Search for packages
| purl | pkg:alpm/archlinux/linux-zen@6.2-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2na9-p1ae-2bdc | kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack |
CVE-2022-4379
|
| VCID-369a-xh7h-9uca | kernel: usb: use-after-free write in put_dev |
CVE-2022-4382
|
| VCID-3ad4-u98h-mqf6 | kernel: hid: use-after-free in bigben_set_led() |
CVE-2023-25012
|
| VCID-4ave-x8wb-f7fw | kernel: insufficient TCP source port randomness leads to client identification |
CVE-2022-32296
|
| VCID-4gdy-gqe4-93f4 | Kernel: use-after-free in btf_dump_name_dups in tools/lib/bpf/btf_dump.c |
CVE-2022-3534
|
| VCID-4nqf-ct5y-6uev | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c |
CVE-2022-42896
|
| VCID-5149-phe6-eqh5 | kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c |
CVE-2022-36946
|
| VCID-5c6z-1ebs-wfev | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak |
CVE-2022-1012
|
| VCID-6y4w-3ftc-qkgs | Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF |
CVE-2022-41849
|
| VCID-7crw-vbpf-w7dx | kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c |
CVE-2022-40768
|
| VCID-7dm1-5xf1-jkf7 | kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c |
CVE-2022-3621
|
| VCID-7e2m-a86y-c3bd | kernel: media: em28xx: initialize refcount before kref_get |
CVE-2022-3239
|
| VCID-8834-7b7n-a7f1 | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces |
CVE-2022-4378
|
| VCID-95yc-p1fc-7kea | kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c |
CVE-2022-3649
|
| VCID-96bc-a364-8fd5 | kernel: improper input validation in handling of SMB2_TREE_CONNECT command can result in out-of-bounds read which could result in DoS |
CVE-2022-47938
|
| VCID-98b2-bte2-wfd3 | kernel: A flaw in unix_sock_destructor/unix_release_sock in net/unix/af_unix.c leads to memory leak |
CVE-2022-3543
|
| VCID-9e8s-d6bj-kba4 | kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c |
CVE-2022-41850
|
| VCID-9mam-pneh-5yhy | kernel: nfsd buffer overflow by RPC message over TCP with garbage data |
CVE-2022-43945
|
| VCID-9nyv-n5f5-ekbf | kernel: memory leak in ipv6_renew_options() |
CVE-2022-3524
|
| VCID-agq2-bq7w-33d1 | Guests can trigger deadlock in Linux netback driver |
CVE-2022-42329
|
| VCID-ap5s-w9uk-zff3 | kernel: nfp: use-after-free in area_cache_get() |
CVE-2022-3545
|
| VCID-b87y-f2rd-2fg7 | kernel: NFS over RDMA random memory leakage |
CVE-2022-0812
|
| VCID-bp6k-v3c5-gudy | kernel: LoadPin bypass via dm-verity table reload |
CVE-2022-2503
|
| VCID-bt6z-fyxn-ckgt | kernel: use after in tst_timer in drivers/atm/idt77252.c |
CVE-2022-3635
|
| VCID-byfh-pwcu-cfbs | kernel: improper validation user-supplied data could lead in heap buffer overflow which can result in RCE |
CVE-2022-47942
|
| VCID-ckqp-r5m2-j3fx | kernel: data races around sk->sk_prot |
CVE-2022-3567
|
| VCID-cs99-jacq-qkey | kernel: use-after-free in l1oip timer handlers |
CVE-2022-3565
|
| VCID-d14e-jv1a-w7d3 | kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c |
CVE-2022-3619
|
| VCID-d79b-qtu3-hud8 | kernel: use-after-free bug in mctp_sk_unhash in net/mctp/af_mctp.c |
CVE-2022-3977
|
| VCID-dqhd-grev-t3ge | kernel: use-after-free related to leaf anon_vma double reuse |
CVE-2022-42703
|
| VCID-dqth-c54y-e7fb | kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt |
CVE-2022-3566
|
| VCID-ejj4-yt8j-c7fm | kernel: race condition in xfrm_probe_algs can lead to OOB read/write |
CVE-2022-3028
|
| VCID-ensk-7dvm-p7g7 | kernel: an out-of-bounds vulnerability in i2c-ismt driver |
CVE-2022-2873
|
| VCID-eyzv-gxvw-9kee | kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c may lead to crash |
CVE-2022-34495
|
| VCID-g2k9-eds7-6qe3 | kernel: memory corruption in usbmon driver |
CVE-2022-43750
|
| VCID-g8j3-3ky8-h7av | kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() |
CVE-2022-2153
|
| VCID-hnf3-a64g-3yba | kernel: Improper update of reference count in io_uring leads to use-after-free |
CVE-2022-3910
|
| VCID-hxzu-828c-3qfx | kernel: use after free bug in spl2sw_nvmem_get_mac_address |
CVE-2022-3541
|
| VCID-j8ze-t6w6-ekak | kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c |
CVE-2022-42895
|
| VCID-jefe-c9nd-ufc1 | kernel: USB-accessible buffer overflow in brcmfmac |
CVE-2022-3628
|
| VCID-jw25-6cs7-dkev | Kernel: A flaw in damon_sysfs_add_target in mm/damon/sysfs.c in Netfilter leads to memory leak |
CVE-2022-3544
|
| VCID-kf7y-k2px-uug5 | kernel: net scheduler use-after-free information disclosure vulnerability |
CVE-2022-3586
|
| VCID-n2c4-w748-tyau | kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry |
CVE-2022-3623
|
| VCID-ng25-c2xk-9fem | kernel: NULL pointer dereference in traffic control subsystem |
CVE-2022-47929
|
| VCID-np7t-cj38-m3a7 | Guests can trigger NIC interface reset/abort/crash via netback |
CVE-2022-3643
|
| VCID-pphs-rtxe-wfca | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c |
CVE-2022-3564
|
| VCID-pqzm-vutm-hkhn | Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write |
CVE-2022-39842
|
| VCID-qare-c6yz-d3bt | kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c |
CVE-2022-34494
|
| VCID-qbd9-czms-8qdn | kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop |
CVE-2022-36280
|
| VCID-qgxx-2pek-nydy | kernel: use-after-free in efi_capsule_write in capsule-loader.c |
CVE-2022-40307
|
| VCID-qkam-j6uv-n7fj | kernel: NULL pointer dereference in rawv6_push_pending_frames |
CVE-2023-0394
|
| VCID-qu2u-k7ak-4qbb | kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c |
CVE-2022-3646
|
| VCID-qx5q-yc33-huhs | Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion |
CVE-2023-23455
|
| VCID-r4pv-ac7b-aufb | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF |
CVE-2023-0266
|
| VCID-s3tt-1m91-afar | kernel: smb2_write() fails to validate user supplied data which can result in out-of-bounds read |
CVE-2022-47940
|
| VCID-sv4s-h2k7-aygu | kernel: Report vmalloc UAF in dvb-core/dmxdev |
CVE-2022-41218
|
| VCID-sybh-ybu8-mfhv | kernel: handling of SMB2_NEGOTIATE command doesn't properly release memory which could result in DoS |
CVE-2022-47941
|
| VCID-t81u-wyws-r7c3 | kernel: Rate limit overflow messages in r8152 in intr_callback |
CVE-2022-3594
|
| VCID-v4c7-7k4y-ebf6 | kernel: NVME driver: null pointer dereference in drivers/nvme/target/auth.c |
CVE-2023-0122
|
| VCID-vmbf-nbfs-5bbb | kernel: slab-out-of-bounds read vulnerabilities in cbq_classify |
CVE-2023-23454
|
| VCID-vqy7-37ym-eufr | kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice |
CVE-2022-36879
|
| VCID-vrmr-8pda-m3d8 | Kernel: A use after free in __mtk_ppe_check_skb in drivers/net/ethernet/mediatek/mtk_ppe.c |
CVE-2022-3636
|
| VCID-vu3z-hmu8-fkbn | kernel: libbpf: NULL pointer dereference in find_prog_by_sec_insn |
CVE-2022-3606
|
| VCID-vzpr-mm8p-yygx | kernel: netfilter: nf_conntrack_irc message handling issue |
CVE-2022-2663
|
| VCID-wmbn-me38-gbaf | kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS |
CVE-2022-3061
|
| VCID-xdyu-fbfb-huh1 | kernel: smb2_tree_disconnect() fails to validate object existance prior to performing opertions on it |
CVE-2022-47939
|
| VCID-xpn4-e2aq-f3d7 | kernel: use-after-free in nilfs_mdt_destroy |
CVE-2022-2978
|
| VCID-xr58-t3v3-m3ep | kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference |
CVE-2022-3303
|
| VCID-ycce-86bv-qfed | kernel: large length in the zero DataOffset case in smb2_write() processing could result in out-of-bounds read |
CVE-2022-47943
|
| VCID-zs49-wp5q-9be6 | kernel: use-after-free in io_sqpoll_wait_sq |
CVE-2022-47946
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:23:58.964021+00:00 | Arch Linux Importer | Fixing | VCID-b87y-f2rd-2fg7 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.939844+00:00 | Arch Linux Importer | Fixing | VCID-5c6z-1ebs-wfev | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.916537+00:00 | Arch Linux Importer | Fixing | VCID-g8j3-3ky8-h7av | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.891146+00:00 | Arch Linux Importer | Fixing | VCID-bp6k-v3c5-gudy | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.866910+00:00 | Arch Linux Importer | Fixing | VCID-vzpr-mm8p-yygx | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.841856+00:00 | Arch Linux Importer | Fixing | VCID-ensk-7dvm-p7g7 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.819745+00:00 | Arch Linux Importer | Fixing | VCID-xpn4-e2aq-f3d7 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.798571+00:00 | Arch Linux Importer | Fixing | VCID-ejj4-yt8j-c7fm | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.665677+00:00 | Arch Linux Importer | Fixing | VCID-wmbn-me38-gbaf | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.645158+00:00 | Arch Linux Importer | Fixing | VCID-4ave-x8wb-f7fw | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.622822+00:00 | Arch Linux Importer | Fixing | VCID-7e2m-a86y-c3bd | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.598920+00:00 | Arch Linux Importer | Fixing | VCID-xr58-t3v3-m3ep | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.578662+00:00 | Arch Linux Importer | Fixing | VCID-qare-c6yz-d3bt | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.557355+00:00 | Arch Linux Importer | Fixing | VCID-eyzv-gxvw-9kee | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.535836+00:00 | Arch Linux Importer | Fixing | VCID-9nyv-n5f5-ekbf | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.511195+00:00 | Arch Linux Importer | Fixing | VCID-4gdy-gqe4-93f4 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.488900+00:00 | Arch Linux Importer | Fixing | VCID-hxzu-828c-3qfx | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.467079+00:00 | Arch Linux Importer | Fixing | VCID-98b2-bte2-wfd3 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.427984+00:00 | Arch Linux Importer | Fixing | VCID-jw25-6cs7-dkev | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.404272+00:00 | Arch Linux Importer | Fixing | VCID-ap5s-w9uk-zff3 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.379347+00:00 | Arch Linux Importer | Fixing | VCID-pphs-rtxe-wfca | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.355769+00:00 | Arch Linux Importer | Fixing | VCID-cs99-jacq-qkey | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.330777+00:00 | Arch Linux Importer | Fixing | VCID-dqth-c54y-e7fb | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.305024+00:00 | Arch Linux Importer | Fixing | VCID-ckqp-r5m2-j3fx | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.282114+00:00 | Arch Linux Importer | Fixing | VCID-kf7y-k2px-uug5 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.259573+00:00 | Arch Linux Importer | Fixing | VCID-t81u-wyws-r7c3 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.235912+00:00 | Arch Linux Importer | Fixing | VCID-vu3z-hmu8-fkbn | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.214751+00:00 | Arch Linux Importer | Fixing | VCID-d14e-jv1a-w7d3 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.191553+00:00 | Arch Linux Importer | Fixing | VCID-7dm1-5xf1-jkf7 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.169810+00:00 | Arch Linux Importer | Fixing | VCID-n2c4-w748-tyau | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.145829+00:00 | Arch Linux Importer | Fixing | VCID-jefe-c9nd-ufc1 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.123461+00:00 | Arch Linux Importer | Fixing | VCID-qbd9-czms-8qdn | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.099788+00:00 | Arch Linux Importer | Fixing | VCID-bt6z-fyxn-ckgt | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.075524+00:00 | Arch Linux Importer | Fixing | VCID-vrmr-8pda-m3d8 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.051273+00:00 | Arch Linux Importer | Fixing | VCID-np7t-cj38-m3a7 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.026451+00:00 | Arch Linux Importer | Fixing | VCID-qu2u-k7ak-4qbb | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:58.004792+00:00 | Arch Linux Importer | Fixing | VCID-95yc-p1fc-7kea | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.980203+00:00 | Arch Linux Importer | Fixing | VCID-vqy7-37ym-eufr | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.957598+00:00 | Arch Linux Importer | Fixing | VCID-5149-phe6-eqh5 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.936437+00:00 | Arch Linux Importer | Fixing | VCID-hnf3-a64g-3yba | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.913912+00:00 | Arch Linux Importer | Fixing | VCID-d79b-qtu3-hud8 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.888379+00:00 | Arch Linux Importer | Fixing | VCID-pqzm-vutm-hkhn | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.866178+00:00 | Arch Linux Importer | Fixing | VCID-qgxx-2pek-nydy | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.842835+00:00 | Arch Linux Importer | Fixing | VCID-7crw-vbpf-w7dx | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.822077+00:00 | Arch Linux Importer | Fixing | VCID-sv4s-h2k7-aygu | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.799249+00:00 | Arch Linux Importer | Fixing | VCID-6y4w-3ftc-qkgs | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.776017+00:00 | Arch Linux Importer | Fixing | VCID-9e8s-d6bj-kba4 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.752599+00:00 | Arch Linux Importer | Fixing | VCID-agq2-bq7w-33d1 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.726388+00:00 | Arch Linux Importer | Fixing | VCID-dqhd-grev-t3ge | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.700914+00:00 | Arch Linux Importer | Fixing | VCID-j8ze-t6w6-ekak | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.676192+00:00 | Arch Linux Importer | Fixing | VCID-4nqf-ct5y-6uev | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.653007+00:00 | Arch Linux Importer | Fixing | VCID-g2k9-eds7-6qe3 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.632204+00:00 | Arch Linux Importer | Fixing | VCID-8834-7b7n-a7f1 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.610195+00:00 | Arch Linux Importer | Fixing | VCID-2na9-p1ae-2bdc | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.587488+00:00 | Arch Linux Importer | Fixing | VCID-369a-xh7h-9uca | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.564265+00:00 | Arch Linux Importer | Fixing | VCID-9mam-pneh-5yhy | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.541919+00:00 | Arch Linux Importer | Fixing | VCID-ng25-c2xk-9fem | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.519747+00:00 | Arch Linux Importer | Fixing | VCID-96bc-a364-8fd5 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.495509+00:00 | Arch Linux Importer | Fixing | VCID-xdyu-fbfb-huh1 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.474180+00:00 | Arch Linux Importer | Fixing | VCID-s3tt-1m91-afar | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.452144+00:00 | Arch Linux Importer | Fixing | VCID-sybh-ybu8-mfhv | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.430306+00:00 | Arch Linux Importer | Fixing | VCID-byfh-pwcu-cfbs | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.408234+00:00 | Arch Linux Importer | Fixing | VCID-ycce-86bv-qfed | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.383186+00:00 | Arch Linux Importer | Fixing | VCID-zs49-wp5q-9be6 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.360038+00:00 | Arch Linux Importer | Fixing | VCID-v4c7-7k4y-ebf6 | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.338489+00:00 | Arch Linux Importer | Fixing | VCID-r4pv-ac7b-aufb | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.316479+00:00 | Arch Linux Importer | Fixing | VCID-qkam-j6uv-n7fj | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.293546+00:00 | Arch Linux Importer | Fixing | VCID-vmbf-nbfs-5bbb | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.271946+00:00 | Arch Linux Importer | Fixing | VCID-qx5q-yc33-huhs | https://security.archlinux.org/AVG-2836 | 38.0.0 |
| 2026-04-01T18:23:57.245636+00:00 | Arch Linux Importer | Fixing | VCID-3ad4-u98h-mqf6 | https://security.archlinux.org/AVG-2836 | 38.0.0 |