Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1?distro=trixie
Next non-vulnerable version 4.9.3-1
Latest non-vulnerable version 5.4.0-1
Risk 2.0
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-2ugc-uygs-hqb8
Aliases:
CVE-2025-59024
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.6-0+deb13u1
Affected by 0 other vulnerabilities.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
5.3.1-1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 0 other vulnerabilities.
VCID-cdzz-8tc8-jucu
Aliases:
CVE-2025-59023
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.6-0+deb13u1
Affected by 0 other vulnerabilities.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
5.3.1-1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 0 other vulnerabilities.
VCID-m445-c6a1-uugf
Aliases:
CVE-2026-0398
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
5.3.5-1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 0 other vulnerabilities.
VCID-pjbp-1jgm-s3cg
Aliases:
CVE-2026-24027
Crafted zones can lead to increased incoming network traffic.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
5.3.5-1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 0 other vulnerabilities.
VCID-umcq-ztbz-qfb2
Aliases:
CVE-2025-59030
An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.
5.2.7-0+deb13u1
Affected by 0 other vulnerabilities.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
5.3.3-1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 0 other vulnerabilities.
VCID-wywf-pmyt-zud4
Aliases:
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
5.2.4-2
Affected by 0 other vulnerabilities.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (42)
Vulnerability Summary Aliases
VCID-12cd-ky6m-qkdg security update CVE-2020-12244
VCID-1jzb-z2bs-vbeb security update CVE-2016-7073
VCID-2eyk-9hmz-xybp An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service. The remedy is: upgrade to the patched 5.2.1 version. We would like to thank Volodymyr Ilyin for bringing this issue to our attention. CVE-2025-30195
VCID-2hee-f8gq-rycf An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation. CVE-2019-3807
VCID-2m6r-ztcg-gbgu security update CVE-2016-7068
VCID-36qt-fxee-ruae A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1. CVE-2023-22617
VCID-3e3b-z5bh-pban An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\0' termination.) Under some conditions, this issue can lead to the writing of one '\0' byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution. CVE-2020-10030
VCID-4532-4nm8-6qc8 Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code. CVE-2009-4009
VCID-4c2u-n7p5-nfg4 PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. CVE-2018-14626
VCID-66sa-bc5p-jqde Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. CVE-2023-50387
VCID-67tu-cpzn-t7ep Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache poisoning. CVE-2008-3217
VCID-7dc3-qdk8-k7b2 In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers. CVE-2022-27227
VCID-829g-d7jw-sych A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected. CVE-2024-25583
VCID-8hf9-emba-wbdq Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code. CVE-2009-4010
VCID-8tar-s444-zfac PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties. CVE-2022-37428
VCID-9p7x-52ad-vbh6 An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. CVE-2018-14644
VCID-a7xd-fyh3-xuaq An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default). CVE-2017-15094
VCID-bb3a-3ehq-8bhd PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets. CVE-2015-5311
VCID-ch2d-p2ru-23ex PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. CVE-2018-10851
VCID-d13q-prqh-buge The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself. CVE-2015-1868
VCID-d4km-jg6b-2kh3 An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. CVE-2018-16855
VCID-e3e7-jd2u-fbgk The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets. CVE-2006-2069
VCID-f1cn-ufjb-ffcd PowerDNS: PowerDNS: Assertion failure due to crafted DNS records CVE-2025-59029
VCID-h73s-nkfg-sqgc security update CVE-2017-15120
VCID-htr2-rwgm-47ed A vulnerability in PowerDNS Recursor could lead to a Denial of Service condition. CVE-2020-25829
VCID-jfe5-j391-dubt Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache poisoning. CVE-2008-1637
VCID-kzps-gj5k-8yh3 PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop. CVE-2006-4252
VCID-mbq1-b3dr-1uc4 A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content. CVE-2017-15092
VCID-mkcs-362g-t7aq Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3. CVE-2023-26437
VCID-n2k6-nfxs-7ydj security update CVE-2020-10995
VCID-nfhz-964w-x3e7 Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code. CVE-2014-8601
VCID-nwfa-n5f2-abe7 security update CVE-2015-5470
VCID-rcd7-knv1-xbgd Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets. CVE-2014-3614
VCID-s6ds-tuus-n7hr In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced. CVE-2020-14196
VCID-tcp4-6r2n-6uer When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration. CVE-2017-15093
VCID-urr2-qrfd-vfeh An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records. CVE-2017-15090
VCID-vprj-j7u6-zbe7 Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. CVE-2023-50868
VCID-vua1-5kz6-hban An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua. CVE-2019-3806
VCID-wmgd-z2j3-h7d9 An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service. CVE-2024-25590
VCID-xxxv-krt4-tka1 Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. CVE-2018-1000003
VCID-zdzj-q58r-5uby security update CVE-2016-7074
VCID-zr5j-8ewr-wkby Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length. CVE-2006-4251

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:25:24.355261+00:00 Debian Importer Fixing VCID-67tu-cpzn-t7ep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:25:19.663185+00:00 Debian Importer Fixing VCID-f1cn-ufjb-ffcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:08:39.775969+00:00 Debian Importer Fixing VCID-8hf9-emba-wbdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:08:00.362960+00:00 Debian Importer Fixing VCID-12cd-ky6m-qkdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:01:25.738719+00:00 Debian Importer Fixing VCID-zdzj-q58r-5uby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:58:54.675434+00:00 Debian Importer Fixing VCID-rcd7-knv1-xbgd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:50:49.471009+00:00 Debian Importer Fixing VCID-nfhz-964w-x3e7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:44:01.802628+00:00 Debian Importer Fixing VCID-a7xd-fyh3-xuaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:31:58.766209+00:00 Debian Importer Fixing VCID-e3e7-jd2u-fbgk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:20.257605+00:00 Debian Importer Fixing VCID-4c2u-n7p5-nfg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:15:18.530792+00:00 Debian Importer Fixing VCID-jfe5-j391-dubt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:13:42.341227+00:00 Debian Importer Fixing VCID-kzps-gj5k-8yh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:37.345502+00:00 Debian Importer Fixing VCID-2hee-f8gq-rycf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:14.621798+00:00 Debian Importer Fixing VCID-4532-4nm8-6qc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:00.479610+00:00 Debian Importer Fixing VCID-2eyk-9hmz-xybp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:01.849296+00:00 Debian Importer Fixing VCID-urr2-qrfd-vfeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:11:59.945966+00:00 Debian Importer Fixing VCID-829g-d7jw-sych https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:27.752213+00:00 Debian Importer Fixing VCID-mbq1-b3dr-1uc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:16.237305+00:00 Debian Importer Fixing VCID-9p7x-52ad-vbh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:22.602556+00:00 Debian Importer Fixing VCID-zr5j-8ewr-wkby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:26.697737+00:00 Debian Importer Fixing VCID-vua1-5kz6-hban https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:51.551697+00:00 Debian Importer Fixing VCID-s6ds-tuus-n7hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:50.255464+00:00 Debian Importer Fixing VCID-1jzb-z2bs-vbeb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:07.248909+00:00 Debian Importer Fixing VCID-3e3b-z5bh-pban https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:39.898329+00:00 Debian Importer Fixing VCID-d13q-prqh-buge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:08.066239+00:00 Debian Importer Fixing VCID-ch2d-p2ru-23ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:44.006579+00:00 Debian Importer Fixing VCID-h73s-nkfg-sqgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:46.665650+00:00 Debian Importer Fixing VCID-bb3a-3ehq-8bhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:06.933747+00:00 Debian Importer Fixing VCID-2m6r-ztcg-gbgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:35.561930+00:00 Debian Importer Fixing VCID-nwfa-n5f2-abe7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:56.508068+00:00 Debian Importer Fixing VCID-xxxv-krt4-tka1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:47.732980+00:00 Debian Importer Fixing VCID-htr2-rwgm-47ed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:32.358617+00:00 Debian Importer Fixing VCID-d4km-jg6b-2kh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:03.334677+00:00 Debian Importer Fixing VCID-n2k6-nfxs-7ydj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:13.857265+00:00 Debian Importer Fixing VCID-tcp4-6r2n-6uer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:15.441720+00:00 Debian Importer Fixing VCID-36qt-fxee-ruae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:15:34.565114+00:00 Debian Importer Fixing VCID-67tu-cpzn-t7ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:15:31.550988+00:00 Debian Importer Fixing VCID-f1cn-ufjb-ffcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:30.222647+00:00 Debian Importer Fixing VCID-8hf9-emba-wbdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:01:58.540993+00:00 Debian Importer Fixing VCID-12cd-ky6m-qkdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:03.045897+00:00 Debian Importer Fixing VCID-zdzj-q58r-5uby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:55:07.191806+00:00 Debian Importer Fixing VCID-rcd7-knv1-xbgd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:02.242038+00:00 Debian Importer Fixing VCID-nfhz-964w-x3e7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:52.304821+00:00 Debian Importer Fixing VCID-a7xd-fyh3-xuaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:56.654953+00:00 Debian Importer Fixing VCID-e3e7-jd2u-fbgk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:19.041395+00:00 Debian Importer Fixing VCID-4c2u-n7p5-nfg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:55.139476+00:00 Debian Importer Fixing VCID-jfe5-j391-dubt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:55.690417+00:00 Debian Importer Fixing VCID-kzps-gj5k-8yh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:55.220453+00:00 Debian Importer Fixing VCID-2hee-f8gq-rycf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:21.873071+00:00 Debian Importer Fixing VCID-4532-4nm8-6qc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:03.372275+00:00 Debian Importer Fixing VCID-2eyk-9hmz-xybp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:07.744476+00:00 Debian Importer Fixing VCID-urr2-qrfd-vfeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:48.887699+00:00 Debian Importer Fixing VCID-829g-d7jw-sych https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:41.517945+00:00 Debian Importer Fixing VCID-mbq1-b3dr-1uc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:18.351057+00:00 Debian Importer Fixing VCID-9p7x-52ad-vbh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:40.594739+00:00 Debian Importer Fixing VCID-zr5j-8ewr-wkby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:56.916245+00:00 Debian Importer Fixing VCID-vua1-5kz6-hban https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:28.123050+00:00 Debian Importer Fixing VCID-s6ds-tuus-n7hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:43.204068+00:00 Debian Importer Fixing VCID-1jzb-z2bs-vbeb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:11.392289+00:00 Debian Importer Fixing VCID-3e3b-z5bh-pban https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:34.089373+00:00 Debian Importer Fixing VCID-d13q-prqh-buge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:44.944191+00:00 Debian Importer Fixing VCID-ch2d-p2ru-23ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:47.738289+00:00 Debian Importer Fixing VCID-h73s-nkfg-sqgc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:34.181549+00:00 Debian Importer Fixing VCID-bb3a-3ehq-8bhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:04.935101+00:00 Debian Importer Fixing VCID-2m6r-ztcg-gbgu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:36.754974+00:00 Debian Importer Fixing VCID-nwfa-n5f2-abe7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:55.779820+00:00 Debian Importer Fixing VCID-xxxv-krt4-tka1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:40.237059+00:00 Debian Importer Fixing VCID-htr2-rwgm-47ed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:48.972106+00:00 Debian Importer Fixing VCID-d4km-jg6b-2kh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:42.999944+00:00 Debian Importer Fixing VCID-n2k6-nfxs-7ydj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:21.402794+00:00 Debian Importer Fixing VCID-tcp4-6r2n-6uer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:14.697849+00:00 Debian Importer Fixing VCID-36qt-fxee-ruae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:49:30.991774+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.930387+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.847509+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.776139+00:00 Debian Importer Fixing VCID-f1cn-ufjb-ffcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.714142+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.642996+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.586015+00:00 Debian Importer Fixing VCID-2eyk-9hmz-xybp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.539999+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.486276+00:00 Debian Importer Fixing VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.416189+00:00 Debian Importer Fixing VCID-829g-d7jw-sych https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.356196+00:00 Debian Importer Fixing VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.290958+00:00 Debian Importer Fixing VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.236910+00:00 Debian Importer Fixing VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.175130+00:00 Debian Importer Fixing VCID-36qt-fxee-ruae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.129021+00:00 Debian Importer Fixing VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.081269+00:00 Debian Importer Fixing VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:30.030648+00:00 Debian Importer Fixing VCID-htr2-rwgm-47ed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.981223+00:00 Debian Importer Fixing VCID-s6ds-tuus-n7hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.938136+00:00 Debian Importer Fixing VCID-12cd-ky6m-qkdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.897887+00:00 Debian Importer Fixing VCID-n2k6-nfxs-7ydj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.856109+00:00 Debian Importer Fixing VCID-3e3b-z5bh-pban https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.815672+00:00 Debian Importer Fixing VCID-2hee-f8gq-rycf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.772404+00:00 Debian Importer Fixing VCID-vua1-5kz6-hban https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.730995+00:00 Debian Importer Fixing VCID-d4km-jg6b-2kh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.685006+00:00 Debian Importer Fixing VCID-9p7x-52ad-vbh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.637391+00:00 Debian Importer Fixing VCID-4c2u-n7p5-nfg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.588440+00:00 Debian Importer Fixing VCID-ch2d-p2ru-23ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.543707+00:00 Debian Importer Fixing VCID-xxxv-krt4-tka1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.502022+00:00 Debian Importer Fixing VCID-h73s-nkfg-sqgc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.461335+00:00 Debian Importer Fixing VCID-a7xd-fyh3-xuaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.419643+00:00 Debian Importer Fixing VCID-tcp4-6r2n-6uer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.379238+00:00 Debian Importer Fixing VCID-mbq1-b3dr-1uc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.337221+00:00 Debian Importer Fixing VCID-urr2-qrfd-vfeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.296029+00:00 Debian Importer Fixing VCID-zdzj-q58r-5uby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.254733+00:00 Debian Importer Fixing VCID-1jzb-z2bs-vbeb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.212894+00:00 Debian Importer Fixing VCID-2m6r-ztcg-gbgu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.169493+00:00 Debian Importer Fixing VCID-nwfa-n5f2-abe7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.127320+00:00 Debian Importer Fixing VCID-bb3a-3ehq-8bhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.085971+00:00 Debian Importer Fixing VCID-d13q-prqh-buge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.044609+00:00 Debian Importer Fixing VCID-nfhz-964w-x3e7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:29.002943+00:00 Debian Importer Fixing VCID-rcd7-knv1-xbgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:28.962775+00:00 Debian Importer Fixing VCID-8hf9-emba-wbdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:28.921817+00:00 Debian Importer Fixing VCID-4532-4nm8-6qc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:28.876445+00:00 Debian Importer Fixing VCID-67tu-cpzn-t7ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:28.832792+00:00 Debian Importer Fixing VCID-jfe5-j391-dubt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:28.787985+00:00 Debian Importer Fixing VCID-kzps-gj5k-8yh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:28.737939+00:00 Debian Importer Fixing VCID-zr5j-8ewr-wkby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:28.690467+00:00 Debian Importer Fixing VCID-e3e7-jd2u-fbgk https://security-tracker.debian.org/tracker/data/json 38.1.0