Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
purl pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (29)
Vulnerability Summary Aliases
VCID-26nq-rncj-qbbv openstack-neutron: regression of fix for CVE-2013-6433 CVE-2014-3632
VCID-4fyj-d9qy-fffp An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected. CVE-2019-10876
GHSA-jr9m-v5qh-mh2j
PYSEC-2019-189
VCID-57rk-q94h-3kgz When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable. CVE-2018-14635
GHSA-x634-34m9-96mp
PYSEC-2018-93
VCID-5j9j-5nv7-wyem openstack-neutron: security groups bypass through invalid CIDR CVE-2014-0187
VCID-6j79-2nz1-53cs OpenStack Neutron allows remote attackers to bypass an intended DHCP-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended DHCP-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a crafted DHCP discovery message. CVE-2016-5362
GHSA-qpwc-p365-pqrr
VCID-7sem-1dhy-vbdw OpenStack Neutron Intended MAC-spoofing protection mechanism bypass The IPTables firewall in OpenStack Neutron up to 7.0.4 and 8.x before 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2) crafted non-IP traffic. CVE-2016-5363
GHSA-9pp3-cvmq-9p22
VCID-9urm-66y7-s3hs OpenStack Neutron allows remote authenticated users to cause a denial of service OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (crash or long firewall rule updates) by creating a large number of allowed address pairs. CVE-2014-3555
GHSA-4pmp-38hf-rmwj
VCID-b3pu-ncrc-wbhn An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.) CVE-2019-9735
GHSA-9773-3fqg-8w25
PYSEC-2019-190
VCID-ba8p-f96g-aqc3 Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable. CVE-2018-14636
GHSA-8q95-jj7p-x93x
PYSEC-2018-94
VCID-cy6c-1e49-27cz pycadf: token leak to message queue CVE-2014-4615
VCID-d7zk-1d89-dbbw OpenStack Neutron can use an incorrect ID during policy enforcement In OpenStack Neutron before 25.0.1, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. It does not apply the proper policy check for changing network tags. An unprivileged tenant is able to change (add and clear) tags on network objects that do not belong to the tenant, and this action is not subjected to the proper policy authorization check. This affects 23 before 23.2.1, 24 before 24.0.2, and 25 before 25.0.1. CVE-2024-53916
GHSA-f27h-g923-68hw
VCID-ejd8-7jqx-zbfy PackStack: Neutron Security Groups fail to block network traffic CVE-2014-0071
VCID-f9bx-xknx-6qbv OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. CVE-2021-38598
GHSA-hvm4-mc7m-22w4
PYSEC-2021-360
VCID-fqwt-ecwa-1kex OpenStack Neutron Improper Authentication vulnerability The l3-agent in OpenStack Neutron 2012.2 before 2013.2.3 does not check the tenant id when creating ports, which allows remote authenticated users to plug ports into the routers of arbitrary tenants via the device id in a port-create command. CVE-2014-0056
GHSA-72p9-6gc7-q93r
VCID-hcsa-vfvp-buax OpenStack Nova Router metadata queries are not restricted by tenant Interaction error in OpenStack Nova and Neutron before Havana 2013.2.1 and icehouse-1 does not validate the instance ID of the tenant making a request, which allows remote tenants to obtain sensitive metadata by spoofing the device ID that is bound to a port, which is not properly handled by (1) api/metadata/handler.py in Nova and (2) the neutron-metadata-agent (`agent/metadata/agent.py`) in Neutron. CVE-2013-6419
GHSA-22w9-j288-8p9w
VCID-kk9h-cvg8-23he openstack-neutron: DoS via maliciously crafted dns_nameservers CVE-2014-7821
VCID-kv7h-v2g8-6fdj OpenStack Neutron allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address. CVE-2015-8914
GHSA-3vj4-cvjp-482h
VCID-m3za-mbev-uuc1 openstack-neutron: Admin-only network attributes may be reset to defaults by non-privileged users CVE-2014-6414
VCID-mgz8-9mkb-m3gv openstack-neutron: L3-agent denial of service through IPv6 subnet CVE-2014-4167
VCID-qua4-h1r7-a7b7 openstack-neutron uncontrolled resource consumption flaw An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. CVE-2022-3277
GHSA-w446-h7vg-wv3p
VCID-s58r-txyg-g3aw Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) A race-condition flaw was discovered in openstack-neutron: following a minor overcloud update, neutron security groups were disabled. CVE-2017-7543
GHSA-hvxr-2fvv-c3wq
VCID-sh88-99pv-aqac A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected. CVE-2021-20267
GHSA-w8hx-f868-pvch
PYSEC-2021-136
VCID-tmfc-jgc1-ykat openstack-neutron: L3 agent denial of service with radvd 2.0+ (OSSA 2015-001) CVE-2014-8153
VCID-u9wn-d3kr-7ubj openstack-quantum/openstack-neutron: rootwrap sudo config allows potential privilege escalation CVE-2013-6433
VCID-uf52-su2e-y3ck Improper Input Validation A Denial-of-Service flaw was found in the OpenStack Networking (neutron) L2 agent when using the iptables firewall driver. By submitting an address pair that is rejected as invalid by the ipset tool (with zero prefix size), an authenticated attacker can cause the L2 agent to crash. CVE-2015-3221
GHSA-wf44-4mgj-rwvx
VCID-w7qg-pen7-tfbr An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value. CVE-2021-40085
GHSA-fh73-gjvg-349c
PYSEC-2021-361
VCID-wv6g-4622-tqdw An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service. CVE-2021-40797
GHSA-cpx3-696p-3cw9
PYSEC-2021-329
VCID-ydug-1dq5-aya1 Uncontrolled Resource Consumption An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. CVE-2023-3637
GHSA-r3jh-qhgj-gvr8
VCID-yrqg-evxw-a7cb OpenStack Neutron Race condition vulnerability Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied. CVE-2015-5240
GHSA-hhpj-6pj7-wpx5

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:59:04.356383+00:00 Debian Importer Fixing VCID-cy6c-1e49-27cz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:50.400318+00:00 Debian Importer Fixing VCID-26nq-rncj-qbbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:42:55.604290+00:00 Debian Importer Fixing VCID-kk9h-cvg8-23he https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:30:20.814741+00:00 Debian Importer Fixing VCID-wv6g-4622-tqdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:17:45.688766+00:00 Debian Importer Fixing VCID-tmfc-jgc1-ykat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:01.914162+00:00 Debian Importer Fixing VCID-4fyj-d9qy-fffp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:56:44.726096+00:00 Debian Importer Fixing VCID-m3za-mbev-uuc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:15.689786+00:00 Debian Importer Fixing VCID-w7qg-pen7-tfbr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:30:05.118071+00:00 Debian Importer Fixing VCID-9urm-66y7-s3hs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:30:00.968640+00:00 Debian Importer Fixing VCID-b3pu-ncrc-wbhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:25:53.151533+00:00 Debian Importer Fixing VCID-fqwt-ecwa-1kex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:20.048500+00:00 Debian Importer Fixing VCID-yrqg-evxw-a7cb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:49.743248+00:00 Debian Importer Fixing VCID-sh88-99pv-aqac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:30.139026+00:00 Debian Importer Fixing VCID-ba8p-f96g-aqc3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:25.163334+00:00 Debian Importer Fixing VCID-hcsa-vfvp-buax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:55.936989+00:00 Debian Importer Fixing VCID-kv7h-v2g8-6fdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:16.906624+00:00 Debian Importer Fixing VCID-ydug-1dq5-aya1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:04.211320+00:00 Debian Importer Fixing VCID-57rk-q94h-3kgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:38.285418+00:00 Debian Importer Fixing VCID-f9bx-xknx-6qbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:29.821784+00:00 Debian Importer Fixing VCID-5j9j-5nv7-wyem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:02.060917+00:00 Debian Importer Fixing VCID-d7zk-1d89-dbbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:25.317498+00:00 Debian Importer Fixing VCID-s58r-txyg-g3aw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:15.631434+00:00 Debian Importer Fixing VCID-u9wn-d3kr-7ubj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:47.286905+00:00 Debian Importer Fixing VCID-ejd8-7jqx-zbfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:15.610965+00:00 Debian Importer Fixing VCID-7sem-1dhy-vbdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:52.405420+00:00 Debian Importer Fixing VCID-6j79-2nz1-53cs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:01.463601+00:00 Debian Importer Fixing VCID-uf52-su2e-y3ck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:25.952101+00:00 Debian Importer Fixing VCID-mgz8-9mkb-m3gv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:55:15.424384+00:00 Debian Importer Fixing VCID-cy6c-1e49-27cz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:45.450599+00:00 Debian Importer Fixing VCID-26nq-rncj-qbbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:02.973352+00:00 Debian Importer Fixing VCID-kk9h-cvg8-23he https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:44.211781+00:00 Debian Importer Fixing VCID-wv6g-4622-tqdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:32.724100+00:00 Debian Importer Fixing VCID-tmfc-jgc1-ykat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:26.975504+00:00 Debian Importer Fixing VCID-4fyj-d9qy-fffp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:15.576026+00:00 Debian Importer Fixing VCID-m3za-mbev-uuc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:36.051179+00:00 Debian Importer Fixing VCID-w7qg-pen7-tfbr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:19.784204+00:00 Debian Importer Fixing VCID-9urm-66y7-s3hs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:16.318728+00:00 Debian Importer Fixing VCID-b3pu-ncrc-wbhn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:16.276847+00:00 Debian Importer Fixing VCID-fqwt-ecwa-1kex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:22.071916+00:00 Debian Importer Fixing VCID-yrqg-evxw-a7cb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:24.404574+00:00 Debian Importer Fixing VCID-sh88-99pv-aqac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:35.649079+00:00 Debian Importer Fixing VCID-ba8p-f96g-aqc3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:06.703731+00:00 Debian Importer Fixing VCID-hcsa-vfvp-buax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:50.851225+00:00 Debian Importer Fixing VCID-kv7h-v2g8-6fdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:51.344336+00:00 Debian Importer Fixing VCID-ydug-1dq5-aya1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:51.793537+00:00 Debian Importer Fixing VCID-57rk-q94h-3kgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:31.543090+00:00 Debian Importer Fixing VCID-f9bx-xknx-6qbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:19.851235+00:00 Debian Importer Fixing VCID-5j9j-5nv7-wyem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:34.909854+00:00 Debian Importer Fixing VCID-d7zk-1d89-dbbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:12.033079+00:00 Debian Importer Fixing VCID-s58r-txyg-g3aw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:17.685921+00:00 Debian Importer Fixing VCID-u9wn-d3kr-7ubj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:55.202505+00:00 Debian Importer Fixing VCID-ejd8-7jqx-zbfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:21.641257+00:00 Debian Importer Fixing VCID-7sem-1dhy-vbdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:14.808304+00:00 Debian Importer Fixing VCID-6j79-2nz1-53cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:12.550247+00:00 Debian Importer Fixing VCID-uf52-su2e-y3ck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:34.763370+00:00 Debian Importer Fixing VCID-mgz8-9mkb-m3gv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:46:57.329881+00:00 Debian Importer Fixing VCID-d7zk-1d89-dbbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:57.264058+00:00 Debian Importer Fixing VCID-ydug-1dq5-aya1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:57.216048+00:00 Debian Importer Fixing VCID-qua4-h1r7-a7b7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:57.149952+00:00 Debian Importer Fixing VCID-wv6g-4622-tqdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:57.091645+00:00 Debian Importer Fixing VCID-w7qg-pen7-tfbr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:57.032756+00:00 Debian Importer Fixing VCID-f9bx-xknx-6qbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.983823+00:00 Debian Importer Fixing VCID-sh88-99pv-aqac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.926334+00:00 Debian Importer Fixing VCID-b3pu-ncrc-wbhn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.868666+00:00 Debian Importer Fixing VCID-4fyj-d9qy-fffp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.805011+00:00 Debian Importer Fixing VCID-ba8p-f96g-aqc3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.757483+00:00 Debian Importer Fixing VCID-57rk-q94h-3kgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.709056+00:00 Debian Importer Fixing VCID-s58r-txyg-g3aw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.661376+00:00 Debian Importer Fixing VCID-7sem-1dhy-vbdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.613451+00:00 Debian Importer Fixing VCID-6j79-2nz1-53cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.565128+00:00 Debian Importer Fixing VCID-kv7h-v2g8-6fdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.516357+00:00 Debian Importer Fixing VCID-yrqg-evxw-a7cb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.467223+00:00 Debian Importer Fixing VCID-uf52-su2e-y3ck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.407909+00:00 Debian Importer Fixing VCID-tmfc-jgc1-ykat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.360209+00:00 Debian Importer Fixing VCID-kk9h-cvg8-23he https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.302660+00:00 Debian Importer Fixing VCID-m3za-mbev-uuc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.254851+00:00 Debian Importer Fixing VCID-cy6c-1e49-27cz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.206779+00:00 Debian Importer Fixing VCID-mgz8-9mkb-m3gv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.148977+00:00 Debian Importer Fixing VCID-26nq-rncj-qbbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.097605+00:00 Debian Importer Fixing VCID-9urm-66y7-s3hs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.040280+00:00 Debian Importer Fixing VCID-5j9j-5nv7-wyem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:55.991555+00:00 Debian Importer Fixing VCID-ejd8-7jqx-zbfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:55.943972+00:00 Debian Importer Fixing VCID-fqwt-ecwa-1kex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:55.885856+00:00 Debian Importer Fixing VCID-u9wn-d3kr-7ubj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:55.836841+00:00 Debian Importer Fixing VCID-hcsa-vfvp-buax https://security-tracker.debian.org/tracker/data/json 38.1.0