Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/nova@2:33.0.0-2?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (65)
Vulnerability Summary Aliases
VCID-1fb2-ccby-7yfq An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected. CVE-2020-17376
GHSA-c7w7-9c85-4qxv
PYSEC-2020-243
VCID-1p1c-fevy-bydg Insufficient Verification of Data Authenticity It was discovered that the OpenStack Compute (nova) console websocket does not correctly verify the origin header. An attacker could use this flaw to conduct a cross-site websocket hijack attack. Note that only Compute setups with VNC or SPICE enabled were affected by this flaw. CVE-2015-0259
GHSA-x8xr-rm9r-7mvf
VCID-1qbm-qguj-gkem OpenStack Nova Filter Scheduler Bypass In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3. CVE-2017-16239
GHSA-w2wf-cgwh-vpqg
VCID-2dpk-ncrc-1fcw An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data. CVE-2019-14433
GHSA-pg64-r7rr-phv8
PYSEC-2019-191
VCID-4475-ffcq-cff8 Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when used over libvirt-based hypervisors, allows remote authenticated users to write arbitrary files to the disk image via a .. (dot dot) in the path attribute of a file element. CVE-2012-3360
GHSA-m454-cm7h-rqhh
PYSEC-2012-38
VCID-5nfz-1bk3-93fe OpenStack Nova instance migration process does not stop when instance is deleted OpenStack Compute (nova) 2015.1 through 2015.1.1, 2014.2.3, and earlier does not stop the migration process when the instance is deleted, which allows remote authenticated users to cause a denial of service (disk, network, and other resource consumption) by resizing and then deleting an instance. CVE-2015-3241
GHSA-3vx7-xff6-h2vx
VCID-5tkb-w761-4qc6 keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora. CVE-2013-2030
GHSA-pxxv-rv32-2qgv
PYSEC-2013-45
VCID-5w9q-vw2n-zfdu OpenStack Nova Denial of Service in network source security groups Algorithmic complexity vulnerability in OpenStack Compute (Nova) before 2013.1.3 and Havana before havana-3 does not properly handle network source security group policy updates, which allows remote authenticated users to cause a denial of service (nova-network consumption) via a large number of server-creation operations, which triggers a large number of update requests. CVE-2013-4185
GHSA-ph2h-hh49-vh27
VCID-6n3z-x4zj-4bez OpenStack Compute (Nova) allows remote attackers to bypass intended restriction A vulnerability was discovered in the way OpenStack Compute (nova) networking handled security group updates; changes were not applied to already running VM instances. A remote attacker could use this flaw to access running VM instances. CVE-2015-7713
GHSA-67rh-9p29-vrxr
VCID-7wvt-bvww-g7ck OpenStack Compute (Nova) Resource limit circumvention in Nova private flavors The "create an instance" API in OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly enforce the os-flavor-access:is_public property, which allows remote authenticated users to boot arbitrary flavors by guessing the flavor id. NOTE: this issue is due to an incomplete fix for CVE-2013-2256. CVE-2013-4278
GHSA-43cm-73px-5v4m
VCID-7yp4-ebnm-g3c3 OpenStack Nova host data access through resize/migration The libvirt driver in OpenStack Compute (Nova) before 2015.1.4 (kilo) and 12.0.x before 12.0.3 (liberty), when using raw storage and use_cow_images is set to false, allows remote authenticated users to read arbitrary files via a crafted qcow2 header in an ephemeral or root disk. CVE-2016-2140
GHSA-49jv-37hm-6gfp
VCID-9se5-m6dx-8kcj OpenStack Nova Potential Xen connection password leak via StorageError The volume_utils._parse_volume_info function in OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty) includes the connection_info dictionary in the StorageError message when using the Xen backend, which might allow attackers to obtain sensitive password information by reading log files or other unspecified vectors. CVE-2015-8749
GHSA-c36r-g737-9qp8
VCID-9vq2-2nsa-bbfa openstack-nova: Nova VMware driver may connect VNC to another tenant's console CVE-2014-8750
VCID-az4e-wgmd-gyc3 OpenStack Compute (Nova) Denial of service due to improper validation of virtual size of QCOW2 image OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. CVE-2013-4469
GHSA-2w87-5qcj-j6gx
VCID-bauj-n7jg-gkd2 OpenStack Compute (Nova) Denial of Service vulnerability A denial of service flaw was found in the way OpenStack Compute (nova) looked up VM instances based on an IP address filter. An attacker with sufficient privileges on an OpenStack installation with a large amount of VMs could use this flaw to cause the main nova process to block for an extended amount of time. CVE-2014-3708
GHSA-43hc-pwvx-pmfg
VCID-br4q-499g-vqhg OpenStack Cinder, glance, and Nova vulnerable to Path Traversal An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. CVE-2022-47951
GHSA-7h75-hwxx-qpgc
VCID-c7ya-v12e-8bfq virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image. CVE-2012-3361
GHSA-cm54-3vvf-f5p8
PYSEC-2012-39
VCID-cwub-w9dp-wfgy OpenStack Nova DoS by rebuilding the same instance with a new image multiple times An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This regression was introduced with the fix for OSSA-2017-005 (CVE-2017-16239); however, only Nova stable/pike or later deployments with that fix applied and relying on the default FilterScheduler are affected. CVE-2017-17051
GHSA-vq76-rxx3-4r4r
VCID-cy7p-gzf8-eqcj OpenStack Nova Denial of service attack on the compute host An issue was discovered in OpenStack Nova 15.x through 15.1.0 and 16.x through 16.1.1. By detaching and reattaching an encrypted volume, an attacker may access the underlying raw volume and corrupt the LUKS header, resulting in a denial of service attack on the compute host. (The same code error also results in data loss, but that is not a vulnerability because the user loses their own data.) All Nova setups supporting encrypted volumes are affected. CVE-2017-18191
GHSA-ffmh-r67w-m88f
VCID-dxxx-4thc-fyfh virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3361. CVE-2012-3447
GHSA-xc4g-7vw8-924h
PYSEC-2012-21
VCID-e1f1-xt6n-rqfp OpenStack Nova Exposure of Sensitive Information to an Unauthorized Actor OpenStack Nova before 2012.1 allows someone with access to an EC2_ACCESS_KEY (equivalent to a username) to obtain the EC2_SECRET_KEY (equivalent to a password). Exposing the EC2_ACCESS_KEY via http or tools that allow man-in-the-middle over https could allow an attacker to easily obtain the EC2_SECRET_KEY. An attacker could also presumably brute force values for EC2_ACCESS_KEY. CVE-2011-4076
GHSA-vcmv-6rxx-fh7r
VCID-e6ne-73mv-73bc OpenStack Nova vulnerable to unauthorized access to potentially sensitive data In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498. CVE-2024-40767
GHSA-rm86-h44c-2r2m
VCID-ek6e-977t-3bew OpenStack Compute (nova) allows remote authenticated users to cause a denial of service A flaw was found in the way OpenStack Compute (nova) handled the resize state. If an authenticated user deleted an instance while it was in the resize state, it could cause the original instance to not be deleted from the compute node it was running on, allowing the user to cause a denial of service. CVE-2015-3280
GHSA-mfmj-gwg3-vhw7
VCID-ekfe-svz5-bbcq Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security group rules, which allows remote authenticated users with certain permissions to cause a denial of service (CPU and hard drive consumption) via a network request that triggers a large number of iptables rules. CVE-2012-2101
GHSA-hq3f-9gf7-73r8
PYSEC-2012-36
VCID-ex1j-py3q-93hv Exposure of Sensitive Information to an Unauthorized Actor api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests. CVE-2014-3517
GHSA-xjmj-p278-4jp5
VCID-h6rd-5p7q-s3gq OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. CVE-2024-32498
GHSA-r4v4-w9pv-6fph
VCID-hcsa-vfvp-buax OpenStack Nova Router metadata queries are not restricted by tenant Interaction error in OpenStack Nova and Neutron before Havana 2013.2.1 and icehouse-1 does not validate the instance ID of the tenant making a request, which allows remote tenants to obtain sensitive metadata by spoofing the device ID that is bound to a port, which is not properly handled by (1) api/metadata/handler.py in Nova and (2) the neutron-metadata-agent (`agent/metadata/agent.py`) in Neutron. CVE-2013-6419
GHSA-22w9-j288-8p9w
VCID-hd9e-1msb-uqa6 openstack-cinder: silently access other user's volumes CVE-2023-2088
VCID-hgk8-jtvw-9fgb nova: qpid SSL configuration CVE-2013-6491
VCID-hur9-b4y5-euek OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly implement a quota for fixed IPs, which allows remote authenticated users to cause a denial of service (resource exhaustion and failure to spawn new instances) via a large number of calls to the addFixedIp function. CVE-2013-1838
GHSA-63fq-8fp9-vhwq
PYSEC-2013-44
VCID-jdb7-71q5-pfcx OpenStack Nova logs sensitive context from notification exceptions An issue was discovered in exception_wrapper.py in OpenStack Nova 13.x through 13.1.3, 14.x through 14.0.4, and 15.x through 15.0.1. Legacy notification exception contexts appearing in ERROR level logs may include sensitive information such as account passwords and authorization tokens. CVE-2017-7214
GHSA-f4g4-cj8f-3cr9
VCID-jdn1-d4d3-sud7 The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse before 2014.1, when using libvirt to spawn images and use_cow_images is set to false, allows remote authenticated users to read certain compute host files by overwriting an instance disk with a crafted image. CVE-2014-0134
GHSA-w429-xc55-hc48
PYSEC-2014-112
VCID-k48d-ecqx-m3ed openstack-nova: May fail to delete images in resize state regression CVE-2016-7498
VCID-kncr-vrmh-fygm The OpenStack Nova (python-nova) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.2 and 1:2014.1-0 before 1:2014.1-0ubuntu1.2 and Openstack Cinder (python-cinder) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.1 and 1:2014.1-0 before 1:2014.1-0ubuntu1.1 for Ubuntu 13.10 and 14.04 LTS does not properly set the sudo configuration, which makes it easier for attackers to gain privileges by leveraging another vulnerability. CVE-2013-1068
VCID-kqbu-drg3-fycm OpenStack Nova denial of service through compressed disk images OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. CVE-2013-4463
GHSA-5644-2v3h-5w4x
VCID-m5vc-4my3-87gk OpenStack Nova Changing vnic_type breaks compute service restart An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected. CVE-2022-37394
GHSA-v725-c588-h936
VCID-n6d6-1kyd-qufe OpenStack Compute Nova Improper Access Control The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions. CVE-2013-4497
GHSA-27q4-38qf-m25h
VCID-nb1y-cbzs-abhc openstack-nova: Unprivileged API user can access host data using instance snapshot CVE-2015-7548
VCID-nh9z-sxay-fkdv The Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when DifferentHostFilter or SameHostFilter is enabled, allows remote authenticated users to cause a denial of service (excessive database lookup calls and server hang) via a request with many repeated IDs in the os:scheduler_hints section. CVE-2012-3371
GHSA-xxgm-qpj5-4886
PYSEC-2012-40
VCID-nryd-hrub-cydj OpenStack Compute (Nova) Folsom before 2012.2.2 and Grizzly, when using libvirt and LVM backed instances, does not properly clear physical volume (PV) content when reallocating for instances, which allows attackers to obtain sensitive information by reading the memory of the previous logical volume (LV). CVE-2012-5625
GHSA-rwhr-h69g-8qmq
PYSEC-2012-41
VCID-p288-4te1-6qhc Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter. CVE-2012-0030
VCID-q246-vzd6-3qfb OpenStack Compute (Nova) allows remote authenticated users to gain privileges via API requests The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authenticated users to gain privileges via these API requests. CVE-2014-0167
GHSA-p258-xmh3-72pv
VCID-q9q9-jegz-pfa2 OpenStack Nova Multiple directory traversal vulnerabilities Multiple directory traversal vulnerabilities in OpenStack Nova before 2011.3.1, when the EC2 API and the S3/RegisterImage image-registration method are enabled, allow remote authenticated users to overwrite arbitrary files via a crafted (1) tarball or (2) manifest. CVE-2011-4596
GHSA-qr62-r9xc-r2gj
VCID-qb9p-rpza-5fa5 OpenStack Compute (Nova) allows remote authenticated users to obtain sensitive information CVE-2013-2256 OpenStack: Nova private flavors resource limit circumvention CVE-2013-2256
GHSA-5mj6-643f-2g85
VCID-qe1w-wnfu-mudr OpenStack: openstack-nova-compute console-log DoS CVE-2013-4261
VCID-qfdm-g857-3yb5 OpenStack Nova can leak consoleauth token into log files An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to `NovaProxyRequestHandlerBase.new_websocket_client` in `console/websocketproxy.py`. CVE-2015-9543
GHSA-22jm-4hxw-35jf
VCID-qnhs-qv3p-myg2 The VMWare driver in OpenStack Compute (Nova) 2013.2 through 2013.2.2 does not properly put VMs into RESCUE status, which allows remote authenticated users to bypass the quota limit and cause a denial of service (resource consumption) by requesting the VM be put into rescue and then deleting the image. CVE-2014-2573
GHSA-jv34-xvjq-ppch
PYSEC-2014-113
VCID-r558-z5xb-v3a8 OpenStack Nova VMware instance leak potentially leading to compute DoS The VMware driver in OpenStack Compute (Nova) before 2014.1.4 allows remote authenticated users to cause a denial of service (disk consumption) by deleting an instance in the resize state. CVE-2014-8333
GHSA-g63p-mfcm-54c4
VCID-rqyj-x6hj-g7fp OpenStack Nova Long server names grow nova-api log files significantly OpenStack Compute (Nova) Essex before 2011.3 allows remote authenticated users to cause a denial of service (Nova-API log file and disk consumption) via a long server name. CVE-2012-1585
GHSA-pjvw-p2v5-wf6q
VCID-rvp9-etcr-wycj OpenStack Nova DoS through ephemeral disk backing files The libvirt driver in OpenStack Compute (Nova) before 2013.2.2 and icehouse before icehouse-2 allows remote authenticated users to cause a denial of service (disk consumption) by creating and deleting instances with unique os_type settings, which triggers the creation of a new ephemeral disk backing file. CVE-2013-6437
GHSA-hrv9-4x4c-9jc8
VCID-s69v-tc7x-37fe OpenStack Nova calls qemu-img without format restrictions for resize An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected. CVE-2026-24708
GHSA-m4f3-qp2w-gwh6
VCID-sj2k-uq1g-suby Improper Restriction of Operations within the Bounds of a Memory Buffer CVE-2013-4179 OpenStack: Nova XML entities DoS CVE-2013-4179
GHSA-j6xh-q826-55jw
VCID-t2sh-b3m5-vyax OpenStack Compute (Nova) does not verify the virtual size of a QCOW2 image OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by creating an image with a large virtual size that does not contain a large amount of data. CVE-2013-2096
GHSA-m674-hmx2-ffhq
VCID-t88t-p8tx-cfcu Multiple vulnerabilities have been found in libxml2, allowing remote attackers to execute arbitrary code or cause Denial of Service. CVE-2013-1664
GHSA-qrh7-x6fp-c2mp
VCID-tbxf-ky56-w7h5 openstack-nova: Boot from volume allows access to random volumes CVE-2013-0208
VCID-v47b-k4qx-h7a2 OpenStack Nova live snapshots use an insecure local directory OpenStack Compute (Nova) Grizzly 2013.1.4, Havana 2013.2.1, and earlier uses world-writable and world-readable permissions for the temporary directory used to store live snapshots, which allows local users to read and modify live snapshots. CVE-2013-7048
GHSA-grp5-h379-j75x
VCID-v87z-d6p9-43c5 The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions. CVE-2012-2654
GHSA-46r8-9cj7-pw6g
PYSEC-2012-37
VCID-vena-h39k-v3fe The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver in OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, when using KVM live block migration, does not properly create all expected files, which allows attackers to obtain snapshot root disk contents of other users via ephemeral storage. CVE-2013-7130
GHSA-99rx-9x8v-9j8p
PYSEC-2014-111
VCID-wvc4-8zmb-6ucg Openstack nova qcow format could expose host filesystem information Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem. CVE-2011-3147
GHSA-hqfx-4x4w-vmwp
VCID-x5k4-dm9d-xkf7 OpenStack Compute (Nova)'s VMWare driver vulnerable to denial of service CVE-2014-3608 openstack-nova: incomplete fix for CVE-2014-2573, Nova VMware driver still leaks rescued images CVE-2014-3608
GHSA-92hc-c226-32q7
VCID-y8va-eyt2-3kfv OpenStack Compute (nova) Icehouse, Juno and Havana when live migration fails allows local users to access VM volumes that they would normally not have permissions for. CVE-2015-2687
GHSA-97fv-22hc-mrgj
PYSEC-2017-145
VCID-ykzj-fz7y-eug8 Trove: potential leak of passwords into log files CVE-2014-7230
VCID-z5wc-py2m-6qhz OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to gain access to a VM in opportunistic circumstances by using the VNC token for a deleted VM that was bound to the same VNC port. CVE-2013-0335
GHSA-qfp8-hfqx-c79c
PYSEC-2013-43
VCID-zwuz-pgjz-rkb9 URL Redirection to Untrusted Site ('Open Redirect') A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL. CVE-2021-3654
GHSA-vqp6-j452-j6wp
VCID-zy9m-d25c-5uga OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. CVE-2015-5162
GHSA-g2j5-7vgx-6xrx

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:29:36.078660+00:00 Debian Importer Fixing VCID-qe1w-wnfu-mudr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:29:25.734723+00:00 Debian Importer Fixing VCID-6n3z-x4zj-4bez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:27:55.551735+00:00 Debian Importer Fixing VCID-1qbm-qguj-gkem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:35.974511+00:00 Debian Importer Fixing VCID-az4e-wgmd-gyc3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:22:55.708097+00:00 Debian Importer Fixing VCID-zy9m-d25c-5uga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:21.741300+00:00 Debian Importer Fixing VCID-q9q9-jegz-pfa2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:15:34.251678+00:00 Debian Importer Fixing VCID-qnhs-qv3p-myg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:07:43.233601+00:00 Debian Importer Fixing VCID-h6rd-5p7q-s3gq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:07:01.996560+00:00 Debian Importer Fixing VCID-qb9p-rpza-5fa5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:03:07.190234+00:00 Debian Importer Fixing VCID-rqyj-x6hj-g7fp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:02:42.015313+00:00 Debian Importer Fixing VCID-4475-ffcq-cff8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:00:16.982377+00:00 Debian Importer Fixing VCID-vena-h39k-v3fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:59:07.987928+00:00 Debian Importer Fixing VCID-dxxx-4thc-fyfh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:54:18.331279+00:00 Debian Importer Fixing VCID-9vq2-2nsa-bbfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:47:12.837033+00:00 Debian Importer Fixing VCID-7wvt-bvww-g7ck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:44:21.942589+00:00 Debian Importer Fixing VCID-ekfe-svz5-bbcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:42:44.016604+00:00 Debian Importer Fixing VCID-e1f1-xt6n-rqfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:22:11.301475+00:00 Debian Importer Fixing VCID-hgk8-jtvw-9fgb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:41.122809+00:00 Debian Importer Fixing VCID-5nfz-1bk3-93fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:53.459268+00:00 Debian Importer Fixing VCID-v47b-k4qx-h7a2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:40.227144+00:00 Debian Importer Fixing VCID-r558-z5xb-v3a8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:40.736523+00:00 Debian Importer Fixing VCID-7yp4-ebnm-g3c3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:44.485694+00:00 Debian Importer Fixing VCID-q246-vzd6-3qfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:21.635349+00:00 Debian Importer Fixing VCID-hcsa-vfvp-buax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:02.199947+00:00 Debian Importer Fixing VCID-y8va-eyt2-3kfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:20:22.113906+00:00 Debian Importer Fixing VCID-z5wc-py2m-6qhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:21.046404+00:00 Debian Importer Fixing VCID-wvc4-8zmb-6ucg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:39.927280+00:00 Debian Importer Fixing VCID-sj2k-uq1g-suby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:49.328245+00:00 Debian Importer Fixing VCID-5tkb-w761-4qc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:20.695747+00:00 Debian Importer Fixing VCID-x5k4-dm9d-xkf7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:32.115658+00:00 Debian Importer Fixing VCID-nh9z-sxay-fkdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:12.012751+00:00 Debian Importer Fixing VCID-qfdm-g857-3yb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:25.346209+00:00 Debian Importer Fixing VCID-s69v-tc7x-37fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:50.724001+00:00 Debian Importer Fixing VCID-5w9q-vw2n-zfdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:37:54.279562+00:00 Debian Importer Fixing VCID-t88t-p8tx-cfcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:37:41.095916+00:00 Debian Importer Fixing VCID-jdn1-d4d3-sud7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:37:00.573728+00:00 Debian Importer Fixing VCID-jdb7-71q5-pfcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:57.861560+00:00 Debian Importer Fixing VCID-kqbu-drg3-fycm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:45.937041+00:00 Debian Importer Fixing VCID-ykzj-fz7y-eug8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:57.224077+00:00 Debian Importer Fixing VCID-c7ya-v12e-8bfq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:43.098209+00:00 Debian Importer Fixing VCID-cy7p-gzf8-eqcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:24.952626+00:00 Debian Importer Fixing VCID-t2sh-b3m5-vyax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:10.493011+00:00 Debian Importer Fixing VCID-1p1c-fevy-bydg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:00.003317+00:00 Debian Importer Fixing VCID-9se5-m6dx-8kcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:43.307787+00:00 Debian Importer Fixing VCID-bauj-n7jg-gkd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:24.095667+00:00 Debian Importer Fixing VCID-1fb2-ccby-7yfq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:47.329083+00:00 Debian Importer Fixing VCID-p288-4te1-6qhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:19.576282+00:00 Debian Importer Fixing VCID-2dpk-ncrc-1fcw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:16.179318+00:00 Debian Importer Fixing VCID-hur9-b4y5-euek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:17.141540+00:00 Debian Importer Fixing VCID-k48d-ecqx-m3ed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:22.188791+00:00 Debian Importer Fixing VCID-nryd-hrub-cydj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:20.912128+00:00 Debian Importer Fixing VCID-nb1y-cbzs-abhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:28.499628+00:00 Debian Importer Fixing VCID-kncr-vrmh-fygm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:10.825430+00:00 Debian Importer Fixing VCID-ek6e-977t-3bew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:54.402616+00:00 Debian Importer Fixing VCID-ex1j-py3q-93hv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:03.597380+00:00 Debian Importer Fixing VCID-br4q-499g-vqhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:26.298154+00:00 Debian Importer Fixing VCID-n6d6-1kyd-qufe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:22.324663+00:00 Debian Importer Fixing VCID-v87z-d6p9-43c5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:00.060993+00:00 Debian Importer Fixing VCID-tbxf-ky56-w7h5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:04.090496+00:00 Debian Importer Fixing VCID-e6ne-73mv-73bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:02.097923+00:00 Debian Importer Fixing VCID-rvp9-etcr-wycj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:24.318238+00:00 Debian Importer Fixing VCID-cwub-w9dp-wfgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:18:41.506193+00:00 Debian Importer Fixing VCID-qe1w-wnfu-mudr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:18:33.861430+00:00 Debian Importer Fixing VCID-6n3z-x4zj-4bez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:17:29.199491+00:00 Debian Importer Fixing VCID-1qbm-qguj-gkem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:14:58.126128+00:00 Debian Importer Fixing VCID-az4e-wgmd-gyc3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:13:38.680092+00:00 Debian Importer Fixing VCID-zy9m-d25c-5uga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:09:59.626029+00:00 Debian Importer Fixing VCID-q9q9-jegz-pfa2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:51.629738+00:00 Debian Importer Fixing VCID-qnhs-qv3p-myg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:01:44.955477+00:00 Debian Importer Fixing VCID-h6rd-5p7q-s3gq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:01:13.206941+00:00 Debian Importer Fixing VCID-qb9p-rpza-5fa5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:20.672047+00:00 Debian Importer Fixing VCID-rqyj-x6hj-g7fp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:00.490929+00:00 Debian Importer Fixing VCID-4475-ffcq-cff8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:56:12.870175+00:00 Debian Importer Fixing VCID-vena-h39k-v3fe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:55:18.127524+00:00 Debian Importer Fixing VCID-dxxx-4thc-fyfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:36.890359+00:00 Debian Importer Fixing VCID-9vq2-2nsa-bbfa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:14.678306+00:00 Debian Importer Fixing VCID-7wvt-bvww-g7ck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:44:07.135354+00:00 Debian Importer Fixing VCID-ekfe-svz5-bbcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:54.827780+00:00 Debian Importer Fixing VCID-e1f1-xt6n-rqfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:27:47.528133+00:00 Debian Importer Fixing VCID-hgk8-jtvw-9fgb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:15.000129+00:00 Debian Importer Fixing VCID-5nfz-1bk3-93fe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:45.228153+00:00 Debian Importer Fixing VCID-v47b-k4qx-h7a2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:16:48.760574+00:00 Debian Importer Fixing VCID-r558-z5xb-v3a8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:10.694316+00:00 Debian Importer Fixing VCID-7yp4-ebnm-g3c3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:59.920364+00:00 Debian Importer Fixing VCID-q246-vzd6-3qfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:39.439512+00:00 Debian Importer Fixing VCID-hcsa-vfvp-buax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:05.410140+00:00 Debian Importer Fixing VCID-y8va-eyt2-3kfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:04.932671+00:00 Debian Importer Fixing VCID-z5wc-py2m-6qhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:33.475915+00:00 Debian Importer Fixing VCID-wvc4-8zmb-6ucg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:51.746374+00:00 Debian Importer Fixing VCID-sj2k-uq1g-suby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:12.580952+00:00 Debian Importer Fixing VCID-5tkb-w761-4qc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:04.312446+00:00 Debian Importer Fixing VCID-x5k4-dm9d-xkf7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:25.953807+00:00 Debian Importer Fixing VCID-nh9z-sxay-fkdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:23.056406+00:00 Debian Importer Fixing VCID-qfdm-g857-3yb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:06.800798+00:00 Debian Importer Fixing VCID-s69v-tc7x-37fe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:55.181474+00:00 Debian Importer Fixing VCID-5w9q-vw2n-zfdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:11.360062+00:00 Debian Importer Fixing VCID-t88t-p8tx-cfcu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:00.702999+00:00 Debian Importer Fixing VCID-jdn1-d4d3-sud7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:30.938204+00:00 Debian Importer Fixing VCID-jdb7-71q5-pfcx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:35.567561+00:00 Debian Importer Fixing VCID-kqbu-drg3-fycm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:47.551371+00:00 Debian Importer Fixing VCID-ykzj-fz7y-eug8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:18.464606+00:00 Debian Importer Fixing VCID-c7ya-v12e-8bfq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:09.537720+00:00 Debian Importer Fixing VCID-cy7p-gzf8-eqcj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:08.800206+00:00 Debian Importer Fixing VCID-t2sh-b3m5-vyax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:30.216774+00:00 Debian Importer Fixing VCID-1p1c-fevy-bydg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:27.533132+00:00 Debian Importer Fixing VCID-9se5-m6dx-8kcj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:22.584307+00:00 Debian Importer Fixing VCID-bauj-n7jg-gkd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:43.100873+00:00 Debian Importer Fixing VCID-1fb2-ccby-7yfq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:13.052554+00:00 Debian Importer Fixing VCID-p288-4te1-6qhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:34.574864+00:00 Debian Importer Fixing VCID-2dpk-ncrc-1fcw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:37.528737+00:00 Debian Importer Fixing VCID-hur9-b4y5-euek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:58.209157+00:00 Debian Importer Fixing VCID-k48d-ecqx-m3ed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:33.452060+00:00 Debian Importer Fixing VCID-nryd-hrub-cydj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:26.053768+00:00 Debian Importer Fixing VCID-nb1y-cbzs-abhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:55.401590+00:00 Debian Importer Fixing VCID-kncr-vrmh-fygm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:04.182717+00:00 Debian Importer Fixing VCID-ek6e-977t-3bew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:21.333263+00:00 Debian Importer Fixing VCID-ex1j-py3q-93hv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:14.532932+00:00 Debian Importer Fixing VCID-br4q-499g-vqhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:53.330576+00:00 Debian Importer Fixing VCID-n6d6-1kyd-qufe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:50.874763+00:00 Debian Importer Fixing VCID-v87z-d6p9-43c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:29.292344+00:00 Debian Importer Fixing VCID-tbxf-ky56-w7h5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:56.379194+00:00 Debian Importer Fixing VCID-e6ne-73mv-73bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:00.100733+00:00 Debian Importer Fixing VCID-rvp9-etcr-wycj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:47.253519+00:00 Debian Importer Fixing VCID-cwub-w9dp-wfgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-06T03:06:02.046278+00:00 Debian Importer Fixing VCID-s69v-tc7x-37fe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.980929+00:00 Debian Importer Fixing VCID-e6ne-73mv-73bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.935185+00:00 Debian Importer Fixing VCID-h6rd-5p7q-s3gq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.875906+00:00 Debian Importer Fixing VCID-hd9e-1msb-uqa6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.817267+00:00 Debian Importer Fixing VCID-br4q-499g-vqhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.766812+00:00 Debian Importer Fixing VCID-m5vc-4my3-87gk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.711893+00:00 Debian Importer Fixing VCID-zwuz-pgjz-rkb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.658880+00:00 Debian Importer Fixing VCID-1fb2-ccby-7yfq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.610078+00:00 Debian Importer Fixing VCID-2dpk-ncrc-1fcw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.561308+00:00 Debian Importer Fixing VCID-jdb7-71q5-pfcx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.514852+00:00 Debian Importer Fixing VCID-cy7p-gzf8-eqcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.473960+00:00 Debian Importer Fixing VCID-cwub-w9dp-wfgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.425889+00:00 Debian Importer Fixing VCID-1qbm-qguj-gkem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.378997+00:00 Debian Importer Fixing VCID-k48d-ecqx-m3ed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.338481+00:00 Debian Importer Fixing VCID-7yp4-ebnm-g3c3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.296264+00:00 Debian Importer Fixing VCID-qfdm-g857-3yb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.248665+00:00 Debian Importer Fixing VCID-9se5-m6dx-8kcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.208719+00:00 Debian Importer Fixing VCID-6n3z-x4zj-4bez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.167592+00:00 Debian Importer Fixing VCID-nb1y-cbzs-abhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.127090+00:00 Debian Importer Fixing VCID-zy9m-d25c-5uga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.085140+00:00 Debian Importer Fixing VCID-ek6e-977t-3bew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:01.037388+00:00 Debian Importer Fixing VCID-5nfz-1bk3-93fe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.990590+00:00 Debian Importer Fixing VCID-y8va-eyt2-3kfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.948809+00:00 Debian Importer Fixing VCID-1p1c-fevy-bydg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.901942+00:00 Debian Importer Fixing VCID-9vq2-2nsa-bbfa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.861726+00:00 Debian Importer Fixing VCID-r558-z5xb-v3a8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.820160+00:00 Debian Importer Fixing VCID-ykzj-fz7y-eug8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.774639+00:00 Debian Importer Fixing VCID-bauj-n7jg-gkd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.734675+00:00 Debian Importer Fixing VCID-x5k4-dm9d-xkf7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.692078+00:00 Debian Importer Fixing VCID-ex1j-py3q-93hv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.642962+00:00 Debian Importer Fixing VCID-qnhs-qv3p-myg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.593842+00:00 Debian Importer Fixing VCID-q246-vzd6-3qfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.539517+00:00 Debian Importer Fixing VCID-jdn1-d4d3-sud7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.490703+00:00 Debian Importer Fixing VCID-vena-h39k-v3fe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.442503+00:00 Debian Importer Fixing VCID-v47b-k4qx-h7a2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.395442+00:00 Debian Importer Fixing VCID-hgk8-jtvw-9fgb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.354836+00:00 Debian Importer Fixing VCID-rvp9-etcr-wycj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.313124+00:00 Debian Importer Fixing VCID-hcsa-vfvp-buax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.272449+00:00 Debian Importer Fixing VCID-n6d6-1kyd-qufe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.231063+00:00 Debian Importer Fixing VCID-az4e-wgmd-gyc3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.181718+00:00 Debian Importer Fixing VCID-kqbu-drg3-fycm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.132212+00:00 Debian Importer Fixing VCID-7wvt-bvww-g7ck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.084517+00:00 Debian Importer Fixing VCID-qe1w-wnfu-mudr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:06:00.041610+00:00 Debian Importer Fixing VCID-5w9q-vw2n-zfdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.994474+00:00 Debian Importer Fixing VCID-sj2k-uq1g-suby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.951333+00:00 Debian Importer Fixing VCID-qb9p-rpza-5fa5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.901587+00:00 Debian Importer Fixing VCID-t2sh-b3m5-vyax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.855288+00:00 Debian Importer Fixing VCID-5tkb-w761-4qc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.813995+00:00 Debian Importer Fixing VCID-hur9-b4y5-euek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.766275+00:00 Debian Importer Fixing VCID-t88t-p8tx-cfcu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.718638+00:00 Debian Importer Fixing VCID-kncr-vrmh-fygm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.669918+00:00 Debian Importer Fixing VCID-z5wc-py2m-6qhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.615786+00:00 Debian Importer Fixing VCID-tbxf-ky56-w7h5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.570669+00:00 Debian Importer Fixing VCID-nryd-hrub-cydj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.519322+00:00 Debian Importer Fixing VCID-dxxx-4thc-fyfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.471068+00:00 Debian Importer Fixing VCID-nh9z-sxay-fkdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.421713+00:00 Debian Importer Fixing VCID-c7ya-v12e-8bfq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.373207+00:00 Debian Importer Fixing VCID-4475-ffcq-cff8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.324916+00:00 Debian Importer Fixing VCID-v87z-d6p9-43c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.276090+00:00 Debian Importer Fixing VCID-ekfe-svz5-bbcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.227957+00:00 Debian Importer Fixing VCID-rqyj-x6hj-g7fp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.180845+00:00 Debian Importer Fixing VCID-p288-4te1-6qhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.140687+00:00 Debian Importer Fixing VCID-q9q9-jegz-pfa2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.099929+00:00 Debian Importer Fixing VCID-e1f1-xt6n-rqfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T03:05:59.059623+00:00 Debian Importer Fixing VCID-wvc4-8zmb-6ucg https://security-tracker.debian.org/tracker/data/json 38.1.0