-1679: (unk)  
-  CVE-2022-1882: (unk)  
   CVE-2022-20148: (unk) f2fs: fix UAF in f2fs_available_free_memory 
-  CVE-2022-2153: (unk) KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
   CVE-2022-23816: (unk)  
   CVE-2022-23825: (unk)  
   CVE-2022-25265: (unk)  
-  CVE-2022-2585: (unk)  
-  CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
-  CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
diff --git a/data/5.11/5.11_CVEs.txt b/data/5.11/5.11_CVEs.txt
index 620107d..114c83a 100644
--- a/data/5.11/5.11_CVEs.txt
+++ b/data/5.11/5.11_CVEs.txt
@@ -277,18 +277,17 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
 CVE-2022-1671: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -317,6 +316,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -327,11 +327,12 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-25636: Fix not seen in stream
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
@@ -345,6 +346,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29582: Fix not seen in stream
diff --git a/data/5.11/5.11_security.txt b/data/5.11/5.11_security.txt
index 32d90bd..38045d6 100644
--- a/data/5.11/5.11_security.txt
+++ b/data/5.11/5.11_security.txt
@@ -317,18 +317,17 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
   CVE-2022-1671: (unk) rxrpc: fix some null-ptr-deref bugs in server_key.c 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -357,6 +356,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -367,11 +367,12 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
@@ -385,6 +386,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal 
diff --git a/data/5.12/5.12_CVEs.txt b/data/5.12/5.12_CVEs.txt
index 6554a4b..8b3d2c6 100644
--- a/data/5.12/5.12_CVEs.txt
+++ b/data/5.12/5.12_CVEs.txt
@@ -229,19 +229,18 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fix not seen in stream
 CVE-2022-1651: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
 CVE-2022-1671: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
 CVE-2022-1852: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -271,6 +270,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2380: Fix not seen in stream
@@ -280,11 +280,12 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-25636: Fix not seen in stream
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
@@ -298,6 +299,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29156: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
diff --git a/data/5.12/5.12_security.txt b/data/5.12/5.12_security.txt
index 47a5dd8..878b886 100644
--- a/data/5.12/5.12_security.txt
+++ b/data/5.12/5.12_security.txt
@@ -261,19 +261,18 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect 
   CVE-2022-1651: (unk) virt: acrn: fix a memory leak in acrn_dev_ioctl() 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
   CVE-2022-1671: (unk) rxrpc: fix some null-ptr-deref bugs in server_key.c 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
   CVE-2022-1852: (unk) KVM: x86: avoid calling x86 emulator without a decoded instruction 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -303,6 +302,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2380: (unk) video: fbdev: sm712fb: Fix crash in smtcfb_read() 
@@ -312,11 +312,12 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
@@ -330,6 +331,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
diff --git a/data/5.13/5.13_CVEs.txt b/data/5.13/5.13_CVEs.txt
index 8a38cae..8ce6100 100644
--- a/data/5.13/5.13_CVEs.txt
+++ b/data/5.13/5.13_CVEs.txt
@@ -192,19 +192,18 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fix not seen in stream
 CVE-2022-1651: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
 CVE-2022-1671: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
 CVE-2022-1852: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -234,6 +233,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2380: Fix not seen in stream
@@ -243,11 +243,12 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-25636: Fix not seen in stream
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
@@ -262,6 +263,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29156: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
diff --git a/data/5.13/5.13_security.txt b/data/5.13/5.13_security.txt
index 7342f93..13cd1bc 100644
--- a/data/5.13/5.13_security.txt
+++ b/data/5.13/5.13_security.txt
@@ -225,19 +225,18 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect 
   CVE-2022-1651: (unk) virt: acrn: fix a memory leak in acrn_dev_ioctl() 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
   CVE-2022-1671: (unk) rxrpc: fix some null-ptr-deref bugs in server_key.c 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
   CVE-2022-1852: (unk) KVM: x86: avoid calling x86 emulator without a decoded instruction 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -266,6 +265,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2380: (unk) video: fbdev: sm712fb: Fix crash in smtcfb_read() 
@@ -275,11 +275,12 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
@@ -294,6 +295,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
diff --git a/data/5.14/5.14_CVEs.txt b/data/5.14/5.14_CVEs.txt
index 144014a..f2dd816 100644
--- a/data/5.14/5.14_CVEs.txt
+++ b/data/5.14/5.14_CVEs.txt
@@ -164,19 +164,18 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fix not seen in stream
 CVE-2022-1651: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
 CVE-2022-1671: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
 CVE-2022-1852: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -206,6 +205,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2380: Fix not seen in stream
@@ -216,11 +216,12 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-25636: Fix not seen in stream
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
@@ -235,6 +236,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29156: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
diff --git a/data/5.14/5.14_security.txt b/data/5.14/5.14_security.txt
index d6b9a26..b5c02e5 100644
--- a/data/5.14/5.14_security.txt
+++ b/data/5.14/5.14_security.txt
@@ -200,19 +200,18 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect 
   CVE-2022-1651: (unk) virt: acrn: fix a memory leak in acrn_dev_ioctl() 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
   CVE-2022-1671: (unk) rxrpc: fix some null-ptr-deref bugs in server_key.c 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
   CVE-2022-1852: (unk) KVM: x86: avoid calling x86 emulator without a decoded instruction 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -240,6 +239,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2380: (unk) video: fbdev: sm712fb: Fix crash in smtcfb_read() 
@@ -250,11 +250,12 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
@@ -269,6 +270,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt
index f612c37..9f8ea62 100644
--- a/data/5.15/5.15_CVEs.txt
+++ b/data/5.15/5.15_CVEs.txt
@@ -131,18 +131,17 @@
 CVE-2022-1247: Fix unknown
 CVE-2022-1263: Fixed with 5.15.34
 CVE-2022-1353: Fixed with 5.15.33
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fixed with 5.15.58
 CVE-2022-1516: Fixed with 5.15.33
 CVE-2022-1651: Fixed with 5.15.33
 CVE-2022-1652: Fixed with 5.15.42
 CVE-2022-1671: Fixed with 5.15.33
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fixed with 5.15.61
 CVE-2022-1729: Fixed with 5.15.42
 CVE-2022-1734: Fixed with 5.15.39
 CVE-2022-1789: Fixed with 5.15.44
 CVE-2022-1836: Fixed with 5.15.37
 CVE-2022-1852: Fixed with 5.15.45
-CVE-2022-1882: Fix unknown
 CVE-2022-1943: Fixed with 5.15.40
 CVE-2022-1966: Fixed with 5.15.45
 CVE-2022-1972: Fixed with 5.15.45
@@ -173,6 +172,7 @@
 CVE-2022-23040: Fixed with 5.15.28
 CVE-2022-23041: Fixed with 5.15.28
 CVE-2022-23042: Fixed with 5.15.28
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fixed with 5.15.53
 CVE-2022-23222: Fixed with 5.15.37
 CVE-2022-2380: Fixed with 5.15.33
@@ -183,13 +183,14 @@
 CVE-2022-24448: Fixed with 5.15.19
 CVE-2022-24958: Fixed with 5.15.27
 CVE-2022-24959: Fixed with 5.15.19
+CVE-2022-2503: Fixed with 5.15.45
 CVE-2022-25258: Fixed with 5.15.24
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fixed with 5.15.24
 CVE-2022-25636: Fixed with 5.15.26
-CVE-2022-2585: Fix unknown
-CVE-2022-2586: Fix not seen in stream
-CVE-2022-2588: Fix not seen in stream
+CVE-2022-2585: Fixed with 5.15.61
+CVE-2022-2586: Fixed with 5.15.61
+CVE-2022-2588: Fixed with 5.15.61
 CVE-2022-26365: Fixed with 5.15.53
 CVE-2022-26373: Fixed with 5.15.60
 CVE-2022-2639: Fixed with 5.15.36
@@ -203,6 +204,7 @@
 CVE-2022-28388: Fixed with 5.15.33
 CVE-2022-28389: Fixed with 5.15.33
 CVE-2022-28390: Fixed with 5.15.33
+CVE-2022-2873: Fixed with 5.15.45
 CVE-2022-28893: Fixed with 5.15.41
 CVE-2022-29156: Fixed with 5.15.26
 CVE-2022-29581: Fixed with 5.15.36
diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt
index 1c942fa..e678be9 100644
--- a/data/5.15/5.15_security.txt
+++ b/data/5.15/5.15_security.txt
@@ -196,6 +196,8 @@
   CVE-2022-1966: f692bcffd1f2ce5488d24fbcb8eab5f351abf79d netfilter: nf_tables: disallow non-stateful expression in sets earlier
   CVE-2022-1972: 89ef50fe03a55feccf5681c237673a2f98161161 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
   CVE-2022-2078: 89ef50fe03a55feccf5681c237673a2f98161161 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
+  CVE-2022-2503: 69712b170237ec5979f168149cd31e851a465853 dm verity: set DM_TARGET_IMMUTABLE feature flag
+  CVE-2022-2873: 24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-32250: f692bcffd1f2ce5488d24fbcb8eab5f351abf79d netfilter: nf_tables: disallow non-stateful expression in sets earlier
 
 CVEs fixed in 5.15.46:
@@ -233,6 +235,7 @@
   CVE-2022-29901: ccb25d7db1a29bc251692be745b000e6f0754048 x86/kvm/vmx: Make noinstr clean
 
 CVEs fixed in 5.15.58:
+  CVE-2022-1462: b2d1e4cd558cffec6bfe318f5d74e6cffc374d29 tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
   CVE-2022-21505: 0e66932a9dc9ba47e60405b392e3782a332bc44e lockdown: Fix kexec lockdown bypass with ima policy
   CVE-2022-36879: c8e32bca0676ac663266a3b16562cb017300adcd xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
 
@@ -242,6 +245,12 @@
 CVEs fixed in 5.15.60:
   CVE-2022-26373: 7fcd99e889c0634f8275ae7a6b06aec4a22c8715 x86/speculation: Add RSB VM Exit protections
 
+CVEs fixed in 5.15.61:
+  CVE-2022-1679: 03ca957c5f7b55660957eda20b5db4110319ac7a ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
+  CVE-2022-2585: 9e255ed238fc67058df87b0388ad6d4b2ef3a2bd posix-cpu-timers: Cleanup CPU timers before freeing them during exec
+  CVE-2022-2586: faafd9286f1355c76fe9ac3021c280297213330e netfilter: nf_tables: do not allow SET_ID to refer to another table
+  CVE-2022-2588: 57bbb691a93bd39d0644c5c879b354232d0e0eed net_sched: cls_route: remove from list when handle is 0
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -307,15 +316,10 @@
   CVE-2022-0998: (unk) vdpa: clean up get_config_size ret value handling 
   CVE-2022-1116: (unk)  
   CVE-2022-1247: (unk)  
-  CVE-2022-1462: (unk)  
-  CVE-2022-1679: (unk)  
-  CVE-2022-1882: (unk)  
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-23816: (unk)  
   CVE-2022-23825: (unk)  
   CVE-2022-24122: (unk) ucount:  Make get_ucount a safe get_user replacement 
   CVE-2022-25265: (unk)  
-  CVE-2022-2585: (unk)  
-  CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
-  CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26878: (unk)  
diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt
index 4694324..47ce6d2 100644
--- a/data/5.16/5.16_CVEs.txt
+++ b/data/5.16/5.16_CVEs.txt
@@ -100,18 +100,17 @@
 CVE-2022-1247: Fix unknown
 CVE-2022-1263: Fixed with 5.16.20
 CVE-2022-1353: Fixed with 5.16.19
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1516: Fixed with 5.16.19
 CVE-2022-1651: Fixed with 5.16.19
 CVE-2022-1652: Fix not seen in stream
 CVE-2022-1671: Fixed with 5.16.19
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
 CVE-2022-1852: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1943: Fix not seen in stream
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
@@ -139,6 +138,7 @@
 CVE-2022-23040: Fixed with 5.16.14
 CVE-2022-23041: Fixed with 5.16.14
 CVE-2022-23042: Fixed with 5.16.14
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fixed with 5.16.11
 CVE-2022-2380: Fixed with 5.16.19
@@ -149,11 +149,12 @@
 CVE-2022-24448: Fixed with 5.16.5
 CVE-2022-24958: Fixed with 5.16.13
 CVE-2022-24959: Fixed with 5.16.5
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fixed with 5.16.10
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fixed with 5.16.10
 CVE-2022-25636: Fixed with 5.16.12
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-2590: Fix unknown
@@ -170,6 +171,7 @@
 CVE-2022-28388: Fixed with 5.16.19
 CVE-2022-28389: Fixed with 5.16.19
 CVE-2022-28390: Fixed with 5.16.19
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fixed with 5.16.20
 CVE-2022-29156: Fixed with 5.16.12
 CVE-2022-29581: Fix not seen in stream
diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt
index d865699..c6b5309 100644
--- a/data/5.16/5.16_security.txt
+++ b/data/5.16/5.16_security.txt
@@ -175,15 +175,14 @@
   CVE-2022-1184: (unk) ext4: verify dir block before splitting it 
   CVE-2022-1204: (unk) ax25: Fix refcount leaks caused by ax25_cb_del() 
   CVE-2022-1247: (unk)  
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
   CVE-2022-1852: (unk) KVM: x86: avoid calling x86 emulator without a decoded instruction 
-  CVE-2022-1882: (unk)  
   CVE-2022-1943: (unk) udf: Avoid using stale lengthOfImpUse 
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
@@ -197,12 +196,14 @@
   CVE-2022-21499: (unk) lockdown: also lock down previous kgdb use 
   CVE-2022-21505: (unk) lockdown: Fix kexec lockdown bypass with ima policy 
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23816: (unk)  
   CVE-2022-23825: (unk)  
   CVE-2022-24122: (unk) ucount:  Make get_ucount a safe get_user replacement 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25265: (unk)  
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-2590: (unk)  
@@ -210,6 +211,7 @@
   CVE-2022-26373: (unk) x86/speculation: Add RSB VM Exit protections 
   CVE-2022-2639: (unk) openvswitch: fix OOB access in reserve_sfa_size() 
   CVE-2022-26878: (unk)  
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt
index 819d7cf..5f097a7 100644
--- a/data/5.17/5.17_CVEs.txt
+++ b/data/5.17/5.17_CVEs.txt
@@ -71,18 +71,18 @@
 CVE-2022-1247: Fix unknown
 CVE-2022-1263: Fixed with 5.17.3
 CVE-2022-1353: Fixed with 5.17
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1516: Fixed with 5.17.2
 CVE-2022-1651: Fixed with 5.17.2
 CVE-2022-1652: Fixed with 5.17.10
 CVE-2022-1671: Fixed with 5.17.2
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fixed with 5.17.10
 CVE-2022-1734: Fixed with 5.17.7
 CVE-2022-1789: Fixed with 5.17.12
 CVE-2022-1836: Fixed with 5.17.6
 CVE-2022-1852: Fixed with 5.17.13
-CVE-2022-1882: Fix unknown
+CVE-2022-1882: Fix not seen in stream
 CVE-2022-1943: Fixed with 5.17.8
 CVE-2022-1966: Fixed with 5.17.13
 CVE-2022-1972: Fixed with 5.17.13
@@ -100,12 +100,14 @@
 CVE-2022-21505: Fix not seen in stream
 CVE-2022-2153: Fixed with 5.17.2
 CVE-2022-2209: Fix unknown
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-2380: Fixed with 5.17.2
 CVE-2022-23816: Fix unknown
 CVE-2022-23825: Fix unknown
+CVE-2022-2503: Fixed with 5.17.13
 CVE-2022-25265: Fix unknown
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-2590: Fix unknown
@@ -117,6 +119,7 @@
 CVE-2022-28388: Fixed with 5.17.2
 CVE-2022-28389: Fixed with 5.17.2
 CVE-2022-28390: Fixed with 5.17.2
+CVE-2022-2873: Fixed with 5.17.13
 CVE-2022-28796: Fixed with 5.17.1
 CVE-2022-28893: Fixed with 5.17.3
 CVE-2022-29581: Fixed with 5.17.5
diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt
index 017b0b4..6df9e3d 100644
--- a/data/5.17/5.17_security.txt
+++ b/data/5.17/5.17_security.txt
@@ -66,6 +66,8 @@
   CVE-2022-1966: d8db0465bcc4d4b54ecfb67b820ed26eb1440da7 netfilter: nf_tables: disallow non-stateful expression in sets earlier
   CVE-2022-1972: c88f3e3d243d701586239c5b69356ec2b1fd05f1 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
   CVE-2022-2078: c88f3e3d243d701586239c5b69356ec2b1fd05f1 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
+  CVE-2022-2503: a40560bbf6228ecf754d45aa7b1c50b488fed519 dm verity: set DM_TARGET_IMMUTABLE feature flag
+  CVE-2022-2873: fc2f9ee7568609adb68b1f55f0a4c182b09a47e7 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-32250: d8db0465bcc4d4b54ecfb67b820ed26eb1440da7 netfilter: nf_tables: disallow non-stateful expression in sets earlier
 
 CVEs fixed in 5.17.14:
@@ -140,19 +142,20 @@
   CVE-2022-0400: (unk)  
   CVE-2022-1116: (unk)  
   CVE-2022-1247: (unk)  
-  CVE-2022-1462: (unk)  
-  CVE-2022-1679: (unk)  
-  CVE-2022-1882: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
+  CVE-2022-1882: (unk) watchqueue: make sure to serialize 'wqueue->defunct' properly 
   CVE-2022-21123: (unk) x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data 
   CVE-2022-21125: (unk) x86/speculation/mmio: Reuse SRBDS mitigation for SBDS 
   CVE-2022-21166: (unk) x86/speculation/mmio: Enable CPU Fill buffer clearing on idle 
   CVE-2022-21505: (unk) lockdown: Fix kexec lockdown bypass with ima policy 
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23816: (unk)  
   CVE-2022-23825: (unk)  
   CVE-2022-25265: (unk)  
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-2590: (unk)  
diff --git a/data/5.18/5.18_CVEs.txt b/data/5.18/5.18_CVEs.txt
index d3360bb..f730bac 100644
--- a/data/5.18/5.18_CVEs.txt
+++ b/data/5.18/5.18_CVEs.txt
@@ -59,12 +59,12 @@
 CVE-2022-1116: Fix unknown
 CVE-2022-1184: Fixed with 5.18.3
 CVE-2022-1247: Fix unknown
-CVE-2022-1462: Fix unknown
-CVE-2022-1679: Fix unknown
+CVE-2022-1462: Fixed with 5.18.13
+CVE-2022-1679: Fixed with 5.18.18
 CVE-2022-1729: Fixed with 5.18
 CVE-2022-1789: Fixed with 5.18
 CVE-2022-1852: Fixed with 5.18.2
-CVE-2022-1882: Fix unknown
+CVE-2022-1882: Fixed with 5.18.15
 CVE-2022-1966: Fixed with 5.18.2
 CVE-2022-1972: Fixed with 5.18.2
 CVE-2022-1973: Fixed with 5.18.3
@@ -76,17 +76,20 @@
 CVE-2022-21499: Fixed with 5.18.1
 CVE-2022-21505: Fixed with 5.18.15
 CVE-2022-2209: Fix unknown
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fixed with 5.18.10
 CVE-2022-23816: Fix unknown
 CVE-2022-23825: Fix unknown
+CVE-2022-2503: Fixed with 5.18.2
 CVE-2022-25265: Fix unknown
-CVE-2022-2585: Fix unknown
-CVE-2022-2586: Fix not seen in stream
-CVE-2022-2588: Fix not seen in stream
+CVE-2022-2585: Fixed with 5.18.18
+CVE-2022-2586: Fixed with 5.18.18
+CVE-2022-2588: Fixed with 5.18.18
 CVE-2022-2590: Fix unknown
 CVE-2022-26365: Fixed with 5.18.10
 CVE-2022-26373: Fixed with 5.18.17
 CVE-2022-26878: Fix unknown
+CVE-2022-2873: Fixed with 5.18.2
 CVE-2022-29900: Fixed with 5.18.14
 CVE-2022-29901: Fixed with 5.18.14
 CVE-2022-32250: Fixed with 5.18.2
diff --git a/data/5.18/5.18_security.txt b/data/5.18/5.18_security.txt
index 1664505..8221f17 100644
--- a/data/5.18/5.18_security.txt
+++ b/data/5.18/5.18_security.txt
@@ -11,6 +11,8 @@
   CVE-2022-1966: 8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0 netfilter: nf_tables: disallow non-stateful expression in sets earlier
   CVE-2022-1972: c9a46a3d549286861259c19af4747e12cfaeece9 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
   CVE-2022-2078: c9a46a3d549286861259c19af4747e12cfaeece9 netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
+  CVE-2022-2503: 417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9 dm verity: set DM_TARGET_IMMUTABLE feature flag
+  CVE-2022-2873: 2a81133304e8c10e6afa03e59f1b11beaccc7153 i2c: ismt: prevent memory corruption in ismt_access()
   CVE-2022-32250: 8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0 netfilter: nf_tables: disallow non-stateful expression in sets earlier
 
 CVEs fixed in 5.18.3:
@@ -44,6 +46,7 @@
   CVE-2022-34918: 6b7488071ea8ed6265a39afebd5a5920f6975d02 netfilter: nf_tables: stricter validation of element data
 
 CVEs fixed in 5.18.13:
+  CVE-2022-1462: fa3302714c03e4e6c9b5aad5dacae33e75f76cf7 tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
   CVE-2022-36123: 2334bdfc2da469c9807767002a2831274b82c39a x86: Clear .brk area at early boot
 
 CVEs fixed in 5.18.14:
@@ -51,6 +54,7 @@
   CVE-2022-29901: e492002673b03c636d2297fb869d68ae545c41c4 x86/kvm/vmx: Make noinstr clean
 
 CVEs fixed in 5.18.15:
+  CVE-2022-1882: 49cbb4820e4f1895130755732485afb2d18508f9 watchqueue: make sure to serialize 'wqueue->defunct' properly
   CVE-2022-21505: f67ff524f283183c52d2575b11beec00cc4d5092 lockdown: Fix kexec lockdown bypass with ima policy
   CVE-2022-36879: 70f5e35cd5e38017653ed1ca0f7a4ab6d5c5a794 xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
 
@@ -60,6 +64,12 @@
 CVEs fixed in 5.18.17:
   CVE-2022-26373: 0abdbbd9ae9c81615836278d787a8c8dcd576c36 x86/speculation: Add RSB VM Exit protections
 
+CVEs fixed in 5.18.18:
+  CVE-2022-1679: 6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6 ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
+  CVE-2022-2585: e8cb6e8fd9890780f1bfcf5592889e1b879e779c posix-cpu-timers: Cleanup CPU timers before freeing them during exec
+  CVE-2022-2586: f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f netfilter: nf_tables: do not allow SET_ID to refer to another table
+  CVE-2022-2588: e832c26e7edfa2ddbd2dcdd48016d13d747de6da net_sched: cls_route: remove from list when handle is 0
+
 Outstanding CVEs:
   CVE-2005-3660: (unk)  
   CVE-2007-3719: (unk)  
@@ -120,15 +130,10 @@
   CVE-2022-0400: (unk)  
   CVE-2022-1116: (unk)  
   CVE-2022-1247: (unk)  
-  CVE-2022-1462: (unk)  
-  CVE-2022-1679: (unk)  
-  CVE-2022-1882: (unk)  
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-23816: (unk)  
   CVE-2022-23825: (unk)  
   CVE-2022-25265: (unk)  
-  CVE-2022-2585: (unk)  
-  CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
-  CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-2590: (unk)  
   CVE-2022-26878: (unk)  
diff --git a/data/5.2/5.2_CVEs.txt b/data/5.2/5.2_CVEs.txt
index 0fb8236..59be9ca 100644
--- a/data/5.2/5.2_CVEs.txt
+++ b/data/5.2/5.2_CVEs.txt
@@ -544,16 +544,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -580,6 +579,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -590,6 +590,7 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -606,6 +607,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
diff --git a/data/5.2/5.2_security.txt b/data/5.2/5.2_security.txt
index 4131535..9c32ee0 100644
--- a/data/5.2/5.2_security.txt
+++ b/data/5.2/5.2_security.txt
@@ -582,16 +582,15 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -618,6 +617,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -628,6 +628,7 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -644,6 +645,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/5.3/5.3_CVEs.txt b/data/5.3/5.3_CVEs.txt
index cd73d99..85c570a 100644
--- a/data/5.3/5.3_CVEs.txt
+++ b/data/5.3/5.3_CVEs.txt
@@ -516,16 +516,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -552,6 +551,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -562,6 +562,7 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -578,6 +579,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29900: Fix not seen in stream
diff --git a/data/5.3/5.3_security.txt b/data/5.3/5.3_security.txt
index ce3775a..779cd3b 100644
--- a/data/5.3/5.3_security.txt
+++ b/data/5.3/5.3_security.txt
@@ -552,16 +552,15 @@
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
   CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -588,6 +587,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -598,6 +598,7 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -614,6 +615,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt
index 492f62d..0bb9012 100644
--- a/data/5.4/5.4_CVEs.txt
+++ b/data/5.4/5.4_CVEs.txt
@@ -442,16 +442,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fixed with 5.4.189
 CVE-2022-1419: Fixed with 5.4.21
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fixed with 5.4.208
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fixed with 5.4.196
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fixed with 5.4.196
 CVE-2022-1734: Fixed with 5.4.193
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fixed with 5.4.192
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fixed with 5.4.198
 CVE-2022-1974: Fixed with 5.4.193
 CVE-2022-1975: Fixed with 5.4.193
@@ -479,6 +478,7 @@
 CVE-2022-23040: Fixed with 5.4.184
 CVE-2022-23041: Fixed with 5.4.184
 CVE-2022-23042: Fixed with 5.4.184
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fixed with 5.4.204
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -489,6 +489,7 @@
 CVE-2022-24448: Fixed with 5.4.176
 CVE-2022-24958: Fixed with 5.4.183
 CVE-2022-24959: Fixed with 5.4.176
+CVE-2022-2503: Fixed with 5.4.197
 CVE-2022-25258: Fixed with 5.4.180
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fixed with 5.4.180
@@ -506,6 +507,7 @@
 CVE-2022-28388: Fixed with 5.4.191
 CVE-2022-28389: Fixed with 5.4.189
 CVE-2022-28390: Fixed with 5.4.189
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fixed with 5.4.196
 CVE-2022-29581: Fixed with 5.4.191
 CVE-2022-29900: Fix not seen in stream
diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt
index 91322c6..f37d525 100644
--- a/data/5.4/5.4_security.txt
+++ b/data/5.4/5.4_security.txt
@@ -685,6 +685,7 @@
 CVEs fixed in 5.4.197:
   CVE-2022-1012: ab5b00cfe0500f5f5a3648ca945b892156b839fb secure_seq: use the 64 bits of the siphash for port offset calculation
   CVE-2022-21499: 8bb828229da903bb5710d21065e0a29f9afd30e0 lockdown: also lock down previous kgdb use
+  CVE-2022-2503: fd2f7e9984850a0162bfb6948b98ffac9fb5fa58 dm verity: set DM_TARGET_IMMUTABLE feature flag
 
 CVEs fixed in 5.4.198:
   CVE-2022-1184: 17034d45ec443fb0e3c0e7297f9cd10f70446064 ext4: verify dir block before splitting it
@@ -718,6 +719,7 @@
   CVE-2022-36123: a3c7c1a726a4c6b63b85e8c183f207543fd75e1b x86: Clear .brk area at early boot
 
 CVEs fixed in 5.4.208:
+  CVE-2022-1462: f7785092cb7f022f59ebdaa181651f7c877df132 tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
   CVE-2022-21505: ed3fea55066b4e054c4d212e54f9965abcac9685 lockdown: Fix kexec lockdown bypass with ima policy
   CVE-2022-36879: f4248bdb7d5c1150a2a6f8c3d3b6da0b71f62a20 xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
 
@@ -821,16 +823,15 @@
   CVE-2022-1247: (unk)  
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
-  CVE-2022-1462: (unk)  
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
-  CVE-2022-1882: (unk)  
   CVE-2022-20148: (unk) f2fs: fix UAF in f2fs_available_free_memory 
   CVE-2022-20166: (unk) drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions 
   CVE-2022-2153: (unk) KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 
   CVE-2022-2209: (unk)  
+  CVE-2022-2308: (unk)  
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
   CVE-2022-23816: (unk)  
@@ -838,6 +839,7 @@
   CVE-2022-25265: (unk)  
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-29900: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-29901: (unk) x86/kvm/vmx: Make noinstr clean 
   CVE-2022-34918: (unk) netfilter: nf_tables: stricter validation of element data 
diff --git a/data/5.5/5.5_CVEs.txt b/data/5.5/5.5_CVEs.txt
index 20f01a3..eafba31 100644
--- a/data/5.5/5.5_CVEs.txt
+++ b/data/5.5/5.5_CVEs.txt
@@ -400,16 +400,15 @@
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
 CVE-2022-1419: Fixed with 5.5.5
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
 CVE-2022-1975: Fix not seen in stream
@@ -437,6 +436,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -447,6 +447,7 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -464,6 +465,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29582: Fix not seen in stream
diff --git a/data/5.5/5.5_security.txt b/data/5.5/5.5_security.txt
index 2658d9d..121accd 100644
--- a/data/5.5/5.5_security.txt
+++ b/data/5.5/5.5_security.txt
@@ -434,16 +434,15 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
   CVE-2022-1975: (unk) NFC: netlink: fix sleep in atomic bug when firmware download timeout 
@@ -471,6 +470,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -481,6 +481,7 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -498,6 +499,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal 
diff --git a/data/5.6/5.6_CVEs.txt b/data/5.6/5.6_CVEs.txt
index eeda778..5e47a8c 100644
--- a/data/5.6/5.6_CVEs.txt
+++ b/data/5.6/5.6_CVEs.txt
@@ -373,16 +373,15 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -412,6 +411,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -422,6 +422,7 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
@@ -439,6 +440,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29582: Fix not seen in stream
diff --git a/data/5.6/5.6_security.txt b/data/5.6/5.6_security.txt
index 65bd7ef..200a6ff 100644
--- a/data/5.6/5.6_security.txt
+++ b/data/5.6/5.6_security.txt
@@ -407,16 +407,15 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -446,6 +445,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -456,6 +456,7 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
@@ -473,6 +474,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal 
diff --git a/data/5.7/5.7_CVEs.txt b/data/5.7/5.7_CVEs.txt
index cd2eb6b..f1cb19f 100644
--- a/data/5.7/5.7_CVEs.txt
+++ b/data/5.7/5.7_CVEs.txt
@@ -359,17 +359,16 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -399,6 +398,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -409,11 +409,12 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-25636: Fix not seen in stream
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
@@ -427,6 +428,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29582: Fix not seen in stream
diff --git a/data/5.7/5.7_security.txt b/data/5.7/5.7_security.txt
index afd17ff..7bfd198 100644
--- a/data/5.7/5.7_security.txt
+++ b/data/5.7/5.7_security.txt
@@ -393,17 +393,16 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -433,6 +432,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -443,11 +443,12 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
@@ -461,6 +462,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal 
diff --git a/data/5.8/5.8_CVEs.txt b/data/5.8/5.8_CVEs.txt
index bcc6036..910efe6 100644
--- a/data/5.8/5.8_CVEs.txt
+++ b/data/5.8/5.8_CVEs.txt
@@ -340,17 +340,16 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -380,6 +379,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -390,11 +390,12 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-25636: Fix not seen in stream
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
@@ -408,6 +409,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29582: Fix not seen in stream
diff --git a/data/5.8/5.8_security.txt b/data/5.8/5.8_security.txt
index 9dd4028..3c6a332 100644
--- a/data/5.8/5.8_security.txt
+++ b/data/5.8/5.8_security.txt
@@ -374,17 +374,16 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -414,6 +413,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -424,11 +424,12 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
@@ -442,6 +443,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal 
diff --git a/data/5.9/5.9_CVEs.txt b/data/5.9/5.9_CVEs.txt
index 1f52b2b..e150c5c 100644
--- a/data/5.9/5.9_CVEs.txt
+++ b/data/5.9/5.9_CVEs.txt
@@ -311,17 +311,16 @@
 CVE-2022-1263: Fix not seen in stream
 CVE-2022-1280: Fix not seen in stream
 CVE-2022-1353: Fix not seen in stream
-CVE-2022-1462: Fix unknown
+CVE-2022-1462: Fix not seen in stream
 CVE-2022-1508: Fix not seen in stream
 CVE-2022-1516: Fix not seen in stream
 CVE-2022-1652: Fix not seen in stream
-CVE-2022-1679: Fix unknown
+CVE-2022-1679: Fix not seen in stream
 CVE-2022-1729: Fix not seen in stream
 CVE-2022-1734: Fix not seen in stream
 CVE-2022-1786: Fix not seen in stream
 CVE-2022-1789: Fix not seen in stream
 CVE-2022-1836: Fix not seen in stream
-CVE-2022-1882: Fix unknown
 CVE-2022-1966: Fix not seen in stream
 CVE-2022-1972: Fix not seen in stream
 CVE-2022-1974: Fix not seen in stream
@@ -351,6 +350,7 @@
 CVE-2022-23040: Fix not seen in stream
 CVE-2022-23041: Fix not seen in stream
 CVE-2022-23042: Fix not seen in stream
+CVE-2022-2308: Fix unknown
 CVE-2022-2318: Fix not seen in stream
 CVE-2022-23222: Fix not seen in stream
 CVE-2022-2327: Fix not seen in stream
@@ -361,11 +361,12 @@
 CVE-2022-24448: Fix not seen in stream
 CVE-2022-24958: Fix not seen in stream
 CVE-2022-24959: Fix not seen in stream
+CVE-2022-2503: Fix not seen in stream
 CVE-2022-25258: Fix not seen in stream
 CVE-2022-25265: Fix unknown
 CVE-2022-25375: Fix not seen in stream
 CVE-2022-25636: Fix not seen in stream
-CVE-2022-2585: Fix unknown
+CVE-2022-2585: Fix not seen in stream
 CVE-2022-2586: Fix not seen in stream
 CVE-2022-2588: Fix not seen in stream
 CVE-2022-26365: Fix not seen in stream
@@ -379,6 +380,7 @@
 CVE-2022-28388: Fix not seen in stream
 CVE-2022-28389: Fix not seen in stream
 CVE-2022-28390: Fix not seen in stream
+CVE-2022-2873: Fix not seen in stream
 CVE-2022-28893: Fix not seen in stream
 CVE-2022-29581: Fix not seen in stream
 CVE-2022-29582: Fix not seen in stream
diff --git a/data/5.9/5.9_security.txt b/data/5.9/5.9_security.txt
index 7c51a70..da46f43 100644
--- a/data/5.9/5.9_security.txt
+++ b/data/5.9/5.9_security.txt
@@ -341,17 +341,16 @@
   CVE-2022-1263: (unk) KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 
   CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector 
   CVE-2022-1353: (unk) af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register 
-  CVE-2022-1462: (unk)  
+  CVE-2022-1462: (unk) tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() 
   CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters 
   CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect 
   CVE-2022-1652: (unk) floppy: use a statically allocated error counter 
-  CVE-2022-1679: (unk)  
+  CVE-2022-1679: (unk) ath9k: fix use-after-free in ath9k_hif_usb_rx_cb 
   CVE-2022-1729: (unk) perf: Fix sys_perf_event_open() race against self 
   CVE-2022-1734: (unk) nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs 
   CVE-2022-1786: (unk) io_uring: remove io_identity 
   CVE-2022-1789: (unk) KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 
   CVE-2022-1836: (unk) floppy: disable FDRAWCMD by default 
-  CVE-2022-1882: (unk)  
   CVE-2022-1966: (unk) netfilter: nf_tables: disallow non-stateful expression in sets earlier 
   CVE-2022-1972: (unk) netfilter: nf_tables: sanitize nft_set_desc_concat_parse() 
   CVE-2022-1974: (unk) nfc: replace improper check device_is_registered() in netlink related functions 
@@ -381,6 +380,7 @@
   CVE-2022-23040: (unk) xen/xenbus: don't let xenbus_grant_ring() remove grants in error case 
   CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact() 
   CVE-2022-23042: (unk) xen/netfront: react properly to failing gnttab_end_foreign_access_ref() 
+  CVE-2022-2308: (unk)  
   CVE-2022-2318: (unk) net: rose: fix UAF bugs caused by timer handler 
   CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL 
   CVE-2022-2327: (unk) io_uring: remove any grabbing of context 
@@ -391,11 +391,12 @@
   CVE-2022-24448: (unk) NFSv4: Handle case where the lookup of a directory fails 
   CVE-2022-24958: (unk) usb: gadget: don't release an existing dev->buf 
   CVE-2022-24959: (unk) yam: fix a memory leak in yam_siocdevprivate() 
+  CVE-2022-2503: (unk) dm verity: set DM_TARGET_IMMUTABLE feature flag 
   CVE-2022-25258: (unk) USB: gadget: validate interface OS descriptor requests 
   CVE-2022-25265: (unk)  
   CVE-2022-25375: (unk) usb: gadget: rndis: check size of RNDIS_MSG_SET command 
   CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size 
-  CVE-2022-2585: (unk)  
+  CVE-2022-2585: (unk) posix-cpu-timers: Cleanup CPU timers before freeing them during exec 
   CVE-2022-2586: (unk) netfilter: nf_tables: do not allow SET_ID to refer to another table 
   CVE-2022-2588: (unk) net_sched: cls_route: remove from list when handle is 0 
   CVE-2022-26365: (unk) xen/blkfront: fix leaking data in shared pages 
@@ -409,6 +410,7 @@
   CVE-2022-28388: (unk) can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path 
   CVE-2022-28389: (unk) can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path 
   CVE-2022-28390: (unk) can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path 
+  CVE-2022-2873: (unk) i2c: ismt: prevent memory corruption in ismt_access() 
   CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() 
   CVE-2022-29581: (unk) net/sched: cls_u32: fix netns refcount changes in u32_change() 
   CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal 
diff --git a/data/CVEs.txt b/data/CVEs.txt
index 51f105f..ef793e3 100644
--- a/data/CVEs.txt
+++ b/data/CVEs.txt
@@ -1825,7 +1825,7 @@
 CVE-2021-3348: 9561a7ade0c205bc2ee035a2ac880478dcc1a024 - b98e762e3d71e893b221f871825dc64694cfb258 (v4.10-rc1 to v5.11-rc6)
 CVE-2021-33624: b2157399cc9898260d6031c5bfe45fe137c1fbe7 - d203b0fd863a2261e5d00b97f3d060c4c2a6db71 (v4.15-rc8 to v5.13-rc7)
 CVE-2021-33655: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 65a01e601dbba8b7a51a2677811f70f783766682 (v2.6.12-rc2 to v5.19-rc6)
-CVE-2021-33656: (n/a) - ff2047fb755d4415ec3c70ac799889371151796d (unk to v5.12-rc1-dontuse)
+CVE-2021-33656: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - ff2047fb755d4415ec3c70ac799889371151796d (v2.6.12-rc2 to v5.12-rc1-dontuse)
 CVE-2021-33909: 058504edd02667eef8fac9be27ab3ea74332e9b4 - 8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b (v3.16-rc4 to v5.14-rc3)
 CVE-2021-3411: 7705dc8557973d8ad8f10840f61d8ec805695e9e - 0d07c0ec4381f630c801539c79ad8dcc627f6e4a (v5.5-rc1 to v5.10)
 CVE-2021-3428: 0a944e8a6c66ca04c7afbaa17e22bf208a8b37f0 - d176b1f62f242ab259ff665a26fbac69db1aecba (v5.2-rc2 to v5.9-rc2)
@@ -2006,21 +2006,21 @@
 CVE-2022-1280: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 869e76f7a918f010bd4518d58886969b1f642a04 (v2.6.12-rc2 to v5.15-rc1)
 CVE-2022-1353: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9a564bccb78a76740ea9d75a259942df8143d02c (v2.6.12-rc2 to v5.17)
 CVE-2022-1419: 502e95c6678505474f1056480310cd9382bacbac - 4b848f20eda5974020f043ca14bacf7a7e634fc8 (v4.1-rc1 to v5.6-rc2)
-CVE-2022-1462: (n/a) - (n/a) (unk to unk)
+CVE-2022-1462: (n/a) - a501ab75e7624d133a5a3c7ec010687c8b961d23 (unk to v5.19-rc7)
 CVE-2022-1508: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 89c2b3b74918200e46699338d7bcc19b1ea12110 (v2.6.12-rc2 to v5.15-rc1)
 CVE-2022-1516: 4becb7ee5b3d2829ed7b9261a245a77d5b7de902 - 7781607938c8371d4c2b243527430241c62e39c2 (v5.7-rc5 to v5.18-rc1)
 CVE-2022-1651: 9c5137aedd112f78a968bdd2325de2ea06df46c0 - ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b (v5.12-rc1-dontuse to v5.18-rc1)
 CVE-2022-1652: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - f71f01394f742fc4558b3f9f4c7ef4c4cf3b07c8 (v2.6.12-rc2 to v5.18-rc6)
 CVE-2022-1671: 12da59fcab5a05d01773e7cb413b8b8f3bb4e334 - ff8376ade4f668130385839cef586a0990f8ef87 (v5.11-rc1 to v5.18-rc1)
 CVE-2022-1678: 73a6bab5aa2a83cb7df85805e08bc03b4065aea7 - 864e5c090749448e879e86bec06ee396aa2c19c5 (v4.18-rc1 to v4.20-rc1)
-CVE-2022-1679: fb9987d0f748c983bb795a86f47522313f701a08 - (n/a) (v2.6.35-rc1 to unk)
+CVE-2022-1679: fb9987d0f748c983bb795a86f47522313f701a08 - 0ac4827f78c7ffe8eef074bc010e7e34bc22f533 (v2.6.35-rc1 to v6.0-rc1)
 CVE-2022-1729: f63a8daa5812afef4f06c962351687e1ff9ccb2b - 3ac6487e584a1eb54071dbe1212e05b884136704 (v4.0-rc1 to v5.18)
 CVE-2022-1734: 3194c6870158e305dac2af52f83681e9cb67280f - d270453a0d9ec10bb8a802a142fb1b3601a83098 (v4.4-rc1 to v5.18-rc6)
 CVE-2022-1786: 500a373d731ac506612db12631ec21295c1ff360 - 4379bf8bd70b5de6bba7d53015b0c36c57a634ee (v5.10-rc1 to v5.12-rc1-dontuse)
 CVE-2022-1789: eb4b248e152d3ecf189b9d32c04961360dbd938a - 9f46c187e2e680ecd9de7983e4d081c3391acc76 (v4.19-rc1 to v5.18)
 CVE-2022-1836: (n/a) - 233087ca063686964a53c829d547c7571e3f67bf (unk to v5.18-rc5)
 CVE-2022-1852: 4aa2691dcbd38ce1c461188799d863398dd2865d - fee060cd52d69c114b62d1a2948ea9648b5131f9 (v5.12-rc1-dontuse to v5.19-rc1)
-CVE-2022-1882: (n/a) - (n/a) (unk to unk)
+CVE-2022-1882: db8facfc9fafacefe8a835416a6b77c838088f8b - 353f7988dd8413c47718f7ca79c030b6fb62cfe5 (v5.17-rc8 to v5.19-rc8)
 CVE-2022-1943: 979a6e28dd969a2222545001f79566b4bfaf06c0 - c1ad35dd0548ce947d97aaf92f7f2f9a202951cf (v5.15-rc1 to v5.18-rc7)
 CVE-2022-1966: (n/a) - 520778042ccca019f3ffa136dd0ca565c486cedd (unk to v5.19-rc1)
 CVE-2022-1972: f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85 - fecf31ee395b0295f2d7260aa29946b7605f7c85 (v5.6-rc1 to v5.19-rc1)
@@ -2055,9 +2055,10 @@
 CVE-2022-23040: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 3777ea7bac3113005b7180e6b9dadf16d19a5827 (v2.6.12-rc2 to v5.17-rc8)
 CVE-2022-23041: 71ebd71921e451f0f942ddfe85d01e31ddc6eb88 - 5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd (v4.12-rc1 to v5.17-rc8)
 CVE-2022-23042: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 66e3531b33ee51dad17c463b4d9c9f52e341503d (v2.6.12-rc2 to v5.17-rc8)
+CVE-2022-2308: (n/a) - (n/a) (unk to unk)
 CVE-2022-2318: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9cc02ede696272c5271a401e4f27c262359bc2f6 (v2.6.12-rc2 to v5.19-rc5)
 CVE-2022-23222: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - c25b2ae136039ffa820c26138ed4a5e5f3ab3841 (v2.6.12-rc2 to v5.17-rc1)
-CVE-2022-2327: (n/a) - 44526bedc2ff8fcd58552e3c5bae928524b6f13c (unk to v5.12-rc1-dontuse)
+CVE-2022-2327: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 44526bedc2ff8fcd58552e3c5bae928524b6f13c (v2.6.12-rc2 to v5.12-rc1-dontuse)
 CVE-2022-2380: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8 (v2.6.12-rc2 to v5.18-rc1)
 CVE-2022-23816: (n/a) - (n/a) (unk to unk)
 CVE-2022-23825: (n/a) - (n/a) (unk to unk)
@@ -2066,11 +2067,12 @@
 CVE-2022-24448: 0dd2b474d0b69d58859399b1df7fdc699ea005d4 - ac795161c93699d600db16c1a8cc23a65a1eceaf (v3.6-rc1 to v5.17-rc2)
 CVE-2022-24958: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 89f3594d0de58e8a57d92d497dea9fee3d4b9cda (v2.6.12-rc2 to v5.17-rc1)
 CVE-2022-24959: 0781168e23a2fc8dceb989f11fc5b39b3ccacc35 - 29eb31542787e1019208a2e1047bb7c76c069536 (v4.19-rc7 to v5.17-rc2)
+CVE-2022-2503: (n/a) - 4caae58406f8ceb741603eee460d79bacca9b1b5 (unk to v5.19-rc1)
 CVE-2022-25258: 37a3a533429ef9b3cc9f15a656c19623f0e88df7 - 75e5b4849b81e19e9efe1654b30d7f3151c33c2c (v3.16-rc1 to v5.17-rc4)
 CVE-2022-25265: (n/a) - (n/a) (unk to unk)
 CVE-2022-25375: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 38ea1eac7d88072bbffb630e2b3db83ca649b826 (v2.6.12-rc2 to v5.17-rc4)
 CVE-2022-25636: be2861dc36d77ff3778979b9c3c79ada4affa131 - b1a5983f56e371046dcf164f90bfaf704d2b89f6 (v5.4-rc1 to v5.17-rc6)
-CVE-2022-2585: 55e8c8eb2c7b6bf30e99423ccfe7ca032f498f59 - (n/a) (v5.7-rc1 to unk)
+CVE-2022-2585: 55e8c8eb2c7b6bf30e99423ccfe7ca032f498f59 - e362359ace6f87c201531872486ff295df306d13 (v5.7-rc1 to v6.0-rc1)
 CVE-2022-2586: (n/a) - 470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 (unk to v6.0-rc1)
 CVE-2022-2588: (n/a) - 9ad36309e2719a884f946678e0296be10f0bb4c1 (unk to v6.0-rc1)
 CVE-2022-2590: 9ae0f87d009ca6c4aab2882641ddfc319727e3db - (n/a) (v5.16-rc1 to unk)
@@ -2087,6 +2089,7 @@
 CVE-2022-28388: 0024d8ad1639e32d717445c69ca813fd19c2a91c - 3d3925ff6433f98992685a9679613a2cc97f3ce2 (v3.9-rc1 to v5.18-rc1)
 CVE-2022-28389: 51f3baad7de943780ce0c17bd7975df567dd6e14 - 04c9b00ba83594a29813d6b1fb8fdc93a3915174 (v4.12-rc1 to v5.18-rc1)
 CVE-2022-28390: 702171adeed3607ee9603ec30ce081411e36ae42 - c70222752228a62135cee3409dccefd494a24646 (v2.6.32-rc1 to v5.18-rc1)
+CVE-2022-2873: (n/a) - 690b2549b19563ec5ad53e5c82f6a944d910086e (unk to v5.19-rc1)
 CVE-2022-28796: 4f98186848707f530669238d90e0562d92a78aab - cc16eecae687912238ee6efbff71ad31e2bc414e (v5.17-rc3 to v5.18-rc1)
 CVE-2022-28893: a73881c96d73ee72b7dbbd38a6eeef66182a8ef7 - f00432063db1a0db484e85193eccc6845435b80e (v5.1-rc1 to v5.18-rc2)
 CVE-2022-29156: eab098246625e91c1cbd6e8f75b09e4c9c28a9fc - 8700af2cc18c919b2a83e74e0479038fd113c15d (v5.12-rc1-dontuse to v5.17-rc6)
diff --git a/data/cmts.json b/data/cmts.json
index 635e25b..bd65611 100644
--- a/data/cmts.json
+++ b/data/cmts.json
@@ -112,6 +112,7 @@
     "0a9cd0a80ac559357c6a90d26c55270ed752aa26": "v3.12-rc2", 
     "0aaa81377c5a01f686bcdb8c7a6929a7bf330c68": "v5.0-rc3", 
     "0aaba41b58bc5f3074c0c0a6136b9500b5e29e19": "v4.15-rc1", 
+    "0ac4827f78c7ffe8eef074bc010e7e34bc22f533": "v6.0-rc1", 
     "0ace17d56824165c7f4c68785d6b58971db954dd": "v5.5", 
     "0ad646c81b2182f7fa67ec0c8c825e0ee165696d": "v4.14-rc6", 
     "0aea86a2176c22647a5b683768f858d880d5e05b": "v3.7-rc1", 
@@ -603,6 +604,7 @@
     "353050be4c19e102178ccc05988101887c25ae53": "v5.16-rc2", 
     "35306eb23814444bd4021f8a1c3047d3cb0c8b2b": "v5.15-rc4", 
     "353c0956a618a07ba4bbe7ad00ff29fe70e8412a": "v5.0-rc6", 
+    "353f7988dd8413c47718f7ca79c030b6fb62cfe5": "v5.19-rc8", 
     "35538d7822e86cb38015c21bb708a433f8814af0": "v4.9-rc1", 
     "35556bed836f8dc07ac55f69c8d17dce3e7f0e25": "v5.9-rc4", 
     "355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a": "v3.19-rc1", 
@@ -868,6 +870,7 @@
     "4c87308bdea31a7b4828a51f6156e6f721a1fcc9": "v3.6-rc7", 
     "4c8cf31885f69e86be0b5b9e6677a26797365e1d": "v5.7-rc1", 
     "4c905f6740a365464e91467aa50916555b28213d": "v5.18-rc1", 
+    "4caae58406f8ceb741603eee460d79bacca9b1b5": "v5.19-rc1", 
     "4cdf507d54525842dfd9f6313fdafba039084046": "v3.18-rc1", 
     "4ce001abafafe77e5dd943d1480fc9f87894e96f": "v2.6.32-rc1", 
     "4cf46b67eb6de94532c1bea11d2479d085229d0e": "v2.6.33-rc1", 
@@ -1175,6 +1178,7 @@
     "68e7e50f195f34d0d539282779cad073d999192b": "v4.15-rc1", 
     "68faa679b8be1a74e6663c21c3a9d25d32f1c079": "v5.5-rc6", 
     "68fda450a7df51cff9e5a4d4a4d9d0d5f2589153": "v4.15-rc9", 
+    "690b2549b19563ec5ad53e5c82f6a944d910086e": "v5.19-rc1", 
     "6934da9238da947628be83635e365df41064b09b": "v4.4-rc1", 
     "69664cf16af4f31cd54d77948a4baf9c7e0ca7b9": "v2.6.26-rc1", 
     "6994eefb0053799d2e07cd140df6c2ea106c41ee": "v5.2", 
@@ -1840,6 +1844,7 @@
     "a4aeaa06d45e90f9b279f0b09de84bd00006e733": "v5.15", 
     "a4b1b5877b514b276f0f31efe02388a9c2836728": "v3.14-rc4", 
     "a4f2473d39eb72915d37d65bdd8dd734c7ee4f8a": "v3.15-rc1", 
+    "a501ab75e7624d133a5a3c7ec010687c8b961d23": "v5.19-rc7", 
     "a50829479f58416a013a4ccca791336af3c584c7": "v4.14-rc7", 
     "a50e233c50dbc881abaa0e4070789064e8d12d70": "v3.15-rc1", 
     "a54988113985ca22e414e132054f234fc8a92604": "v5.3-rc1", 
@@ -2431,6 +2436,7 @@
     "db29a9508a9246e77087c5531e45b2c88ec6988b": "v3.18-rc1", 
     "db65a3aaf29ecce2e34271d52e8d2336b97bd9fe": "v4.3-rc7", 
     "db7bee653859ef7179be933e7d1384644f795f26": "v5.15-rc3", 
+    "db8facfc9fafacefe8a835416a6b77c838088f8b": "v5.17-rc8", 
     "db8fd2cde93227e566a412cf53173ffa227998bc": "v5.5-rc1", 
     "dbad75dd1f25e0107c643d42774a7f9a8ba85e9b": "v4.1-rc1", 
     "dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399": "v5.1", 
@@ -2500,6 +2506,7 @@
     "e3219ce6a775468368fb270fae3eb82a6787b436": "v4.6-rc1", 
     "e34438c903b653daca2b2a7de95aed46226f8ed3": "v4.19-rc1", 
     "e34ecee2ae791df674dfb466ce40692ca6218e43": "v3.13-rc1", 
+    "e362359ace6f87c201531872486ff295df306d13": "v6.0-rc1", 
     "e368fdb61d8e7c67ac70791b23345b26d7bbc661": "v4.20-rc1", 
     "e37e43a497d5a8b7c0cc1736d56986f432c394c9": "v4.9-rc1", 
     "e39d200fa5bf5b94a0948db0dae44c1b73b84a56": "v4.15-rc5", 
diff --git a/data/kernel_cves.json b/data/kernel_cves.json
index 5a1008c..b530415 100644
--- a/data/kernel_cves.json
+++ b/data/kernel_cves.json
@@ -63959,12 +63959,12 @@
         "last_modified": "2022-07-28"
     }, 
     "CVE-2021-33656": {
-        "affected_versions": "unk to v5.12-rc1-dontuse", 
-        "breaks": "", 
+        "affected_versions": "v2.6.12-rc2 to v5.12-rc1-dontuse", 
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", 
         "cmt_msg": "vt: drop old FONT ioctls", 
         "fixes": "ff2047fb755d4415ec3c70ac799889371151796d", 
         "last_affected_version": "5.10.126", 
-        "last_modified": "2022-07-20"
+        "last_modified": "2022-08-22"
     }, 
     "CVE-2021-33909": {
         "affected_versions": "v3.16-rc4 to v5.14-rc3", 
@@ -70203,8 +70203,9 @@
         }
     }, 
     "CVE-2022-1462": {
-        "affected_versions": "unk to unk", 
+        "affected_versions": "unk to v5.19-rc7", 
         "breaks": "", 
+        "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
         "cvss2": {
             "Access Complexity": "Medium", 
             "Access Vector": "Local Access", 
@@ -70228,8 +70229,9 @@
             "score": 6.3
         }, 
         "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", 
-        "fixes": "", 
-        "last_modified": "2022-06-12", 
+        "fixes": "a501ab75e7624d133a5a3c7ec010687c8b961d23", 
+        "last_affected_version": "5.18.12", 
+        "last_modified": "2022-08-22", 
         "nvd_text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", 
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1462", 
@@ -70409,8 +70411,9 @@
         }
     }, 
     "CVE-2022-1679": {
-        "affected_versions": "v2.6.35-rc1 to unk", 
+        "affected_versions": "v2.6.35-rc1 to v6.0-rc1", 
         "breaks": "fb9987d0f748c983bb795a86f47522313f701a08", 
+        "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", 
         "cvss2": {
             "Access Complexity": "Low", 
             "Access Vector": "Local Access", 
@@ -70434,8 +70437,9 @@
             "score": 7.8
         }, 
         "cwe": "Use After Free", 
-        "fixes": "", 
-        "last_modified": "2022-06-27", 
+        "fixes": "0ac4827f78c7ffe8eef074bc010e7e34bc22f533", 
+        "last_affected_version": "5.18.17", 
+        "last_modified": "2022-08-22", 
         "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", 
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1679", 
@@ -70643,8 +70647,9 @@
         }
     }, 
     "CVE-2022-1882": {
-        "affected_versions": "unk to unk", 
-        "breaks": "", 
+        "affected_versions": "v5.17-rc8 to v5.19-rc8", 
+        "breaks": "db8facfc9fafacefe8a835416a6b77c838088f8b", 
+        "cmt_msg": "watchqueue: make sure to serialize 'wqueue->defunct' properly", 
         "cvss2": {
             "Access Complexity": "Low", 
             "Access Vector": "Local Access", 
@@ -70668,8 +70673,9 @@
             "score": 7.8
         }, 
         "cwe": "Use After Free", 
-        "fixes": "", 
-        "last_modified": "2022-06-09", 
+        "fixes": "353f7988dd8413c47718f7ca79c030b6fb62cfe5", 
+        "last_affected_version": "5.18.14", 
+        "last_modified": "2022-08-22", 
         "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", 
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1882", 
@@ -71398,7 +71404,7 @@
         "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", 
         "fixes": "00b5f37189d24ac3ed46cb7f11742094778c46ce", 
         "last_affected_version": "5.17.1", 
-        "last_modified": "2022-06-27", 
+        "last_modified": "2022-08-22", 
         "ref_urls": {
             "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2153", 
             "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2153", 
@@ -71710,6 +71716,12 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2022-23042"
         }
     }, 
+    "CVE-2022-2308": {
+        "affected_versions": "unk to unk", 
+        "breaks": "", 
+        "fixes": "", 
+        "last_modified": "2022-08-22"
+    }, 
     "CVE-2022-2318": {
         "affected_versions": "v2.6.12-rc2 to v5.19-rc5", 
         "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", 
@@ -71791,11 +71803,11 @@
         }
     }, 
     "CVE-2022-2327": {
-        "affected_versions": "unk to v5.12-rc1-dontuse", 
-        "breaks": "", 
+        "affected_versions": "v2.6.12-rc2 to v5.12-rc1-dontuse", 
+        "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", 
         "cmt_msg": "io_uring: remove any grabbing of context", 
         "fixes": "44526bedc2ff8fcd58552e3c5bae928524b6f13c", 
-        "last_modified": "2022-08-04"
+        "last_modified": "2022-08-22"
     }, 
     "CVE-2022-2380": {
         "affected_versions": "v2.6.12-rc2 to v5.18-rc1", 
@@ -72042,6 +72054,14 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2022-24959"
         }
     }, 
+    "CVE-2022-2503": {
+        "affected_versions": "unk to v5.19-rc1", 
+        "breaks": "", 
+        "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+        "fixes": "4caae58406f8ceb741603eee460d79bacca9b1b5", 
+        "last_affected_version": "5.18.1", 
+        "last_modified": "2022-08-22"
+    }, 
     "CVE-2022-25258": {
         "affected_versions": "v3.16-rc1 to v5.17-rc4", 
         "breaks": "37a3a533429ef9b3cc9f15a656c19623f0e88df7", 
@@ -72201,24 +72221,28 @@
         }
     }, 
     "CVE-2022-2585": {
-        "affected_versions": "v5.7-rc1 to unk", 
+        "affected_versions": "v5.7-rc1 to v6.0-rc1", 
         "breaks": "55e8c8eb2c7b6bf30e99423ccfe7ca032f498f59", 
-        "fixes": "", 
-        "last_modified": "2022-08-12"
+        "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec", 
+        "fixes": "e362359ace6f87c201531872486ff295df306d13", 
+        "last_affected_version": "5.18.17", 
+        "last_modified": "2022-08-22"
     }, 
     "CVE-2022-2586": {
         "affected_versions": "unk to v6.0-rc1", 
         "breaks": "", 
         "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", 
         "fixes": "470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2", 
-        "last_modified": "2022-08-16"
+        "last_affected_version": "5.18.17", 
+        "last_modified": "2022-08-22"
     }, 
     "CVE-2022-2588": {
         "affected_versions": "unk to v6.0-rc1", 
         "breaks": "", 
         "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", 
         "fixes": "9ad36309e2719a884f946678e0296be10f0bb4c1", 
-        "last_modified": "2022-08-16"
+        "last_affected_version": "5.18.17", 
+        "last_modified": "2022-08-22"
     }, 
     "CVE-2022-2590": {
         "affected_versions": "v5.16-rc1 to unk", 
@@ -72680,6 +72704,14 @@
             "Ubuntu": "https://ubuntu.com/security/CVE-2022-28390"
         }
     }, 
+    "CVE-2022-2873": {
+        "affected_versions": "unk to v5.19-rc1", 
+        "breaks": "", 
+        "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+        "fixes": "690b2549b19563ec5ad53e5c82f6a944d910086e", 
+        "last_affected_version": "5.18.1", 
+        "last_modified": "2022-08-22"
+    }, 
     "CVE-2022-28796": {
         "affected_versions": "v5.17-rc3 to v5.18-rc1", 
         "breaks": "4f98186848707f530669238d90e0562d92a78aab", 
diff --git a/data/stream_data.json b/data/stream_data.json
index 134663f..b76d6d4 100644
--- a/data/stream_data.json
+++ b/data/stream_data.json
@@ -2174,6 +2174,9 @@
             "CVE-2019-19073": {
                 "cmt_msg": "ath9k_htc: release allocated buffer if timed out"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2015-8953": {
                 "cmt_msg": "ovl: fix dentry reference leak"
             }, 
@@ -2555,6 +2558,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -2609,9 +2615,6 @@
             "CVE-2020-8649": {
                 "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2016-2069": {
                 "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization"
             }, 
@@ -2903,6 +2906,9 @@
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -3516,7 +3522,7 @@
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -3639,7 +3645,7 @@
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -4454,6 +4460,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": ""
             }, 
@@ -4754,9 +4763,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -5207,6 +5213,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-14340": {
                 "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present"
             }, 
@@ -5447,6 +5456,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -6342,7 +6354,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -6837,7 +6849,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
@@ -7494,6 +7506,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": ""
             }, 
@@ -7761,9 +7776,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -8163,6 +8175,9 @@
             "CVE-2022-28390": {
                 "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
@@ -8370,6 +8385,9 @@
             "CVE-2017-13168": {
                 "cmt_msg": "scsi: sg: mitigate read/write abuse"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -9181,7 +9199,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -9628,7 +9646,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2019-9444": {
                 "cmt_msg": "printk: hash addresses printed with %p"
@@ -10165,6 +10183,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": ""
             }, 
@@ -10444,9 +10465,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -10885,6 +10903,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
@@ -11098,6 +11119,9 @@
             "CVE-2017-13168": {
                 "cmt_msg": "scsi: sg: mitigate read/write abuse"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -11957,7 +11981,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -12422,7 +12446,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
@@ -12939,6 +12963,9 @@
             "CVE-2019-19073": {
                 "cmt_msg": "ath9k_htc: release allocated buffer if timed out"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-19071": {
                 "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails"
             }, 
@@ -13197,9 +13224,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -13593,6 +13617,9 @@
             "CVE-2019-13233": {
                 "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
             }, 
@@ -13782,6 +13809,9 @@
             "CVE-2017-13168": {
                 "cmt_msg": "scsi: sg: mitigate read/write abuse"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -14521,7 +14551,7 @@
                 "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -14950,7 +14980,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -18232,6 +18262,10 @@
             }
         }, 
         "4.14.282": {
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d"
+            }, 
             "CVE-2022-0494": {
                 "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", 
                 "cmt_id": "4f3ea768c56e8dce55ae538f18b37420366c5c22"
@@ -18328,6 +18362,10 @@
             }
         }, 
         "4.14.290": {
+            "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
+                "cmt_id": "e9274a2732e1de3ca36076126284b4e5ffe6d587"
+            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", 
                 "cmt_id": "2c9d93e35cb857fc613ec9d58d690d332252747b"
@@ -18367,6 +18405,9 @@
             "CVE-2022-25265": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-5753": {
                 "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
             }, 
@@ -18433,6 +18474,9 @@
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-43975": {
                 "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait"
             }, 
@@ -18448,9 +18492,6 @@
             "CVE-2019-12378": {
                 "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
             }, 
-            "CVE-2022-1462": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1786": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
@@ -18724,9 +18765,6 @@
             "CVE-2021-44879": {
                 "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12656": {
                 "cmt_msg": "sunrpc: check that domain table is empty at module unload."
             }, 
@@ -18755,7 +18793,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -19020,6 +19058,9 @@
             "CVE-2020-35508": {
                 "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2020-24587": {
                 "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks"
             }, 
@@ -19662,6 +19703,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -20052,6 +20096,9 @@
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -20734,7 +20781,7 @@
                 "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -20808,9 +20855,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-14331": {
                 "cmt_msg": "vgacon: Fix for missing check in scrollback handling"
             }, 
@@ -21142,7 +21186,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -21627,6 +21671,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-19071": {
                 "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails"
             }, 
@@ -22050,6 +22097,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -22452,6 +22502,9 @@
             "CVE-2017-13168": {
                 "cmt_msg": "scsi: sg: mitigate read/write abuse"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -23161,7 +23214,7 @@
                 "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -23247,9 +23300,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-14331": {
                 "cmt_msg": "vgacon: Fix for missing check in scrollback handling"
             }, 
@@ -23581,7 +23631,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -26317,6 +26367,10 @@
             }
         }, 
         "4.19.246": {
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503"
+            }, 
             "CVE-2022-0494": {
                 "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", 
                 "cmt_id": "18243d8479fd77952bdb6340024169d30b173a40"
@@ -26413,6 +26467,10 @@
             }
         }, 
         "4.19.254": {
+            "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
+                "cmt_id": "eb059bf8c237fe41fbaed4a6cccacce687b83222"
+            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", 
                 "cmt_id": "fdb4fba1ba8512fa579a9d091dcb6c410f82f96a"
@@ -26459,6 +26517,9 @@
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-15794": {
                 "cmt_msg": "ovl: fix reference counting in ovl_mmap error path"
             }, 
@@ -26519,6 +26580,9 @@
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
@@ -26534,9 +26598,6 @@
             "CVE-2019-12378": {
                 "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
             }, 
-            "CVE-2022-1462": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1786": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
@@ -26765,9 +26826,6 @@
             "CVE-2021-44879": {
                 "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12656": {
                 "cmt_msg": "sunrpc: check that domain table is empty at module unload."
             }, 
@@ -26796,7 +26854,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -27498,6 +27556,9 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -27651,6 +27712,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -28044,6 +28108,9 @@
             "CVE-2020-10769": {
                 "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -28702,7 +28769,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -28773,9 +28840,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-14331": {
                 "cmt_msg": "vgacon: Fix for missing check in scrollback handling"
             }, 
@@ -29101,7 +29165,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2022-1678": {
                 "cmt_msg": "tcp: optimize tcp internal pacing"
@@ -31197,8 +31261,8 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
             "CVE-2016-3139": {
                 "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size"
@@ -31593,6 +31657,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-14340": {
                 "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present"
             }, 
@@ -31803,6 +31870,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -32611,7 +32681,7 @@
                 "cmt_msg": "virtio_console: Assure used length from device is limited"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27067": {
                 "cmt_msg": "l2tp: fix l2tp_eth module loading"
@@ -32761,7 +32831,7 @@
                 "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -34150,6 +34220,9 @@
             "CVE-2016-9794": {
                 "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2017-17805": {
                 "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage"
             }, 
@@ -34726,9 +34799,6 @@
             "CVE-2016-6327": {
                 "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2016-3139": {
                 "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size"
             }, 
@@ -35410,6 +35480,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -35578,6 +35651,9 @@
             "CVE-2020-0066": {
                 "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -36293,7 +36369,7 @@
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27067": {
                 "cmt_msg": "l2tp: fix l2tp_eth module loading"
@@ -36470,7 +36546,7 @@
                 "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -39758,6 +39834,9 @@
             "CVE-2019-19073": {
                 "cmt_msg": "ath9k_htc: release allocated buffer if timed out"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": ""
             }, 
@@ -39998,6 +40077,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -40043,9 +40125,6 @@
             "CVE-2022-1012": {
                 "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-26931": {
                 "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()"
             }, 
@@ -40265,6 +40344,9 @@
             "CVE-2020-10768": {
                 "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches."
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -40671,7 +40753,7 @@
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -40764,7 +40846,7 @@
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -43599,8 +43681,8 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
             "CVE-2016-3139": {
                 "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size"
@@ -43743,6 +43825,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2018-21008": {
                 "cmt_msg": "rsi: add fix for crash during assertions"
             }, 
@@ -44055,6 +44140,9 @@
             "CVE-2017-13168": {
                 "cmt_msg": "scsi: sg: mitigate read/write abuse"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2022-33740": {
                 "cmt_msg": "xen/netfront: fix leaking data in shared pages"
             }, 
@@ -44680,7 +44768,7 @@
                 "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -44776,7 +44864,7 @@
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -45617,6 +45705,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2015-8952": {
                 "cmt_msg": "ext2: convert to mbcache2"
             }, 
@@ -45935,9 +46026,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -46397,6 +46485,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-14340": {
                 "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present"
             }, 
@@ -46655,6 +46746,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -47613,7 +47707,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -48147,7 +48241,7 @@
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
@@ -51849,6 +51943,9 @@
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-5753": {
                 "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
             }, 
@@ -51864,9 +51961,6 @@
             "CVE-2022-32981": {
                 "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -51957,6 +52051,9 @@
             "CVE-2022-1012": {
                 "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2019-9453": {
                 "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary"
             }, 
@@ -52116,6 +52213,9 @@
             "CVE-2021-0695": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2015-8952": {
                 "cmt_msg": "ext2: convert to mbcache2"
             }, 
@@ -52153,7 +52253,7 @@
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-36123": {
                 "cmt_msg": "x86: Clear .brk area at early boot"
@@ -52528,7 +52628,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -53028,6 +53128,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": "unknown"
             }, 
@@ -53334,9 +53437,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -53787,6 +53887,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-14340": {
                 "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present"
             }, 
@@ -54033,6 +54136,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -54967,7 +55073,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -55498,7 +55604,7 @@
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
@@ -56060,6 +56166,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": "unknown"
             }, 
@@ -56369,9 +56478,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -56822,6 +56928,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-14340": {
                 "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present"
             }, 
@@ -57068,6 +57177,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -58002,7 +58114,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -58533,7 +58645,7 @@
                 "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
@@ -60446,8 +60558,8 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
             }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
@@ -60626,6 +60738,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -60989,6 +61104,9 @@
             "CVE-2017-13168": {
                 "cmt_msg": "scsi: sg: mitigate read/write abuse"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -61692,7 +61810,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -61830,7 +61948,7 @@
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2018-1000026": {
                 "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware"
@@ -62551,6 +62669,9 @@
             "CVE-2022-2588": {
                 "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-32399": {
                 "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller"
             }, 
@@ -62674,9 +62795,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-26088": {
                 "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check."
             }, 
@@ -63049,6 +63167,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20226": {
                 "cmt_msg": "io_uring: don't rely on weak ->files references"
             }, 
@@ -63115,6 +63236,9 @@
             "CVE-2020-14351": {
                 "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-14356": {
                 "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()"
             }, 
@@ -63470,7 +63594,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -63716,7 +63840,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -64260,6 +64384,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2015-8952": {
                 "cmt_msg": "ext2: convert to mbcache2"
             }, 
@@ -64578,9 +64705,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12771": {
                 "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce"
             }, 
@@ -65334,6 +65458,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2016-3157": {
                 "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV"
             }, 
@@ -65523,6 +65650,9 @@
             "CVE-2017-18221": {
                 "cmt_msg": "mlock: fix mlock count can not decrease in race condition"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2019-20794": {
                 "cmt_msg": ""
             }, 
@@ -66340,7 +66470,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -66538,7 +66668,7 @@
                 "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2018-10675": {
                 "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy"
@@ -67255,7 +67385,7 @@
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
@@ -67290,6 +67420,9 @@
             "CVE-2022-2588": {
                 "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-32399": {
                 "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller"
             }, 
@@ -67728,6 +67861,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20226": {
                 "cmt_msg": "io_uring: don't rely on weak ->files references"
             }, 
@@ -67782,6 +67918,9 @@
             "CVE-2020-14351": {
                 "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-20132": {
                 "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection"
             }, 
@@ -67989,8 +68128,8 @@
             "CVE-2021-3428": {
                 "cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-23041": {
+                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-23040": {
                 "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case"
@@ -68118,11 +68257,8 @@
             "CVE-2020-27815": {
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
-            "CVE-2022-23041": {
-                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
-            }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
@@ -68368,7 +68504,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -68692,7 +68828,7 @@
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
@@ -68727,6 +68863,9 @@
             "CVE-2022-2588": {
                 "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-32399": {
                 "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller"
             }, 
@@ -68829,9 +68968,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-3573": {
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
@@ -69129,6 +69265,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -69180,6 +69319,9 @@
             "CVE-2020-29569": {
                 "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-20132": {
                 "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection"
             }, 
@@ -69493,7 +69635,7 @@
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -69730,7 +69872,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -70011,7 +70153,7 @@
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2020-26145": {
                 "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe"
@@ -70037,6 +70179,9 @@
             "CVE-2022-2588": {
                 "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-32399": {
                 "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller"
             }, 
@@ -70136,9 +70281,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-3573": {
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
             }, 
@@ -70430,6 +70572,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-26139": {
                 "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames"
             }, 
@@ -70478,6 +70623,9 @@
             "CVE-2020-29569": {
                 "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-20132": {
                 "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection"
             }, 
@@ -70767,7 +70915,7 @@
                 "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-1729": {
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
@@ -70995,7 +71143,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -74586,6 +74734,10 @@
             }
         }, 
         "4.9.317": {
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5"
+            }, 
             "CVE-2022-0494": {
                 "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", 
                 "cmt_id": "d59073bedb7cf752b8cd4027dd0f67cf7ac4330f"
@@ -74680,6 +74832,10 @@
             }
         }, 
         "4.9.325": {
+            "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
+                "cmt_id": "41ce14090db93fc2f0c8a27ce8a324b0192da7b5"
+            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", 
                 "cmt_id": "5aff12fa09504c6ea88fc17749a39cda2c4d6ef7"
@@ -74725,6 +74881,9 @@
             "CVE-2021-33098": {
                 "cmt_msg": "ixgbe: fix large MTU request from VF"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2017-5753": {
                 "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
             }, 
@@ -74800,6 +74959,9 @@
             "CVE-2019-19241": {
                 "cmt_msg": "io_uring: async workers should inherit the user creds"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2019-9453": {
                 "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary"
             }, 
@@ -74818,9 +74980,6 @@
             "CVE-2019-12378": {
                 "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
             }, 
-            "CVE-2022-1462": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1786": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
@@ -75178,9 +75337,6 @@
             "CVE-2018-12207": {
                 "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12656": {
                 "cmt_msg": "sunrpc: check that domain table is empty at module unload."
             }, 
@@ -75215,7 +75371,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2019-11191": {
                 "cmt_msg": "x86: Deprecate a.out support"
@@ -75728,6 +75884,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": "unknown"
             }, 
@@ -76040,9 +76199,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -76493,6 +76649,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-14340": {
                 "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present"
             }, 
@@ -76733,6 +76892,9 @@
             "CVE-2017-1000363": {
                 "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -77658,7 +77820,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -78186,7 +78348,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
@@ -78737,6 +78899,9 @@
             "CVE-2019-18683": {
                 "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-18680": {
                 "cmt_msg": ""
             }, 
@@ -79028,9 +79193,6 @@
             "CVE-2018-9415": {
                 "cmt_msg": "ARM: amba: Fix race condition with driver_override"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-13648": {
                 "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM"
             }, 
@@ -79472,6 +79634,9 @@
             "CVE-2020-12652": {
                 "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2017-14340": {
                 "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present"
             }, 
@@ -79682,6 +79847,9 @@
             "CVE-2017-13168": {
                 "cmt_msg": "scsi: sg: mitigate read/write abuse"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -80562,7 +80730,7 @@
                 "cmt_msg": "inet: use bigger hash table for IP ID generation"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-27223": {
                 "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
@@ -81045,7 +81213,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2020-8832": {
                 "cmt_msg": "drm/i915: Record the default hw state after reset upon load"
@@ -81829,6 +81997,9 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-19048": {
                 "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr"
             }, 
@@ -81961,6 +82132,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -82318,6 +82492,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -82928,7 +83105,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -82990,9 +83167,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -83270,7 +83444,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -83945,6 +84119,9 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -84077,6 +84254,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -84434,6 +84614,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -85017,7 +85200,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -85082,9 +85265,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -85362,7 +85542,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -86005,6 +86185,9 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -86119,6 +86302,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -86464,6 +86650,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0149": {
                 "cmt_msg": "i40e: Add bounds check for ch[] array"
             }, 
@@ -87014,7 +87203,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -87082,9 +87271,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -87335,7 +87521,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -87785,6 +87971,9 @@
             "CVE-2022-28356": {
                 "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
@@ -87821,9 +88010,6 @@
             "CVE-2021-3744": {
                 "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
             }, 
-            "CVE-2022-23041": {
-                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
-            }, 
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
@@ -87836,8 +88022,8 @@
             "CVE-2022-28390": {
                 "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
-            "CVE-2022-2586": {
-                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            "CVE-2022-2308": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-23222": {
                 "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
@@ -87855,7 +88041,7 @@
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2021-4135": {
                 "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc"
@@ -87959,6 +88145,12 @@
             "CVE-2022-21125": {
                 "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
             }, 
+            "CVE-2022-2586": {
+                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2017-13693": {
                 "cmt_msg": ""
             }, 
@@ -88005,7 +88197,7 @@
                 "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-20148": {
                 "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory"
@@ -88316,8 +88508,8 @@
             "CVE-2022-1516": {
                 "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-23041": {
+                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-23040": {
                 "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case"
@@ -88350,7 +88542,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2022-1158": {
                 "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
@@ -88750,6 +88942,9 @@
             "CVE-2022-28356": {
                 "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-39686": {
                 "cmt_msg": "binder: use euid from cred instead of using task"
             }, 
@@ -88780,9 +88975,6 @@
             "CVE-2021-3744": {
                 "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
             }, 
-            "CVE-2022-23041": {
-                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
-            }, 
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
@@ -88795,8 +88987,8 @@
             "CVE-2022-28390": {
                 "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
-            "CVE-2022-2586": {
-                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            "CVE-2022-2308": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-23222": {
                 "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
@@ -88814,7 +89006,7 @@
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2021-4135": {
                 "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc"
@@ -88915,6 +89107,12 @@
             "CVE-2022-21125": {
                 "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
             }, 
+            "CVE-2022-2586": {
+                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2017-13693": {
                 "cmt_msg": ""
             }, 
@@ -88961,7 +89159,7 @@
                 "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-20148": {
                 "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory"
@@ -89260,8 +89458,8 @@
             "CVE-2022-1516": {
                 "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-23041": {
+                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-23040": {
                 "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case"
@@ -89291,7 +89489,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
@@ -90537,6 +90735,10 @@
             }
         }, 
         "5.10.120": {
+            "CVE-2022-32250": {
+                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
+                "cmt_id": "ea62d169b6e731e0b54abda1d692406f6bc6a696"
+            }, 
             "CVE-2022-2078": {
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", 
                 "cmt_id": "c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048"
@@ -90549,9 +90751,9 @@
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", 
                 "cmt_id": "c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048"
             }, 
-            "CVE-2022-32250": {
-                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
-                "cmt_id": "ea62d169b6e731e0b54abda1d692406f6bc6a696"
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "8df42bcd364cc3b41105215d841792aea787b133"
             }
         }, 
         "5.10.121": {
@@ -90653,6 +90855,10 @@
                 "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy", 
                 "cmt_id": "ab5050fd7430dde3a9f073129036d3da3facc8ec"
             }, 
+            "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
+                "cmt_id": "08afa87f58d83dfe040572ed591b47e8cb9e225c"
+            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", 
                 "cmt_id": "47b696dd654450cdec3103a833e5bf29c4b83bfa"
@@ -90670,6 +90876,28 @@
                 "cmt_id": "509c2c9fe75ea7493eebbb6bb2f711f37530ae19"
             }
         }, 
+        "5.10.137": {
+            "CVE-2022-2586": {
+                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", 
+                "cmt_id": "1a4b18b1ff11ba26f9a852019d674fde9d1d1cff"
+            }, 
+            "CVE-2022-2585": {
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec", 
+                "cmt_id": "541840859ace9c2ccebc32fa9e376c7bd3def490"
+            }, 
+            "CVE-2022-1679": {
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", 
+                "cmt_id": "eccd7c3e2596b574241a7670b5b53f5322f470e5"
+            }, 
+            "CVE-2022-2588": {
+                "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", 
+                "cmt_id": "7018f03d97daf344e49b16200caf4363a1407cab"
+            }, 
+            "CVE-2022-2153": {
+                "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", 
+                "cmt_id": "ac7de8c2ba1292856fdd4a4c0764669b9607cf0a"
+            }
+        }, 
         "outstanding": {
             "CVE-2020-26556": {
                 "cmt_msg": ""
@@ -90734,6 +90962,9 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
@@ -90743,7 +90974,7 @@
             "CVE-2021-3669": {
                 "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
             }, 
-            "CVE-2022-1462": {
+            "CVE-2022-2308": {
                 "cmt_msg": ""
             }, 
             "CVE-2020-15802": {
@@ -90773,18 +91004,9 @@
             "CVE-2020-26142": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2586": {
-                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
-            }, 
-            "CVE-2022-2585": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2588": {
-                "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
-            }, 
             "CVE-2020-10708": {
                 "cmt_msg": ""
             }, 
@@ -90878,8 +91100,8 @@
             "CVE-2018-17977": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2153": {
-                "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
+            "CVE-2022-1116": {
+                "cmt_msg": ""
             }, 
             "CVE-2010-5321": {
                 "cmt_msg": ""
@@ -90905,18 +91127,12 @@
             "CVE-2021-4204": {
                 "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types"
             }, 
-            "CVE-2022-1116": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-44879": {
                 "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2018-12929": {
                 "cmt_msg": ""
             }, 
@@ -90938,9 +91154,6 @@
             "CVE-2022-0400": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1679": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
             }, 
@@ -91427,6 +91640,9 @@
             "CVE-2022-28356": {
                 "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2022-1966": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier"
             }, 
@@ -91472,9 +91688,6 @@
             "CVE-2021-3744": {
                 "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
             }, 
-            "CVE-2022-23041": {
-                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
-            }, 
             "CVE-2021-20321": {
                 "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()"
             }, 
@@ -91490,8 +91703,8 @@
             "CVE-2022-28390": {
                 "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
-            "CVE-2022-2586": {
-                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            "CVE-2022-2308": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-23222": {
                 "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
@@ -91512,7 +91725,7 @@
                 "cmt_msg": "netfilter: nf_tables: initialize set before expression setup"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2021-4135": {
                 "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc"
@@ -91640,6 +91853,12 @@
             "CVE-2022-21125": {
                 "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
             }, 
+            "CVE-2022-2586": {
+                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2017-13693": {
                 "cmt_msg": ""
             }, 
@@ -91689,7 +91908,7 @@
                 "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2021-3573": {
                 "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object"
@@ -92036,8 +92255,8 @@
             "CVE-2022-1516": {
                 "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-23041": {
+                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
@@ -92076,7 +92295,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2022-1158": {
                 "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
@@ -92564,6 +92783,9 @@
             "CVE-2022-1012": {
                 "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
@@ -92577,6 +92799,9 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
+            }, 
+            "CVE-2022-2308": {
                 "cmt_msg": ""
             }, 
             "CVE-2020-15802": {
@@ -92625,7 +92850,7 @@
                 "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
@@ -92642,6 +92867,9 @@
             "CVE-2020-10708": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2017-13693": {
                 "cmt_msg": ""
             }, 
@@ -92810,9 +93038,6 @@
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2018-12929": {
                 "cmt_msg": ""
             }, 
@@ -92835,7 +93060,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
@@ -93041,6 +93266,14 @@
             }
         }, 
         "5.17.13": {
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+                "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7"
+            }, 
+            "CVE-2022-1966": {
+                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
+                "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7"
+            }, 
             "CVE-2022-32250": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
                 "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7"
@@ -93057,9 +93290,9 @@
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", 
                 "cmt_id": "c88f3e3d243d701586239c5b69356ec2b1fd05f1"
             }, 
-            "CVE-2022-1966": {
-                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
-                "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7"
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "a40560bbf6228ecf754d45aa7b1c50b488fed519"
             }
         }, 
         "5.17.14": {
@@ -93151,6 +93384,9 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
+            }, 
+            "CVE-2018-12929": {
                 "cmt_msg": ""
             }, 
             "CVE-2020-15802": {
@@ -93193,7 +93429,7 @@
                 "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
@@ -93328,9 +93564,9 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1882": {
-                "cmt_msg": ""
+                "cmt_msg": "watchqueue: make sure to serialize 'wqueue->defunct' properly"
             }, 
-            "CVE-2018-12929": {
+            "CVE-2022-2308": {
                 "cmt_msg": ""
             }, 
             "CVE-2018-12928": {
@@ -93352,7 +93588,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
@@ -93684,6 +93920,9 @@
             "CVE-2022-1012": {
                 "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-39685": {
                 "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests"
             }, 
@@ -93708,9 +93947,6 @@
             "CVE-2021-3669": {
                 "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
             }, 
-            "CVE-2022-23041": {
-                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
-            }, 
             "CVE-2022-20132": {
                 "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection"
             }, 
@@ -93720,8 +93956,8 @@
             "CVE-2022-28390": {
                 "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path"
             }, 
-            "CVE-2022-2586": {
-                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            "CVE-2022-2308": {
+                "cmt_msg": ""
             }, 
             "CVE-2022-23222": {
                 "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
@@ -93739,7 +93975,7 @@
                 "cmt_msg": "netfilter: nf_tables: stricter validation of element data"
             }, 
             "CVE-2022-2585": {
-                "cmt_msg": ""
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec"
             }, 
             "CVE-2021-4135": {
                 "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc"
@@ -93831,6 +94067,12 @@
             "CVE-2022-21125": {
                 "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
             }, 
+            "CVE-2022-2586": {
+                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+            }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2017-13693": {
                 "cmt_msg": ""
             }, 
@@ -93865,7 +94107,7 @@
                 "cmt_msg": "perf: Fix sys_perf_event_open() race against self"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2022-36123": {
                 "cmt_msg": "x86: Clear .brk area at early boot"
@@ -94134,8 +94376,8 @@
             "CVE-2022-1516": {
                 "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
+            "CVE-2022-23041": {
+                "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-23040": {
                 "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case"
@@ -94165,7 +94407,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2022-26966": {
                 "cmt_msg": "sr9700: sanity check for packet length"
@@ -94777,6 +95019,14 @@
             }
         }, 
         "5.15.45": {
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+                "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1"
+            }, 
+            "CVE-2022-1966": {
+                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
+                "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d"
+            }, 
             "CVE-2022-32250": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
                 "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d"
@@ -94793,9 +95043,9 @@
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", 
                 "cmt_id": "89ef50fe03a55feccf5681c237673a2f98161161"
             }, 
-            "CVE-2022-1966": {
-                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
-                "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d"
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "69712b170237ec5979f168149cd31e851a465853"
             }
         }, 
         "5.15.46": {
@@ -94897,6 +95147,10 @@
                 "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy", 
                 "cmt_id": "0e66932a9dc9ba47e60405b392e3782a332bc44e"
             }, 
+            "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
+                "cmt_id": "b2d1e4cd558cffec6bfe318f5d74e6cffc374d29"
+            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", 
                 "cmt_id": "c8e32bca0676ac663266a3b16562cb017300adcd"
@@ -94914,12 +95168,27 @@
                 "cmt_id": "7fcd99e889c0634f8275ae7a6b06aec4a22c8715"
             }
         }, 
-        "outstanding": {
-            "CVE-2022-2588": {
-                "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
-            }, 
+        "5.15.61": {
             "CVE-2022-2586": {
-                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", 
+                "cmt_id": "faafd9286f1355c76fe9ac3021c280297213330e"
+            }, 
+            "CVE-2022-2585": {
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec", 
+                "cmt_id": "9e255ed238fc67058df87b0388ad6d4b2ef3a2bd"
+            }, 
+            "CVE-2022-1679": {
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", 
+                "cmt_id": "03ca957c5f7b55660957eda20b5db4110319ac7a"
+            }, 
+            "CVE-2022-2588": {
+                "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", 
+                "cmt_id": "57bbb691a93bd39d0644c5c879b354232d0e0eed"
+            }
+        }, 
+        "outstanding": {
+            "CVE-2022-2308": {
+                "cmt_msg": ""
             }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
@@ -94957,7 +95226,7 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2585": {
+            "CVE-2022-26878": {
                 "cmt_msg": ""
             }, 
             "CVE-2021-39801": {
@@ -94996,9 +95265,6 @@
             "CVE-2005-3660": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-24122": {
                 "cmt_msg": "ucount:  Make get_ucount a safe get_user replacement"
             }, 
@@ -95083,18 +95349,12 @@
             "CVE-2021-3864": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1679": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
             "CVE-2020-10708": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-26878": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1247": {
                 "cmt_msg": ""
             }, 
@@ -95139,9 +95399,6 @@
             }, 
             "CVE-2013-7445": {
                 "cmt_msg": ""
-            }, 
-            "CVE-2022-1462": {
-                "cmt_msg": ""
             }
         }
     }, 
@@ -95773,6 +96030,9 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2019-19048": {
                 "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr"
             }, 
@@ -95914,6 +96174,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -96295,6 +96558,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-0148": {
                 "cmt_msg": "i40e: Wrong truncation from u16 to u8"
             }, 
@@ -96935,7 +97201,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -97000,9 +97266,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-12114": {
                 "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount"
             }, 
@@ -97304,7 +97567,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -99212,6 +99475,10 @@
                 "cmt_msg": "lockdown: also lock down previous kgdb use", 
                 "cmt_id": "8bb828229da903bb5710d21065e0a29f9afd30e0"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "fd2f7e9984850a0162bfb6948b98ffac9fb5fa58"
+            }, 
             "CVE-2022-1012": {
                 "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", 
                 "cmt_id": "ab5b00cfe0500f5f5a3648ca945b892156b839fb"
@@ -99304,6 +99571,10 @@
                 "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy", 
                 "cmt_id": "ed3fea55066b4e054c4d212e54f9965abcac9685"
             }, 
+            "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
+                "cmt_id": "f7785092cb7f022f59ebdaa181651f7c877df132"
+            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", 
                 "cmt_id": "f4248bdb7d5c1150a2a6f8c3d3b6da0b71f62a20"
@@ -99357,6 +99628,9 @@
             "CVE-2019-19378": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2019-15794": {
                 "cmt_msg": "ovl: fix reference counting in ovl_mmap error path"
             }, 
@@ -99402,6 +99676,9 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2021-26934": {
                 "cmt_msg": ""
             }, 
@@ -99414,9 +99691,6 @@
             "CVE-2021-3669": {
                 "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
             }, 
-            "CVE-2022-1462": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1786": {
                 "cmt_msg": "io_uring: remove io_identity"
             }, 
@@ -99618,9 +99892,6 @@
             "CVE-2021-44879": {
                 "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-16120": {
                 "cmt_msg": "ovl: switch to mounter creds in readdir"
             }, 
@@ -99643,7 +99914,7 @@
                 "cmt_msg": ""
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-3847": {
                 "cmt_msg": ""
@@ -99683,6 +99954,14 @@
             }
         }, 
         "5.18.2": {
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", 
+                "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153"
+            }, 
+            "CVE-2022-1966": {
+                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
+                "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0"
+            }, 
             "CVE-2022-32250": {
                 "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
                 "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0"
@@ -99699,9 +99978,9 @@
                 "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", 
                 "cmt_id": "c9a46a3d549286861259c19af4747e12cfaeece9"
             }, 
-            "CVE-2022-1966": {
-                "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", 
-                "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0"
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", 
+                "cmt_id": "417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9"
             }
         }, 
         "5.18.3": {
@@ -99789,6 +100068,10 @@
             }
         }, 
         "5.18.13": {
+            "CVE-2022-1462": {
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", 
+                "cmt_id": "fa3302714c03e4e6c9b5aad5dacae33e75f76cf7"
+            }, 
             "CVE-2022-36123": {
                 "cmt_msg": "x86: Clear .brk area at early boot", 
                 "cmt_id": "2334bdfc2da469c9807767002a2831274b82c39a"
@@ -99809,6 +100092,10 @@
                 "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy", 
                 "cmt_id": "f67ff524f283183c52d2575b11beec00cc4d5092"
             }, 
+            "CVE-2022-1882": {
+                "cmt_msg": "watchqueue: make sure to serialize 'wqueue->defunct' properly", 
+                "cmt_id": "49cbb4820e4f1895130755732485afb2d18508f9"
+            }, 
             "CVE-2022-36879": {
                 "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", 
                 "cmt_id": "70f5e35cd5e38017653ed1ca0f7a4ab6d5c5a794"
@@ -99826,12 +100113,27 @@
                 "cmt_id": "0abdbbd9ae9c81615836278d787a8c8dcd576c36"
             }
         }, 
-        "outstanding": {
-            "CVE-2022-2588": {
-                "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
-            }, 
+        "5.18.18": {
             "CVE-2022-2586": {
-                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table"
+                "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", 
+                "cmt_id": "f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f"
+            }, 
+            "CVE-2022-2585": {
+                "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec", 
+                "cmt_id": "e8cb6e8fd9890780f1bfcf5592889e1b879e779c"
+            }, 
+            "CVE-2022-1679": {
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", 
+                "cmt_id": "6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6"
+            }, 
+            "CVE-2022-2588": {
+                "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", 
+                "cmt_id": "e832c26e7edfa2ddbd2dcdd48016d13d747de6da"
+            }
+        }, 
+        "outstanding": {
+            "CVE-2022-2308": {
+                "cmt_msg": ""
             }, 
             "CVE-2018-17977": {
                 "cmt_msg": ""
@@ -99869,9 +100171,6 @@
             "CVE-2022-2209": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-2585": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-39801": {
                 "cmt_msg": ""
             }, 
@@ -99908,9 +100207,6 @@
             "CVE-2005-3660": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2021-3542": {
                 "cmt_msg": ""
             }, 
@@ -99986,9 +100282,6 @@
             "CVE-2021-3864": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1679": {
-                "cmt_msg": ""
-            }, 
             "CVE-2019-19814": {
                 "cmt_msg": ""
             }, 
@@ -100036,9 +100329,6 @@
             }, 
             "CVE-2013-7445": {
                 "cmt_msg": ""
-            }, 
-            "CVE-2022-1462": {
-                "cmt_msg": ""
             }
         }
     }, 
@@ -100718,6 +101008,9 @@
             "CVE-2019-14615": {
                 "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-3635": {
                 "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption"
             }, 
@@ -100829,6 +101122,9 @@
             "CVE-2022-0382": {
                 "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-25672": {
                 "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()"
             }, 
@@ -101141,6 +101437,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2020-10942": {
                 "cmt_msg": "vhost: Check docket sk_family instead of call getname"
             }, 
@@ -101637,7 +101936,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -101687,9 +101986,6 @@
             "CVE-2010-4563": {
                 "cmt_msg": ""
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2022-1280": {
                 "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
             }, 
@@ -101925,7 +102221,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
@@ -102264,6 +102560,9 @@
             "CVE-2022-2588": {
                 "cmt_msg": "net_sched: cls_route: remove from list when handle is 0"
             }, 
+            "CVE-2022-2503": {
+                "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag"
+            }, 
             "CVE-2021-32399": {
                 "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller"
             }, 
@@ -102378,9 +102677,6 @@
             "CVE-2020-36385": {
                 "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
             }, 
-            "CVE-2022-1882": {
-                "cmt_msg": ""
-            }, 
             "CVE-2020-26088": {
                 "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check."
             }, 
@@ -102717,6 +103013,9 @@
             "CVE-2021-35039": {
                 "cmt_msg": "module: limit enabling module.sig_enforce"
             }, 
+            "CVE-2022-2308": {
+                "cmt_msg": ""
+            }, 
             "CVE-2021-20226": {
                 "cmt_msg": "io_uring: don't rely on weak ->files references"
             }, 
@@ -102780,6 +103079,9 @@
             "CVE-2020-14351": {
                 "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function"
             }, 
+            "CVE-2022-2873": {
+                "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()"
+            }, 
             "CVE-2020-14356": {
                 "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()"
             }, 
@@ -103129,7 +103431,7 @@
                 "cmt_msg": "xen/9p: use alloc/free_pages_exact()"
             }, 
             "CVE-2022-1462": {
-                "cmt_msg": ""
+                "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()"
             }, 
             "CVE-2020-27777": {
                 "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
@@ -103378,7 +103680,7 @@
                 "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()"
             }, 
             "CVE-2022-1679": {
-                "cmt_msg": ""
+                "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb"
             }, 
             "CVE-2021-26401": {
                 "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD"
diff --git a/data/stream_fixes.json b/data/stream_fixes.json
index 87f0964..3c59a7b 100644
--- a/data/stream_fixes.json
+++ b/data/stream_fixes.json
@@ -31059,6 +31059,36 @@
             "fixed_version": "5.5.5"
         }
     }, 
+    "CVE-2022-1462": {
+        "4.14": {
+            "cmt_id": "e9274a2732e1de3ca36076126284b4e5ffe6d587", 
+            "fixed_version": "4.14.290"
+        }, 
+        "4.19": {
+            "cmt_id": "eb059bf8c237fe41fbaed4a6cccacce687b83222", 
+            "fixed_version": "4.19.254"
+        }, 
+        "4.9": {
+            "cmt_id": "41ce14090db93fc2f0c8a27ce8a324b0192da7b5", 
+            "fixed_version": "4.9.325"
+        }, 
+        "5.10": {
+            "cmt_id": "08afa87f58d83dfe040572ed591b47e8cb9e225c", 
+            "fixed_version": "5.10.134"
+        }, 
+        "5.15": {
+            "cmt_id": "b2d1e4cd558cffec6bfe318f5d74e6cffc374d29", 
+            "fixed_version": "5.15.58"
+        }, 
+        "5.18": {
+            "cmt_id": "fa3302714c03e4e6c9b5aad5dacae33e75f76cf7", 
+            "fixed_version": "5.18.13"
+        }, 
+        "5.4": {
+            "cmt_id": "f7785092cb7f022f59ebdaa181651f7c877df132", 
+            "fixed_version": "5.4.208"
+        }
+    }, 
     "CVE-2022-1516": {
         "4.14": {
             "cmt_id": "858642789ada1b48630f322e59416ca9fca3e6b7", 
@@ -31157,6 +31187,20 @@
             "fixed_version": "4.19.228"
         }
     }, 
+    "CVE-2022-1679": {
+        "5.10": {
+            "cmt_id": "eccd7c3e2596b574241a7670b5b53f5322f470e5", 
+            "fixed_version": "5.10.137"
+        }, 
+        "5.15": {
+            "cmt_id": "03ca957c5f7b55660957eda20b5db4110319ac7a", 
+            "fixed_version": "5.15.61"
+        }, 
+        "5.18": {
+            "cmt_id": "6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6", 
+            "fixed_version": "5.18.18"
+        }
+    }, 
     "CVE-2022-1729": {
         "4.14": {
             "cmt_id": "dee63319e2d1abd5d37a89de046ccf32ca8a8451", 
@@ -31293,6 +31337,12 @@
             "fixed_version": "5.18.2"
         }
     }, 
+    "CVE-2022-1882": {
+        "5.18": {
+            "cmt_id": "49cbb4820e4f1895130755732485afb2d18508f9", 
+            "fixed_version": "5.18.15"
+        }
+    }, 
     "CVE-2022-1943": {
         "5.15": {
             "cmt_id": "9e951f2d85c9430ea8ae0c8448e47e3c234f1580", 
@@ -31812,6 +31862,10 @@
         }
     }, 
     "CVE-2022-2153": {
+        "5.10": {
+            "cmt_id": "ac7de8c2ba1292856fdd4a4c0764669b9607cf0a", 
+            "fixed_version": "5.10.137"
+        }, 
         "5.15": {
             "cmt_id": "0e5dbc0540baa89faf4c04ccc7e9c4fe6b1d7bf4", 
             "fixed_version": "5.15.33"
@@ -32243,6 +32297,40 @@
             "fixed_version": "5.4.176"
         }
     }, 
+    "CVE-2022-2503": {
+        "4.14": {
+            "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d", 
+            "fixed_version": "4.14.282"
+        }, 
+        "4.19": {
+            "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503", 
+            "fixed_version": "4.19.246"
+        }, 
+        "4.9": {
+            "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5", 
+            "fixed_version": "4.9.317"
+        }, 
+        "5.10": {
+            "cmt_id": "8df42bcd364cc3b41105215d841792aea787b133", 
+            "fixed_version": "5.10.120"
+        }, 
+        "5.15": {
+            "cmt_id": "69712b170237ec5979f168149cd31e851a465853", 
+            "fixed_version": "5.15.45"
+        }, 
+        "5.17": {
+            "cmt_id": "a40560bbf6228ecf754d45aa7b1c50b488fed519", 
+            "fixed_version": "5.17.13"
+        }, 
+        "5.18": {
+            "cmt_id": "417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9", 
+            "fixed_version": "5.18.2"
+        }, 
+        "5.4": {
+            "cmt_id": "fd2f7e9984850a0162bfb6948b98ffac9fb5fa58", 
+            "fixed_version": "5.4.197"
+        }
+    }, 
     "CVE-2022-25258": {
         "4.14": {
             "cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731", 
@@ -32321,6 +32409,48 @@
             "fixed_version": "5.4.182"
         }
     }, 
+    "CVE-2022-2585": {
+        "5.10": {
+            "cmt_id": "541840859ace9c2ccebc32fa9e376c7bd3def490", 
+            "fixed_version": "5.10.137"
+        }, 
+        "5.15": {
+            "cmt_id": "9e255ed238fc67058df87b0388ad6d4b2ef3a2bd", 
+            "fixed_version": "5.15.61"
+        }, 
+        "5.18": {
+            "cmt_id": "e8cb6e8fd9890780f1bfcf5592889e1b879e779c", 
+            "fixed_version": "5.18.18"
+        }
+    }, 
+    "CVE-2022-2586": {
+        "5.10": {
+            "cmt_id": "1a4b18b1ff11ba26f9a852019d674fde9d1d1cff", 
+            "fixed_version": "5.10.137"
+        }, 
+        "5.15": {
+            "cmt_id": "faafd9286f1355c76fe9ac3021c280297213330e", 
+            "fixed_version": "5.15.61"
+        }, 
+        "5.18": {
+            "cmt_id": "f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f", 
+            "fixed_version": "5.18.18"
+        }
+    }, 
+    "CVE-2022-2588": {
+        "5.10": {
+            "cmt_id": "7018f03d97daf344e49b16200caf4363a1407cab", 
+            "fixed_version": "5.10.137"
+        }, 
+        "5.15": {
+            "cmt_id": "57bbb691a93bd39d0644c5c879b354232d0e0eed", 
+            "fixed_version": "5.15.61"
+        }, 
+        "5.18": {
+            "cmt_id": "e832c26e7edfa2ddbd2dcdd48016d13d747de6da", 
+            "fixed_version": "5.18.18"
+        }
+    }, 
     "CVE-2022-26365": {
         "4.14": {
             "cmt_id": "44dc5bcac4b0ec4e876110a69ead25a9b130234b", 
@@ -32657,6 +32787,20 @@
             "fixed_version": "5.4.189"
         }
     }, 
+    "CVE-2022-2873": {
+        "5.15": {
+            "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1", 
+            "fixed_version": "5.15.45"
+        }, 
+        "5.17": {
+            "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7", 
+            "fixed_version": "5.17.13"
+        }, 
+        "5.18": {
+            "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153", 
+            "fixed_version": "5.18.2"
+        }
+    }, 
     "CVE-2022-28796": {
         "5.17": {
             "cmt_id": "bff94c57bd130e3062afa94414c2294871314096",