Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/python2.7@0?distro=bullseye
purl pkg:deb/debian/python2.7@0?distro=bullseye
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (36)
Vulnerability Summary Aliases
VCID-1hw3-vhwb-nkcd Multiple vulberabilities have been discovered in Python and PyPy, the worst of which can lead to privilege escalation. CVE-2024-12718
VCID-1pr1-jkqa-43g6 cpython: CPython: Logging Bypass in Legacy .pyc File Handling CVE-2026-2297
VCID-22da-bqwg-2fdf python: rgbimg: multiple security issues CVE-2010-1450
VCID-2j3t-a3r6-vfg7 Multiple vulnerabilities have been found in Python, the worst of which might allow attackers to access sensitive information. CVE-2021-3426
VCID-2v5u-2z4w-ffgx python: incorrect IPv4 and IPv6 private ranges CVE-2024-4032
VCID-34fd-g6ss-t3fj python: Integer overflow in Modules/_pickle.c allows for memory exhaustion if serializing gigabytes of data CVE-2018-20406
VCID-4afh-28ss-mudf Multiple vulberabilities have been discovered in Python and PyPy, the worst of which can lead to privilege escalation. CVE-2025-4138
VCID-4pej-k4vs-j3d2 python: sys.path allowing code to be loaded from arbitrary locations CVE-2020-15801
VCID-757r-fs6p-qqdd Multiple vulberabilities have been discovered in Python and PyPy, the worst of which can lead to privilege escalation. CVE-2025-4517
VCID-7ka5-7jrn-dber Multiple vulberabilities have been discovered in Python and PyPy3, the worst of which can lead to privilege escalation. CVE-2023-6597
VCID-7nj2-94zp-d3bp python: DoS when processing malformed Apple Property List files in binary format CVE-2022-48564
VCID-7q8s-6emv-ykhx Multiple vulnerabilities have been found in Python, the worst of which could lead to arbitrary code execution. CVE-2013-7338
VCID-8zdt-4q7m-t7ht Multiple vulberabilities have been discovered in Python and PyPy, the worst of which can lead to privilege escalation. CVE-2025-4330
VCID-94n7-6q4s-3udv cpython: Header injection via newlines in data URL mediatype in Python CVE-2025-15282
VCID-a8mv-mr3q-vygz Multiple vulnerabilities have been found in Python and PyPy, the worst of which could result in arbitrary code execution. CVE-2022-42919
VCID-bn83-d2qp-9bfy cpython: Missing character filtering in Python CVE-2025-11468
VCID-dnv8-yrd6-c7cv Multiple vulberabilities have been discovered in Python and PyPy, the worst of which can lead to privilege escalation. CVE-2024-8088
VCID-efdj-sb7s-p3fk Multiple vulnerabilities have been found in Python, the worst of which could result in a Denial of Service condition. CVE-2020-14422
VCID-emku-csrd-4bg5 python: unsafe dll loading in getpathp.c on Windows CVE-2020-8315
VCID-enav-dz7a-pqdq Multiple vulnerabilities have been found in Python, the worst of which could lead to arbitrary code execution. CVE-2014-2667
VCID-ewbq-2gm8-tyf5 Buffer overflow in sponge queue functions ### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a). ### Workarounds The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether. ### References See [issue #105](https://github.com/XKCP/XKCP/issues/105) for more details. CVE-2022-37454
GHSA-6w4m-2xhg-2658
VCID-gxvd-xhmx-2uh9 python: sensitive information can be obtained via the _asyncio._swap_current_task component. CVE-2023-38898
VCID-hssa-umby-eud3 python: local privilege escalation via search path in Windows CVE-2022-26488
VCID-hz5k-rky7-nucg Multiple vulberabilities have been discovered in Python and PyPy3, the worst of which can lead to privilege escalation. CVE-2023-41105
VCID-n5bc-vs4j-nfdp In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows. CVE-2020-15523
VCID-nvmn-jbw1-47cq python: rgbimg: multiple security issues CVE-2009-4134
VCID-q6g1-cjz3-77e4 cpython: Tarfile extracts filtered members when errorlevel=0 CVE-2025-4435
VCID-rnkj-2dgz-kuah python: rgbimg: multiple security issues CVE-2010-1449
VCID-s2wz-ghk2-kkg3 Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5. CVE-2018-1000117
VCID-s7qf-hjkq-wkdy Multiple vulberabilities have been discovered in Python and PyPy3, the worst of which can lead to privilege escalation. CVE-2023-6507
VCID-sbe1-cx8r-aba1 On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions. If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user. This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions. CVE-2024-4030
VCID-tbuw-2msj-tqd9 python: Virtual environment (venv) activation scripts don't quote paths CVE-2024-9287
VCID-v6ry-7xxz-nbeu CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-free via the function ascii_decode at /Objects/unicodeobject.c. CVE-2023-33595
VCID-ymg5-42xm-7fh9 The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included. CVE-2024-3219
VCID-z48d-eyxz-bycq Multiple vulnerabilities have been found in Python and PyPy, the worst of which could result in arbitrary code execution. CVE-2021-29921
VCID-zxzn-25zt-ukct Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details. CVE-2026-4786

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-17T22:44:40.994251+00:00 Debian Importer Fixing VCID-zxzn-25zt-ukct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:07.267698+00:00 Debian Importer Fixing VCID-4afh-28ss-mudf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:23:55.302230+00:00 Debian Importer Fixing VCID-2v5u-2z4w-ffgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:13:13.493033+00:00 Debian Importer Fixing VCID-nvmn-jbw1-47cq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:09:41.709458+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:08:50.535405+00:00 Debian Importer Fixing VCID-sbe1-cx8r-aba1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:57:18.152846+00:00 Debian Importer Fixing VCID-7nj2-94zp-d3bp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:37:12.985054+00:00 Debian Importer Fixing VCID-757r-fs6p-qqdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:35:59.889773+00:00 Debian Importer Fixing VCID-34fd-g6ss-t3fj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:34:55.483922+00:00 Debian Importer Fixing VCID-dnv8-yrd6-c7cv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:33:10.620757+00:00 Debian Importer Fixing VCID-a8mv-mr3q-vygz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:59.131232+00:00 Debian Importer Fixing VCID-z48d-eyxz-bycq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:27:29.873985+00:00 Debian Importer Fixing VCID-ymg5-42xm-7fh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:44:28.458357+00:00 Debian Importer Fixing VCID-4pej-k4vs-j3d2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:25.480111+00:00 Debian Importer Fixing VCID-v6ry-7xxz-nbeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:51.653356+00:00 Debian Importer Fixing VCID-7q8s-6emv-ykhx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:04:10.201059+00:00 Debian Importer Fixing VCID-94n7-6q4s-3udv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:29.299525+00:00 Debian Importer Fixing VCID-efdj-sb7s-p3fk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:22.557266+00:00 Debian Importer Fixing VCID-emku-csrd-4bg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:25.628643+00:00 Debian Importer Fixing VCID-7ka5-7jrn-dber https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:03.723198+00:00 Debian Importer Fixing VCID-1pr1-jkqa-43g6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:44:09.323889+00:00 Debian Importer Fixing VCID-hz5k-rky7-nucg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:17.574626+00:00 Debian Importer Fixing VCID-bn83-d2qp-9bfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:55.197362+00:00 Debian Importer Fixing VCID-8zdt-4q7m-t7ht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:32.937592+00:00 Debian Importer Fixing VCID-s7qf-hjkq-wkdy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:18.628463+00:00 Debian Importer Fixing VCID-2j3t-a3r6-vfg7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:48.772846+00:00 Debian Importer Fixing VCID-rnkj-2dgz-kuah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:47.029338+00:00 Debian Importer Fixing VCID-hssa-umby-eud3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:56.878635+00:00 Debian Importer Fixing VCID-n5bc-vs4j-nfdp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:39.390915+00:00 Debian Importer Fixing VCID-q6g1-cjz3-77e4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:30.188295+00:00 Debian Importer Fixing VCID-s2wz-ghk2-kkg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:28.817213+00:00 Debian Importer Fixing VCID-1hw3-vhwb-nkcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:15.660615+00:00 Debian Importer Fixing VCID-enav-dz7a-pqdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:20.499610+00:00 Debian Importer Fixing VCID-22da-bqwg-2fdf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:09.272805+00:00 Debian Importer Fixing VCID-tbuw-2msj-tqd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:41.047797+00:00 Debian Importer Fixing VCID-gxvd-xhmx-2uh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:14:35.767589+00:00 Debian Importer Fixing VCID-4afh-28ss-mudf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:14:27.175081+00:00 Debian Importer Fixing VCID-2v5u-2z4w-ffgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:06:00.856939+00:00 Debian Importer Fixing VCID-nvmn-jbw1-47cq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:03:15.801307+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:37.718951+00:00 Debian Importer Fixing VCID-sbe1-cx8r-aba1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:53:56.724723+00:00 Debian Importer Fixing VCID-7nj2-94zp-d3bp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:46.525766+00:00 Debian Importer Fixing VCID-757r-fs6p-qqdd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:37:52.098997+00:00 Debian Importer Fixing VCID-34fd-g6ss-t3fj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:37:02.137820+00:00 Debian Importer Fixing VCID-dnv8-yrd6-c7cv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:48.859615+00:00 Debian Importer Fixing VCID-a8mv-mr3q-vygz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:46.724423+00:00 Debian Importer Fixing VCID-z48d-eyxz-bycq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:31:39.934513+00:00 Debian Importer Fixing VCID-ymg5-42xm-7fh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:00:16.671755+00:00 Debian Importer Fixing VCID-4pej-k4vs-j3d2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:07.561811+00:00 Debian Importer Fixing VCID-v6ry-7xxz-nbeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:01.735196+00:00 Debian Importer Fixing VCID-7q8s-6emv-ykhx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:59.192769+00:00 Debian Importer Fixing VCID-94n7-6q4s-3udv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:43.471993+00:00 Debian Importer Fixing VCID-efdj-sb7s-p3fk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:37.486048+00:00 Debian Importer Fixing VCID-emku-csrd-4bg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:43.307783+00:00 Debian Importer Fixing VCID-7ka5-7jrn-dber https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:26.500451+00:00 Debian Importer Fixing VCID-1pr1-jkqa-43g6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:34.407596+00:00 Debian Importer Fixing VCID-hz5k-rky7-nucg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:01.982068+00:00 Debian Importer Fixing VCID-bn83-d2qp-9bfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:54.814007+00:00 Debian Importer Fixing VCID-8zdt-4q7m-t7ht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:37.471434+00:00 Debian Importer Fixing VCID-s7qf-hjkq-wkdy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:26.141352+00:00 Debian Importer Fixing VCID-2j3t-a3r6-vfg7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:44.139907+00:00 Debian Importer Fixing VCID-rnkj-2dgz-kuah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:39.953910+00:00 Debian Importer Fixing VCID-hssa-umby-eud3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:10.215729+00:00 Debian Importer Fixing VCID-n5bc-vs4j-nfdp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:32.230613+00:00 Debian Importer Fixing VCID-q6g1-cjz3-77e4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:00.996526+00:00 Debian Importer Fixing VCID-s2wz-ghk2-kkg3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:47.207330+00:00 Debian Importer Fixing VCID-1hw3-vhwb-nkcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:51.227145+00:00 Debian Importer Fixing VCID-enav-dz7a-pqdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:17.935535+00:00 Debian Importer Fixing VCID-22da-bqwg-2fdf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:03.608415+00:00 Debian Importer Fixing VCID-tbuw-2msj-tqd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:13.354880+00:00 Debian Importer Fixing VCID-gxvd-xhmx-2uh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:50:59.179139+00:00 Debian Importer Fixing VCID-1pr1-jkqa-43g6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:59.122710+00:00 Debian Importer Fixing VCID-757r-fs6p-qqdd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:59.102173+00:00 Debian Importer Fixing VCID-q6g1-cjz3-77e4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:59.081696+00:00 Debian Importer Fixing VCID-8zdt-4q7m-t7ht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:59.061244+00:00 Debian Importer Fixing VCID-4afh-28ss-mudf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:59.022838+00:00 Debian Importer Fixing VCID-94n7-6q4s-3udv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.984045+00:00 Debian Importer Fixing VCID-bn83-d2qp-9bfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.963823+00:00 Debian Importer Fixing VCID-tbuw-2msj-tqd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.943376+00:00 Debian Importer Fixing VCID-dnv8-yrd6-c7cv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.895952+00:00 Debian Importer Fixing VCID-2v5u-2z4w-ffgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.875529+00:00 Debian Importer Fixing VCID-sbe1-cx8r-aba1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.854839+00:00 Debian Importer Fixing VCID-ymg5-42xm-7fh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.834130+00:00 Debian Importer Fixing VCID-1hw3-vhwb-nkcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.794290+00:00 Debian Importer Fixing VCID-7ka5-7jrn-dber https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.772398+00:00 Debian Importer Fixing VCID-s7qf-hjkq-wkdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.751956+00:00 Debian Importer Fixing VCID-hz5k-rky7-nucg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.717969+00:00 Debian Importer Fixing VCID-gxvd-xhmx-2uh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.697605+00:00 Debian Importer Fixing VCID-v6ry-7xxz-nbeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.626995+00:00 Debian Importer Fixing VCID-7nj2-94zp-d3bp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.583364+00:00 Debian Importer Fixing VCID-a8mv-mr3q-vygz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.562809+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.542241+00:00 Debian Importer Fixing VCID-hssa-umby-eud3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.481045+00:00 Debian Importer Fixing VCID-2j3t-a3r6-vfg7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.438711+00:00 Debian Importer Fixing VCID-z48d-eyxz-bycq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.368396+00:00 Debian Importer Fixing VCID-emku-csrd-4bg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.329817+00:00 Debian Importer Fixing VCID-4pej-k4vs-j3d2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.309821+00:00 Debian Importer Fixing VCID-n5bc-vs4j-nfdp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.289793+00:00 Debian Importer Fixing VCID-efdj-sb7s-p3fk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:58.005031+00:00 Debian Importer Fixing VCID-34fd-g6ss-t3fj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:57.889622+00:00 Debian Importer Fixing VCID-s2wz-ghk2-kkg3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:57.629366+00:00 Debian Importer Fixing VCID-enav-dz7a-pqdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:57.567547+00:00 Debian Importer Fixing VCID-7q8s-6emv-ykhx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:57.264653+00:00 Debian Importer Fixing VCID-22da-bqwg-2fdf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:57.244059+00:00 Debian Importer Fixing VCID-rnkj-2dgz-kuah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:57.223285+00:00 Debian Importer Fixing VCID-nvmn-jbw1-47cq https://security-tracker.debian.org/tracker/data/json 38.1.0