Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/linux@6.12.74-2~bpo12%2B1
purl pkg:deb/debian/linux@6.12.74-2~bpo12%2B1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (427)
Vulnerability Summary Aliases
VCID-142k-7wgv-pfh6 In the Linux kernel, the following vulnerability has been resolved: wifi: radiotap: reject radiotap with unknown bits The radiotap parser is currently only used with the radiotap namespace (not with vendor namespaces), but if the undefined field 18 is used, the alignment/size is unknown as well. In this case, iterator->_next_ns_data isn't initialized (it's only set for skipping vendor namespaces), and syzbot points out that we later compare against this uninitialized value. Fix this by moving the rejection of unknown radiotap fields down to after the in-namespace lookup, so it will really use iterator->_next_ns_data only for vendor namespaces, even in case undefined fields are present. CVE-2026-23367
VCID-14ey-bdy6-5qe9 In the Linux kernel, the following vulnerability has been resolved: ext4: validate p_idx bounds in ext4_ext_correct_indexes ext4_ext_correct_indexes() walks up the extent tree correcting index entries when the first extent in a leaf is modified. Before accessing path[k].p_idx->ei_block, there is no validation that p_idx falls within the valid range of index entries for that level. If the on-disk extent header contains a corrupted or crafted eh_entries value, p_idx can point past the end of the allocated buffer, causing a slab-out-of-bounds read. Fix this by validating path[k].p_idx against EXT_LAST_INDEX() at both access sites: before the while loop and inside it. Return -EFSCORRUPTED if the index pointer is out of range, consistent with how other bounds violations are handled in the ext4 extent tree code. CVE-2026-31449
VCID-16bf-g26g-z3db In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del() l2cap_conn_del() calls cancel_delayed_work_sync() for both info_timer and id_addr_timer while holding conn->lock. However, the work functions l2cap_info_timeout() and l2cap_conn_update_id_addr() both acquire conn->lock, creating a potential AB-BA deadlock if the work is already executing when l2cap_conn_del() takes the lock. Move the work cancellations before acquiring conn->lock and use disable_delayed_work_sync() to additionally prevent the works from being rearmed after cancellation, consistent with the pattern used in hci_conn_del(). CVE-2026-31499
VCID-16es-2z99-a3hu CVE-2026-31405
VCID-179u-b611-z7hc In the Linux kernel, the following vulnerability has been resolved: net: macb: use the current queue number for stats There's a potential mismatch between the memory reserved for statistics and the amount of memory written. gem_get_sset_count() correctly computes the number of stats based on the active queues, whereas gem_get_ethtool_stats() indiscriminately copies data using the maximum number of queues, and in the case the number of active queues is less than MACB_MAX_QUEUES, this results in a OOB write as observed in the KASAN splat. ================================================================== BUG: KASAN: vmalloc-out-of-bounds in gem_get_ethtool_stats+0x54/0x78 [macb] Write of size 760 at addr ffff80008080b000 by task ethtool/1027 CPU: [...] Tainted: [E]=UNSIGNED_MODULE Hardware name: raspberrypi rpi/rpi, BIOS 2025.10 10/01/2025 Call trace: show_stack+0x20/0x38 (C) dump_stack_lvl+0x80/0xf8 print_report+0x384/0x5e0 kasan_report+0xa0/0xf0 kasan_check_range+0xe8/0x190 __asan_memcpy+0x54/0x98 gem_get_ethtool_stats+0x54/0x78 [macb 926c13f3af83b0c6fe64badb21ec87d5e93fcf65] dev_ethtool+0x1220/0x38c0 dev_ioctl+0x4ac/0xca8 sock_do_ioctl+0x170/0x1d8 sock_ioctl+0x484/0x5d8 __arm64_sys_ioctl+0x12c/0x1b8 invoke_syscall+0xd4/0x258 el0_svc_common.constprop.0+0xb4/0x240 do_el0_svc+0x48/0x68 el0_svc+0x40/0xf8 el0t_64_sync_handler+0xa0/0xe8 el0t_64_sync+0x1b0/0x1b8 The buggy address belongs to a 1-page vmalloc region starting at 0xffff80008080b000 allocated at dev_ethtool+0x11f0/0x38c0 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff00000a333000 pfn:0xa333 flags: 0x7fffc000000000(node=0|zone=0|lastcpupid=0x1ffff) raw: 007fffc000000000 0000000000000000 dead000000000122 0000000000000000 raw: ffff00000a333000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff80008080b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff80008080b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff80008080b180: 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffff80008080b200: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffff80008080b280: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ================================================================== Fix it by making sure the copied size only considers the active number of queues. CVE-2026-31494
VCID-17tu-a4wu-b3hv kernel: blktrace: fix __this_cpu_read/write in preemptible context CVE-2026-23374
VCID-188w-9sxd-5khx In the Linux kernel, the following vulnerability has been resolved: iavf: fix out-of-bounds writes in iavf_get_ethtool_stats() iavf incorrectly uses real_num_tx_queues for ETH_SS_STATS. Since the value could change in runtime, we should use num_tx_queues instead. Moreover iavf_get_ethtool_stats() uses num_active_queues while iavf_get_sset_count() and iavf_get_stat_strings() use real_num_tx_queues, which triggers out-of-bounds writes when we do "ethtool -L" and "ethtool -S" simultaneously [1]. For example when we change channels from 1 to 8, Thread 3 could be scheduled before Thread 2, and out-of-bounds writes could be triggered in Thread 3: Thread 1 (ethtool -L) Thread 2 (work) Thread 3 (ethtool -S) iavf_set_channels() ... iavf_alloc_queues() -> num_active_queues = 8 iavf_schedule_finish_config() iavf_get_sset_count() real_num_tx_queues: 1 -> buffer for 1 queue iavf_get_ethtool_stats() num_active_queues: 8 -> out-of-bounds! iavf_finish_config() -> real_num_tx_queues = 8 Use immutable num_tx_queues in all related functions to avoid the issue. [1] BUG: KASAN: vmalloc-out-of-bounds in iavf_add_one_ethtool_stat+0x200/0x270 Write of size 8 at addr ffffc900031c9080 by task ethtool/5800 CPU: 1 UID: 0 PID: 5800 Comm: ethtool Not tainted 6.19.0-enjuk-08403-g8137e3db7f1c #241 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x6f/0xb0 print_report+0x170/0x4f3 kasan_report+0xe1/0x180 iavf_add_one_ethtool_stat+0x200/0x270 iavf_get_ethtool_stats+0x14c/0x2e0 __dev_ethtool+0x3d0c/0x5830 dev_ethtool+0x12d/0x270 dev_ioctl+0x53c/0xe30 sock_do_ioctl+0x1a9/0x270 sock_ioctl+0x3d4/0x5e0 __x64_sys_ioctl+0x137/0x1c0 do_syscall_64+0xf3/0x690 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7da0e6e36d ... </TASK> The buggy address belongs to a 1-page vmalloc region starting at 0xffffc900031c9000 allocated at __dev_ethtool+0x3cc9/0x5830 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88813a013de0 pfn:0x13a013 flags: 0x200000000000000(node=0|zone=2) raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 raw: ffff88813a013de0 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffffc900031c8f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900031c9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc900031c9080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc900031c9100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900031c9180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 CVE-2026-31505
VCID-1cac-quc3-2bcf kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() CVE-2025-40139
VCID-1dxt-yy4z-y7cs kernel: can: ucan: Fix infinite loop from zero-length messages CVE-2026-23298
VCID-1g77-qwuy-nkg8 CVE-2026-31416
VCID-1g8r-w5jy-6kes kernel: iommu/s390: Make attach succeed when the device was surprise removed CVE-2025-39958
VCID-1h5j-qg28-fka7 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN The BPF interpreter's signed 32-bit division and modulo handlers use the kernel abs() macro on s32 operands. The abs() macro documentation (include/linux/math.h) explicitly states the result is undefined when the input is the type minimum. When DST contains S32_MIN (0x80000000), abs((s32)DST) triggers undefined behavior and returns S32_MIN unchanged on arm64/x86. This value is then sign-extended to u64 as 0xFFFFFFFF80000000, causing do_div() to compute the wrong result. The verifier's abstract interpretation (scalar32_min_max_sdiv) computes the mathematically correct result for range tracking, creating a verifier/interpreter mismatch that can be exploited for out-of-bounds map value access. Introduce abs_s32() which handles S32_MIN correctly by casting to u32 before negating, avoiding signed overflow entirely. Replace all 8 abs((s32)...) call sites in the interpreter's sdiv32/smod32 handlers. s32 is the only affected case -- the s64 division/modulo handlers do not use abs(). CVE-2026-31525
VCID-1kgs-19ue-wbe1 In the Linux kernel, the following vulnerability has been resolved: mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations ieee80211_chan_bw_change() iterates all stations and accesses link->reserved.oper via sta->sdata->link[link_id]. For stations on AP_VLAN interfaces (e.g. 4addr WDS clients), sta->sdata points to the VLAN sdata, whose link never participates in chanctx reservations. This leaves link->reserved.oper zero-initialized with chan == NULL, causing a NULL pointer dereference in __ieee80211_sta_cap_rx_bw() when accessing chandef->chan->band during CSA. Resolve the VLAN sdata to its parent AP sdata using get_bss_sdata() before accessing link data. [also change sta->sdata in ARRAY_SIZE even if it doesn't matter] CVE-2026-31394
VCID-1n5v-auw6-wbcd CVE-2026-23420
VCID-1s26-havx-dkey In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() l2cap_ecred_data_rcv() reads the SDU length field from skb->data using get_unaligned_le16() without first verifying that skb contains at least L2CAP_SDULEN_SIZE (2) bytes. When skb->len is less than 2, this reads past the valid data in the skb. The ERTM reassembly path correctly calls pskb_may_pull() before reading the SDU length (l2cap_reassemble_sdu, L2CAP_SAR_START case). Apply the same validation to the Enhanced Credit Based Flow Control data path. CVE-2026-31512
VCID-1s77-djzb-xffp CVE-2026-31417
VCID-1xj4-m963-nkb2 kernel: ice: fix devlink reload call trace CVE-2026-23104
VCID-1xws-te5q-8fh4 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix dangling pointer on mgmt_add_adv_patterns_monitor_complete This fixes the condition checking so mgmt_pending_valid is executed whenever status != -ECANCELED otherwise calling mgmt_pending_free(cmd) would kfree(cmd) without unlinking it from the list first, leaving a dangling pointer. Any subsequent list traversal (e.g., mgmt_pending_foreach during __mgmt_power_off, or another mgmt_pending_valid call) would dereference freed memory. CVE-2026-31511
VCID-1ygk-whua-gbcq kernel: ALSA: usb-audio: Use correct version for UAC3 header validation CVE-2026-23318
VCID-1zbm-pnj5-xqb4 kernel: mptcp: pm: in-kernel: always mark signal+subflow endp as used CVE-2026-23321
VCID-2198-cz4u-87hu kernel: ksmbd: Compare MACs in constant time CVE-2026-23364
VCID-24dm-m1bk-t7fv In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: fix race condition in qman_destroy_fq When QMAN_FQ_FLAG_DYNAMIC_FQID is set, there's a race condition between fq_table[fq->idx] state and freeing/allocating from the pool and WARN_ON(fq_table[fq->idx]) in qman_create_fq() gets triggered. Indeed, we can have: Thread A Thread B qman_destroy_fq() qman_create_fq() qman_release_fqid() qman_shutdown_fq() gen_pool_free() -- At this point, the fqid is available again -- qman_alloc_fqid() -- so, we can get the just-freed fqid in thread B -- fq->fqid = fqid; fq->idx = fqid * 2; WARN_ON(fq_table[fq->idx]); fq_table[fq->idx] = fq; fq_table[fq->idx] = NULL; And adding some logs between qman_release_fqid() and fq_table[fq->idx] = NULL makes the WARN_ON() trigger a lot more. To prevent that, ensure that fq_table[fq->idx] is set to NULL before gen_pool_free() is called by using smp_wmb(). CVE-2026-23463
VCID-25nt-fa4m-97fm kernel: binfmt_misc: restore write access before closing files opened by open_exec() CVE-2025-68239
VCID-286c-64ry-67cz kernel: idpf: detach and close netdevs while handling a reset CVE-2026-22981
VCID-2bbj-94mj-rfa7 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Do not skip unrelated mode changes in DSC validation Starting with commit 17ce8a6907f7 ("drm/amd/display: Add dsc pre-validation in atomic check"), amdgpu resets the CRTC state mode_changed flag to false when recomputing the DSC configuration results in no timing change for a particular stream. However, this is incorrect in scenarios where a change in MST/DSC configuration happens in the same KMS commit as another (unrelated) mode change. For example, the integrated panel of a laptop may be configured differently (e.g., HDR enabled/disabled) depending on whether external screens are attached. In this case, plugging in external DP-MST screens may result in the mode_changed flag being dropped incorrectly for the integrated panel if its DSC configuration did not change during precomputation in pre_validate_dsc(). At this point, however, dm_update_crtc_state() has already created new streams for CRTCs with DSC-independent mode changes. In turn, amdgpu_dm_commit_streams() will never release the old stream, resulting in a memory leak. amdgpu_dm_atomic_commit_tail() will never acquire a reference to the new stream either, which manifests as a use-after-free when the stream gets disabled later on: BUG: KASAN: use-after-free in dc_stream_release+0x25/0x90 [amdgpu] Write of size 4 at addr ffff88813d836524 by task kworker/9:9/29977 Workqueue: events drm_mode_rmfb_work_fn Call Trace: <TASK> dump_stack_lvl+0x6e/0xa0 print_address_description.constprop.0+0x88/0x320 ? dc_stream_release+0x25/0x90 [amdgpu] print_report+0xfc/0x1ff ? srso_alias_return_thunk+0x5/0xfbef5 ? __virt_addr_valid+0x225/0x4e0 ? dc_stream_release+0x25/0x90 [amdgpu] kasan_report+0xe1/0x180 ? dc_stream_release+0x25/0x90 [amdgpu] kasan_check_range+0x125/0x200 dc_stream_release+0x25/0x90 [amdgpu] dc_state_destruct+0x14d/0x5c0 [amdgpu] dc_state_release.part.0+0x4e/0x130 [amdgpu] dm_atomic_destroy_state+0x3f/0x70 [amdgpu] drm_atomic_state_default_clear+0x8ee/0xf30 ? drm_mode_object_put.part.0+0xb1/0x130 __drm_atomic_state_free+0x15c/0x2d0 atomic_remove_fb+0x67e/0x980 Since there is no reliable way of figuring out whether a CRTC has unrelated mode changes pending at the time of DSC validation, remember the value of the mode_changed flag from before the point where a CRTC was marked as potentially affected by a change in DSC configuration. Reset the mode_changed flag to this earlier value instead in pre_validate_dsc(). (cherry picked from commit cc7c7121ae082b7b82891baa7280f1ff2608f22b) CVE-2026-31488
VCID-2cxv-ay17-4kh2 kernel: Linux kernel: Denial of Service due to sleepable page allocation in KASAN CVE-2025-38029
VCID-2k4e-em5c-m3bv kernel: sysfs: check visibility before changing group attribute ownership CVE-2025-40355
VCID-33re-7rh6-2bg4 kernel: net: add proper RCU protection to /proc/net/ptype CVE-2026-23255
VCID-341t-wy9a-p7fz kernel: btrfs: do not free data reservation in fallback from inline due to -ENOSPC CVE-2025-71269
VCID-3453-ez2g-97ax kernel: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path CVE-2025-39830
VCID-37t1-1qg2-hqc4 CVE-2026-23414
VCID-3aa5-4rp5-g7h3 kernel: Linux kernel: Memory Corruption and Kernel Crashes via IOMMU SVA coherency issue CVE-2025-71202
VCID-3ans-72mm-sfh1 In the Linux kernel, the following vulnerability has been resolved: spi: meson-spicc: Fix double-put in remove path meson_spicc_probe() registers the controller with devm_spi_register_controller(), so teardown already drops the controller reference via devm cleanup. Calling spi_controller_put() again in meson_spicc_remove() causes a double-put. CVE-2026-31489
VCID-3ay8-sdv3-3ydv In the Linux kernel, the following vulnerability has been resolved: tracing: Fix potential deadlock in cpu hotplug with osnoise The following sequence may leads deadlock in cpu hotplug: task1 task2 task3 ----- ----- ----- mutex_lock(&interface_lock) [CPU GOING OFFLINE] cpus_write_lock(); osnoise_cpu_die(); kthread_stop(task3); wait_for_completion(); osnoise_sleep(); mutex_lock(&interface_lock); cpus_read_lock(); [DEAD LOCK] Fix by swap the order of cpus_read_lock() and mutex_lock(&interface_lock). CVE-2026-31480
VCID-3btm-9twv-8kdh kernel: pidfs: validate extensible ioctls CVE-2025-40217
VCID-3fpy-fq8u-r3gb kernel: jfs: add check read-only before txBeginAnon() call CVE-2024-58095
VCID-3jmx-jfhk-yqh5 kernel: usb: gadget: f_ncm: align net_device lifecycle with bind/unbind CVE-2026-23320
VCID-3kg4-jbwg-zffk kernel: spi: fix statistics allocation CVE-2026-23475
VCID-3km6-xsxg-4bcr CVE-2026-31426
VCID-3ng4-wb1y-wyem CVE-2026-23422
VCID-3pv5-s5r1-vkdg Linux kernel: nfnetlink_osf: Linux kernel: Denial of Service in nfnetlink_osf via crafted network packets CVE-2026-23397
VCID-3tns-khmb-aqbn In the Linux kernel, the following vulnerability has been resolved: xfs: avoid dereferencing log items after push callbacks After xfsaild_push_item() calls iop_push(), the log item may have been freed if the AIL lock was dropped during the push. Background inode reclaim or the dquot shrinker can free the log item while the AIL lock is not held, and the tracepoints in the switch statement dereference the log item after iop_push() returns. Fix this by capturing the log item type, flags, and LSN before calling xfsaild_push_item(), and introducing a new xfs_ail_push_class trace event class that takes these pre-captured values and the ailp pointer instead of the log item pointer. CVE-2026-31453
VCID-3usq-zn13-r3hx kernel: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL CVE-2026-23386
VCID-3yzs-sjd2-53d7 kernel: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them CVE-2026-23382
VCID-4399-j8sn-t3b1 kernel: bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded CVE-2026-23310
VCID-4avh-yaub-uqg2 kernel: soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe() CVE-2026-23464
VCID-4g8h-bz4a-uydk In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial OOB in get_file_all_info() for compound requests When a compound request consists of QUERY_DIRECTORY + QUERY_INFO (FILE_ALL_INFORMATION) and the first command consumes nearly the entire max_trans_size, get_file_all_info() would blindly call smbConvertToUTF16() with PATH_MAX, causing out-of-bounds write beyond the response buffer. In get_file_all_info(), there was a missing validation check for the client-provided OutputBufferLength before copying the filename into FileName field of the smb2_file_all_info structure. If the filename length exceeds the available buffer space, it could lead to potential buffer overflows or memory corruption during smbConvertToUTF16 conversion. This calculating the actual free buffer size using smb2_calc_max_out_buf_len() and returning -EINVAL if the buffer is insufficient and updating smbConvertToUTF16 to use the actual filename length (clamped by PATH_MAX) to ensure a safe copy operation. CVE-2026-31433
VCID-4jvb-unxd-3qg3 CVE-2026-31423
VCID-4qwu-fw8y-t7et kernel: jfs: Fix null-ptr-deref in jfs_ioc_trim CVE-2025-38203
VCID-4spt-a3n7-z7fu kernel: Linux kernel: Denial of Service due to missing power management handler for AMD Van Gogh SoC CVE-2025-68334
VCID-4tj5-m3wf-xkca kernel: ksmbd: fix use-after-free in durable v2 replay of active file handles CVE-2026-23427
VCID-4vs9-vhrd-zfgn kernel: jfs: add check read-only before truncation in jfs_truncate_nolock() CVE-2024-58094
VCID-514d-7urs-m7ge kernel: tracing: Fix WARN_ON in tracing_buffers_mmap_close CVE-2026-23380
VCID-5ahq-saw1-suf1 CVE-2026-31420
VCID-5b4f-sket-kuge kernel: f2fs: quota: fix to avoid warning in dquot_writeback_dquots() CVE-2025-23132
VCID-5eks-kg2z-5ye1 In the Linux kernel, the following vulnerability has been resolved: drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug When trying to do a rather aggressive test of igt's "xe_module_load --r reload" with a full desktop environment and game running I noticed a few OOPSes when dereferencing freed pointers, related to framebuffers and property blobs after the compositor exits. Solve this by guarding the freeing in drm_file with drm_dev_enter/exit, and immediately put the references from struct drm_file objects during drm_dev_unplug(). Related warnings for framebuffers on the subtest: [ 739.713076] ------------[ cut here ]------------ WARN_ON(!list_empty(&dev->mode_config.fb_list)) [ 739.713079] WARNING: drivers/gpu/drm/drm_mode_config.c:584 at drm_mode_config_cleanup+0x30b/0x320 [drm], CPU#12: xe_module_load/13145 .... [ 739.713328] Call Trace: [ 739.713330] <TASK> [ 739.713335] ? intel_pmdemand_destroy_state+0x11/0x20 [xe] [ 739.713574] ? intel_atomic_global_obj_cleanup+0xe4/0x1a0 [xe] [ 739.713794] intel_display_driver_remove_noirq+0x51/0xb0 [xe] [ 739.714041] xe_display_fini_early+0x33/0x50 [xe] [ 739.714284] devm_action_release+0xf/0x20 [ 739.714294] devres_release_all+0xad/0xf0 [ 739.714301] device_unbind_cleanup+0x12/0xa0 [ 739.714305] device_release_driver_internal+0x1b7/0x210 [ 739.714311] device_driver_detach+0x14/0x20 [ 739.714315] unbind_store+0xa6/0xb0 [ 739.714319] drv_attr_store+0x21/0x30 [ 739.714322] sysfs_kf_write+0x48/0x60 [ 739.714328] kernfs_fop_write_iter+0x16b/0x240 [ 739.714333] vfs_write+0x266/0x520 [ 739.714341] ksys_write+0x72/0xe0 [ 739.714345] __x64_sys_write+0x19/0x20 [ 739.714347] x64_sys_call+0xa15/0xa30 [ 739.714355] do_syscall_64+0xd8/0xab0 [ 739.714361] entry_SYSCALL_64_after_hwframe+0x4b/0x53 and [ 739.714459] ------------[ cut here ]------------ [ 739.714461] xe 0000:67:00.0: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 739.714464] WARNING: drivers/gpu/drm/drm_framebuffer.c:833 at drm_framebuffer_free+0x6c/0x90 [drm], CPU#12: xe_module_load/13145 [ 739.714715] RIP: 0010:drm_framebuffer_free+0x7a/0x90 [drm] ... [ 739.714869] Call Trace: [ 739.714871] <TASK> [ 739.714876] drm_mode_config_cleanup+0x26a/0x320 [drm] [ 739.714998] ? __drm_printfn_seq_file+0x20/0x20 [drm] [ 739.715115] ? drm_mode_config_cleanup+0x207/0x320 [drm] [ 739.715235] intel_display_driver_remove_noirq+0x51/0xb0 [xe] [ 739.715576] xe_display_fini_early+0x33/0x50 [xe] [ 739.715821] devm_action_release+0xf/0x20 [ 739.715828] devres_release_all+0xad/0xf0 [ 739.715843] device_unbind_cleanup+0x12/0xa0 [ 739.715850] device_release_driver_internal+0x1b7/0x210 [ 739.715856] device_driver_detach+0x14/0x20 [ 739.715860] unbind_store+0xa6/0xb0 [ 739.715865] drv_attr_store+0x21/0x30 [ 739.715868] sysfs_kf_write+0x48/0x60 [ 739.715873] kernfs_fop_write_iter+0x16b/0x240 [ 739.715878] vfs_write+0x266/0x520 [ 739.715886] ksys_write+0x72/0xe0 [ 739.715890] __x64_sys_write+0x19/0x20 [ 739.715893] x64_sys_call+0xa15/0xa30 [ 739.715900] do_syscall_64+0xd8/0xab0 [ 739.715905] entry_SYSCALL_64_after_hwframe+0x4b/0x53 and then finally file close blows up: [ 743.186530] Oops: general protection fault, probably for non-canonical address 0xdead000000000122: 0000 [#1] SMP [ 743.186535] CPU: 3 UID: 1000 PID: 3453 Comm: kwin_wayland Tainted: G W 7.0.0-rc1-valkyria+ #110 PREEMPT_{RT,(lazy)} [ 743.186537] Tainted: [W]=WARN [ 743.186538] Hardware name: Gigabyte Technology Co., Ltd. X299 AORUS Gaming 3/X299 AORUS Gaming 3-CF, BIOS F8n 12/06/2021 [ 743.186539] RIP: 0010:drm_framebuffer_cleanup+0x55/0xc0 [drm] [ 743.186588] Code: d8 72 73 0f b6 42 05 ff c3 39 c3 72 e8 49 8d bd 50 07 00 00 31 f6 e8 3a 80 d3 e1 49 8b 44 24 10 49 8d 7c 24 08 49 8b 54 24 08 <48> 3b 38 0f 85 95 7f 02 00 48 3b 7a 08 0f 85 8b 7f 02 00 48 89 42 [ 743.186589] RSP: 0018:ffffc900085e3cf8 EFLAGS: 00 ---truncated--- CVE-2026-23471
VCID-5g2a-qj5r-uub4 kernel: wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() CVE-2026-23336
VCID-5kdh-vgcu-kkf3 In the Linux kernel, the following vulnerability has been resolved: af_key: validate families in pfkey_send_migrate() syzbot was able to trigger a crash in skb_put() [1] Issue is that pfkey_send_migrate() does not check old/new families, and that set_ipsecrequest() @family argument was truncated, thus possibly overfilling the skb. Validate families early, do not wait set_ipsecrequest(). [1] skbuff: skb_over_panic: text:ffffffff8a752120 len:392 put:16 head:ffff88802a4ad040 data:ffff88802a4ad040 tail:0x188 end:0x180 dev:<NULL> kernel BUG at net/core/skbuff.c:214 ! Call Trace: <TASK> skb_over_panic net/core/skbuff.c:219 [inline] skb_put+0x159/0x210 net/core/skbuff.c:2655 skb_put_zero include/linux/skbuff.h:2788 [inline] set_ipsecrequest net/key/af_key.c:3532 [inline] pfkey_send_migrate+0x1270/0x2e50 net/key/af_key.c:3636 km_migrate+0x155/0x260 net/xfrm/xfrm_state.c:2848 xfrm_migrate+0x2140/0x2450 net/xfrm/xfrm_policy.c:4705 xfrm_do_migrate+0x8ff/0xaa0 net/xfrm/xfrm_user.c:3150 CVE-2026-31515
VCID-5v5u-d5mg-53bv kernel: net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup() CVE-2026-23284
VCID-63m2-phjq-kuav kernel: RISC-V: KVM: Write hgatp register with valid mode bits CVE-2025-40065
VCID-64bq-3uw9-yua2 In the Linux kernel, the following vulnerability has been resolved: net: bcmasp: fix double free of WoL irq We do not need to free wol_irq since it was instantiated with devm_request_irq(). So devres will free for us. CVE-2026-31506
VCID-651u-f45c-57de In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: clamp SCO altsetting table indices btusb_work() maps the number of active SCO links to USB alternate settings through a three-entry lookup table when CVSD traffic uses transparent voice settings. The lookup currently indexes alts[] with data->sco_num - 1 without first constraining sco_num to the number of available table entries. While the table only defines alternate settings for up to three SCO links, data->sco_num comes from hci_conn_num() and is used directly. Cap the lookup to the last table entry before indexing it so the driver keeps selecting the highest supported alternate setting without reading past alts[]. CVE-2026-31497
VCID-6cqc-um2d-1kfk kernel: wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() CVE-2026-23315
VCID-6ggj-8ema-x7f6 kernel: mm: thp: deny THP for files on anonymous inodes CVE-2026-23375
VCID-6hur-ug1s-83am In the Linux kernel, the following vulnerability has been resolved: serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN uart_write_room() and uart_write() behave inconsistently when xmit_buf is NULL (which happens for PORT_UNKNOWN ports that were never properly initialized): - uart_write_room() returns kfifo_avail() which can be > 0 - uart_write() checks xmit_buf and returns 0 if NULL This inconsistency causes an infinite loop in drivers that rely on tty_write_room() to determine if they can write: while (tty_write_room(tty) > 0) { written = tty->ops->write(...); // written is always 0, loop never exits } For example, caif_serial's handle_tx() enters an infinite loop when used with PORT_UNKNOWN serial ports, causing system hangs. Fix by making uart_write_room() also check xmit_buf and return 0 if it's NULL, consistent with uart_write(). Reproducer: https://gist.github.com/mrpre/d9a694cc0e19828ee3bc3b37983fde13 CVE-2026-23472
VCID-6pmj-r187-kqcb kernel: wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() CVE-2026-23325
VCID-6rpd-ws7d-4qeg kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering CVE-2025-38137
VCID-6wrr-yr71-xuhk kernel: tcp: secure_seq: add back ports to TS offset CVE-2026-23247
VCID-744r-rpqc-k3gx kernel: net/mlx5e: Fix race condition during IPSec ESN update CVE-2026-23440
VCID-7b27-phbd-fqbq In the Linux kernel, the following vulnerability has been resolved: spi: spi-fsl-lpspi: fix teardown order issue (UAF) There is a teardown order issue in the driver. The SPI controller is registered using devm_spi_register_controller(), which delays unregistration of the SPI controller until after the fsl_lpspi_remove() function returns. As the fsl_lpspi_remove() function synchronously tears down the DMA channels, a running SPI transfer triggers the following NULL pointer dereference due to use after free: | fsl_lpspi 42550000.spi: I/O Error in DMA RX | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [...] | Call trace: | fsl_lpspi_dma_transfer+0x260/0x340 [spi_fsl_lpspi] | fsl_lpspi_transfer_one+0x198/0x448 [spi_fsl_lpspi] | spi_transfer_one_message+0x49c/0x7c8 | __spi_pump_transfer_message+0x120/0x420 | __spi_sync+0x2c4/0x520 | spi_sync+0x34/0x60 | spidev_message+0x20c/0x378 [spidev] | spidev_ioctl+0x398/0x750 [spidev] [...] Switch from devm_spi_register_controller() to spi_register_controller() in fsl_lpspi_probe() and add the corresponding spi_unregister_controller() in fsl_lpspi_remove(). CVE-2026-31485
VCID-7bmu-z2mb-cbbe kernel: xfs: get rid of the xchk_xfile_*_descr calls CVE-2026-23252
VCID-7dx8-ys84-zuac kernel: clk: sunxi-ng: h616: Reparent GPU clock during frequency changes CVE-2025-38041
VCID-7eh9-dqkv-j3bm kernel: dmaengine: ti: k3-udma-glue: Drop skip_fdq argument from k3_udma_glue_reset_rx_chn CVE-2025-38042
VCID-7ey4-wrhk-zfce kernel: coresight: holding cscfg_csdev_lock while removing cscfg from csdev CVE-2025-38132
VCID-7gw9-7kbs-2uh2 kernel: landlock: Fix handling of disconnected directories CVE-2025-68736
VCID-7j8j-s3am-6bgv kernel: Linux kernel: Denial of Service via double-increment of reference count in netfilter CVE-2025-39764
VCID-7kxd-yjnx-m7f2 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb Before using sk pointer, check if it is null. Fix the following: KASAN: null-ptr-deref in range [0x0000000000000260-0x0000000000000267] CPU: 0 UID: 0 PID: 5985 Comm: kworker/0:5 Not tainted 7.0.0-rc4-00029-ga989fde763f4 #1 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-9.fc43 06/10/2025 Workqueue: events l2cap_info_timeout RIP: 0010:kasan_byte_accessible+0x12/0x30 Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cce veth0_macvtap: entered promiscuous mode RSP: 0018:ffffc90006e0f808 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffffff89746018 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff89746018 RDI: 000000000000004c RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffffff8aae3e70 R12: 0000000000000000 R13: 0000000000000260 R14: 0000000000000260 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880983c2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005582615a5008 CR3: 000000007007e000 CR4: 0000000000752ef0 PKRU: 55555554 Call Trace: <TASK> __kasan_check_byte+0x12/0x40 lock_acquire+0x79/0x2e0 lock_sock_nested+0x48/0x100 ? l2cap_sock_ready_cb+0x46/0x160 l2cap_sock_ready_cb+0x46/0x160 l2cap_conn_start+0x779/0xff0 ? __pfx_l2cap_conn_start+0x10/0x10 ? l2cap_info_timeout+0x60/0xa0 ? __pfx___mutex_lock+0x10/0x10 l2cap_info_timeout+0x68/0xa0 ? process_scheduled_works+0xa8d/0x18c0 process_scheduled_works+0xb6e/0x18c0 ? __pfx_process_scheduled_works+0x10/0x10 ? assign_work+0x3d5/0x5e0 worker_thread+0xa53/0xfc0 kthread+0x388/0x470 ? __pfx_worker_thread+0x10/0x10 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x51e/0xb90 ? __pfx_ret_from_fork+0x10/0x10 veth1_macvtap: entered promiscuous mode ? __switch_to+0xc7d/0x1450 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK> Modules linked in: ---[ end trace 0000000000000000 ]--- batman_adv: batadv0: Interface activated: batadv_slave_0 batman_adv: batadv0: Interface activated: batadv_slave_1 netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 RIP: 0010:kasan_byte_accessible+0x12/0x30 Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cce ieee80211 phy39: Selected rate control algorithm 'minstrel_ht' RSP: 0018:ffffc90006e0f808 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffffff89746018 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff89746018 RDI: 000000000000004c RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffffff8aae3e70 R12: 0000000000000000 R13: 0000000000000260 R14: 0000000000000260 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880983c2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7e16139e9c CR3: 000000000e74e000 CR4: 0000000000752ef0 PKRU: 55555554 Kernel panic - not syncing: Fatal exception CVE-2026-31510
VCID-7t89-3m8t-1ydq In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix drm_edid leak in amdgpu_dm [WHAT] When a sink is connected, aconnector->drm_edid was overwritten without freeing the previous allocation, causing a memory leak on resume. [HOW] Free the previous drm_edid before updating it. (cherry picked from commit 52024a94e7111366141cfc5d888b2ef011f879e5) CVE-2026-31461
VCID-7v66-8w2u-duf9 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: HIDP: Fix possible UAF This fixes the following trace caused by not dropping l2cap_conn reference when user->remove callback is called: [ 97.809249] l2cap_conn_free: freeing conn ffff88810a171c00 [ 97.809907] CPU: 1 UID: 0 PID: 1419 Comm: repro_standalon Not tainted 7.0.0-rc1-dirty #14 PREEMPT(lazy) [ 97.809935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-debian-1.17.0-1 04/01/2014 [ 97.809947] Call Trace: [ 97.809954] <TASK> [ 97.809961] dump_stack_lvl (lib/dump_stack.c:122) [ 97.809990] l2cap_conn_free (net/bluetooth/l2cap_core.c:1808) [ 97.810017] l2cap_conn_del (./include/linux/kref.h:66 net/bluetooth/l2cap_core.c:1821 net/bluetooth/l2cap_core.c:1798) [ 97.810055] l2cap_disconn_cfm (net/bluetooth/l2cap_core.c:7347 (discriminator 1) net/bluetooth/l2cap_core.c:7340 (discriminator 1)) [ 97.810086] ? __pfx_l2cap_disconn_cfm (net/bluetooth/l2cap_core.c:7341) [ 97.810117] hci_conn_hash_flush (./include/net/bluetooth/hci_core.h:2152 (discriminator 2) net/bluetooth/hci_conn.c:2644 (discriminator 2)) [ 97.810148] hci_dev_close_sync (net/bluetooth/hci_sync.c:5360) [ 97.810180] ? __pfx_hci_dev_close_sync (net/bluetooth/hci_sync.c:5285) [ 97.810212] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810242] ? up_write (./arch/x86/include/asm/atomic64_64.h:87 (discriminator 5) ./include/linux/atomic/atomic-arch-fallback.h:2852 (discriminator 5) ./include/linux/atomic/atomic-long.h:268 (discriminator 5) ./include/linux/atomic/atomic-instrumented.h:3391 (discriminator 5) kernel/locking/rwsem.c:1385 (discriminator 5) kernel/locking/rwsem.c:1643 (discriminator 5)) [ 97.810267] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810290] ? rcu_is_watching (./arch/x86/include/asm/atomic.h:23 ./include/linux/atomic/atomic-arch-fallback.h:457 ./include/linux/context_tracking.h:128 kernel/rcu/tree.c:752) [ 97.810320] hci_unregister_dev (net/bluetooth/hci_core.c:504 net/bluetooth/hci_core.c:2716) [ 97.810346] vhci_release (drivers/bluetooth/hci_vhci.c:691) [ 97.810375] ? __pfx_vhci_release (drivers/bluetooth/hci_vhci.c:678) [ 97.810404] __fput (fs/file_table.c:470) [ 97.810430] task_work_run (kernel/task_work.c:235) [ 97.810451] ? __pfx_task_work_run (kernel/task_work.c:201) [ 97.810472] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810495] ? do_raw_spin_unlock (./include/asm-generic/qspinlock.h:128 (discriminator 5) kernel/locking/spinlock_debug.c:142 (discriminator 5)) [ 97.810527] do_exit (kernel/exit.c:972) [ 97.810547] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810574] ? __pfx_do_exit (kernel/exit.c:897) [ 97.810594] ? lock_acquire (kernel/locking/lockdep.c:470 (discriminator 6) kernel/locking/lockdep.c:5870 (discriminator 6) kernel/locking/lockdep.c:5825 (discriminator 6)) [ 97.810616] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810639] ? do_raw_spin_lock (kernel/locking/spinlock_debug.c:95 (discriminator 4) kernel/locking/spinlock_debug.c:118 (discriminator 4)) [ 97.810664] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810688] ? find_held_lock (kernel/locking/lockdep.c:5350 (discriminator 1)) [ 97.810721] do_group_exit (kernel/exit.c:1093) [ 97.810745] get_signal (kernel/signal.c:3007 (discriminator 1)) [ 97.810772] ? security_file_permission (./arch/x86/include/asm/jump_label.h:37 security/security.c:2366) [ 97.810803] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810826] ? vfs_read (fs/read_write.c:555) [ 97.810854] ? __pfx_get_signal (kernel/signal.c:2800) [ 97.810880] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810905] ? __pfx_vfs_read (fs/read_write.c:555) [ 97.810932] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810960] arch_do_signal_or_restart (arch/ ---truncated--- CVE-2026-23462
VCID-7xah-5pdm-eqfb kernel: net: ipv4: fix ARM64 alignment fault in multipath hash seed CVE-2026-23316
VCID-7y4h-xvdh-s3bs In the Linux kernel, the following vulnerability has been resolved: cxl/port: Fix use after free of parent_port in cxl_detach_ep() cxl_detach_ep() is called during bottom-up removal when all CXL memory devices beneath a switch port have been removed. For each port in the hierarchy it locks both the port and its parent, removes the endpoint, and if the port is now empty, marks it dead and unregisters the port by calling delete_switch_port(). There are two places during this work where the parent_port may be used after freeing: First, a concurrent detach may have already processed a port by the time a second worker finds it via bus_find_device(). Without pinning parent_port, it may already be freed when we discover port->dead and attempt to unlock the parent_port. In a production kernel that's a silent memory corruption, with lock debug, it looks like this: []DEBUG_LOCKS_WARN_ON(__owner_task(owner) != get_current()) []WARNING: kernel/locking/mutex.c:949 at __mutex_unlock_slowpath+0x1ee/0x310 []Call Trace: []mutex_unlock+0xd/0x20 []cxl_detach_ep+0x180/0x400 [cxl_core] []devm_action_release+0x10/0x20 []devres_release_all+0xa8/0xe0 []device_unbind_cleanup+0xd/0xa0 []really_probe+0x1a6/0x3e0 Second, delete_switch_port() releases three devm actions registered against parent_port. The last of those is unregister_port() and it calls device_unregister() on the child port, which can cascade. If parent_port is now also empty the device core may unregister and free it too. So by the time delete_switch_port() returns, parent_port may be free, and the subsequent device_unlock(&parent_port->dev) operates on freed memory. The kernel log looks same as above, with a different offset in cxl_detach_ep(). Both of these issues stem from the absence of a lifetime guarantee between a child port and its parent port. Establish a lifetime rule for ports: child ports hold a reference to their parent device until release. Take the reference when the port is allocated and drop it when released. This ensures the parent is valid for the full lifetime of the child and eliminates the use after free window in cxl_detach_ep(). This is easily reproduced with a reload of cxl_acpi in QEMU with CXL devices present. CVE-2026-31530
VCID-81z1-7axu-rqep kernel: wifi: mac80211: correctly decode TTLM with default link map CVE-2026-23152
VCID-851j-pvmm-8yc7 kernel: ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw() CVE-2025-22117
VCID-898p-crnv-w7cb In the Linux kernel, the following vulnerability has been resolved: HID: apple: avoid memory leak in apple_report_fixup() The apple_report_fixup() function was returning a newly kmemdup()-allocated buffer, but never freeing it. The caller of report_fixup() does not take ownership of the returned pointer, but it *is* permitted to return a sub-portion of the input rdesc, whose lifetime is managed by the caller. CVE-2026-31520
VCID-8a31-1mz8-17cu kernel: can: usb: f81604: correctly anchor the urb in the read bulk callback CVE-2026-23347
VCID-8ab4-cv5e-2kff kernel: i2c: i801: Revert "i2c: i801: replace acpi_lock with I2C bus lock" CVE-2026-23369
VCID-8bmx-4nbw-6qcn kernel: ice: Fix memory leak in ice_set_ringparam() CVE-2026-23389
VCID-8edx-kmgw-jue5 kernel: can: j1939: implement NETDEV_UNREGISTER notification handler CVE-2025-39925
VCID-8hgk-zrmy-tbba kernel: io_uring/kbuf: fix signedness in this_len calculation CVE-2025-39822
VCID-8kug-7bk5-t3bf kernel: wifi: rsi: Don't default to -EOPNOTSUPP in rsi_mac80211_config CVE-2026-23373
VCID-8q1z-p2qp-nkbf In the Linux kernel, the following vulnerability has been resolved: xfs: stop reclaim before pushing AIL during unmount The unmount sequence in xfs_unmount_flush_inodes() pushed the AIL while background reclaim and inodegc are still running. This is broken independently of any use-after-free issues - background reclaim and inodegc should not be running while the AIL is being pushed during unmount, as inodegc can dirty and insert inodes into the AIL during the flush, and background reclaim can race to abort and free dirty inodes. Reorder xfs_unmount_flush_inodes() to stop inodegc and cancel background reclaim before pushing the AIL. Stop inodegc before cancelling m_reclaim_work because the inodegc worker can re-queue m_reclaim_work via xfs_inodegc_set_reclaimable. CVE-2026-31455
VCID-8qcc-chc3-yuaa In the Linux kernel, the following vulnerability has been resolved: netfs: Fix read abandonment during retry Under certain circumstances, all the remaining subrequests from a read request will get abandoned during retry. The abandonment process expects the 'subreq' variable to be set to the place to start abandonment from, but it doesn't always have a useful value (it will be uninitialised on the first pass through the loop and it may point to a deleted subrequest on later passes). Fix the first jump to "abandon:" to set subreq to the start of the first subrequest expected to need retry (which, in this abandonment case, turned out unexpectedly to no longer have NEED_RETRY set). Also clear the subreq pointer after discarding superfluous retryable subrequests to cause an oops if we do try to access it. CVE-2026-31435
VCID-8qua-yr2x-s7fd kernel: af_unix: Give up GC if MSG_PEEK intervened CVE-2026-23394
VCID-8swc-xby9-cygu kernel: blk-throttle: fix access race during throttle policy activation CVE-2025-40147
VCID-8vkt-e4d8-qfgn kernel: amd/amdkfd: enhance kfd process check in switch partition CVE-2025-68174
VCID-8xay-cepn-vfdd In the Linux kernel, the following vulnerability has been resolved: ksmbd: do not expire session on binding failure When a multichannel session binding request fails (e.g. wrong password), the error path unconditionally sets sess->state = SMB2_SESSION_EXPIRED. However, during binding, sess points to the target session looked up via ksmbd_session_lookup_slowpath() -- which belongs to another connection's user. This allows a remote attacker to invalidate any active session by simply sending a binding request with a wrong password (DoS). Fix this by skipping session expiration when the failed request was a binding attempt, since the session does not belong to the current connection. The reference taken by ksmbd_session_lookup_slowpath() is still correctly released via ksmbd_user_session_put(). CVE-2026-31476
VCID-8xmp-5z38-1qaa kernel: drbd: fix null-pointer dereference on local read error CVE-2026-23285
VCID-915z-uxfx-3uh1 kernel: audit: add fchmodat2() to change attributes class CVE-2025-71239
VCID-93h7-cr4j-sbfn In the Linux kernel, the following vulnerability has been resolved: team: fix header_ops type confusion with non-Ethernet ports Similar to commit 950803f72547 ("bonding: fix type confusion in bond_setup_by_slave()") team has the same class of header_ops type confusion. For non-Ethernet ports, team_setup_by_port() copies port_dev->header_ops directly. When the team device later calls dev_hard_header() or dev_parse_header(), these callbacks can run with the team net_device instead of the real lower device, so netdev_priv(dev) is interpreted as the wrong private type and can crash. The syzbot report shows a crash in bond_header_create(), but the root cause is in team: the topology is gre -> bond -> team, and team calls the inherited header_ops with its own net_device instead of the lower device, so bond_header_create() receives a team device and interprets netdev_priv() as bonding private data, causing a type confusion crash. Fix this by introducing team header_ops wrappers for create/parse, selecting a team port under RCU, and calling the lower device callbacks with port->dev, so each callback always sees the correct net_device context. Also pass the selected lower device to the lower parse callback, so recursion is bounded in stacked non-Ethernet topologies and parse callbacks always run with the correct device context. CVE-2026-31502
VCID-94ed-vp4v-mqeg kernel: Kernel: Denial of Service via NULL pointer dereference in VXLAN module CVE-2025-68353
VCID-94k1-ja9w-2fd2 CVE-2026-31421
VCID-95hc-n74c-s3bv In the Linux kernel, the following vulnerability has been resolved: s390/entry: Scrub r12 register on kernel entry Before commit f33f2d4c7c80 ("s390/bp: remove TIF_ISOLATE_BP"), all entry handlers loaded r12 with the current task pointer (lg %r12,__LC_CURRENT) for use by the BPENTER/BPEXIT macros. That commit removed TIF_ISOLATE_BP, dropping both the branch prediction macros and the r12 load, but did not add r12 to the register clearing sequence. Add the missing xgr %r12,%r12 to make the register scrub consistent across all entry points. CVE-2026-31482
VCID-98mp-5h68-73eg kernel: Linux kernel: Denial of Service during UFS power down CVE-2025-68236
VCID-98ws-1jnk-67hr In the Linux kernel, the following vulnerability has been resolved: virt: tdx-guest: Fix handling of host controlled 'quote' buffer length Validate host controlled value `quote_buf->out_len` that determines how many bytes of the quote are copied out to guest userspace. In TDX environments with remote attestation, quotes are not considered private, and can be forwarded to an attestation server. Catch scenarios where the host specifies a response length larger than the guest's allocation, or otherwise races modifying the response while the guest consumes it. This prevents contents beyond the pages allocated for `quote_buf` (up to TSM_REPORT_OUTBLOB_MAX) from being read out to guest userspace, and possibly forwarded in attestation requests. Recall that some deployments want per-container configs-tsm-report interfaces, so the leak may cross container protection boundaries, not just local root. CVE-2026-31470
VCID-98y4-8sve-mfbz kernel: mlx5: Fix default values in create CQ CVE-2025-68209
VCID-9axb-sz3w-ubcx In the Linux kernel, the following vulnerability has been resolved: udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n When CONFIG_IPV6 is disabled, the udp_sock_create6() function returns 0 (success) without actually creating a socket. Callers such as fou_create() then proceed to dereference the uninitialized socket pointer, resulting in a NULL pointer dereference. The captured NULL deref crash: BUG: kernel NULL pointer dereference, address: 0000000000000018 RIP: 0010:fou_nl_add_doit (net/ipv4/fou_core.c:590 net/ipv4/fou_core.c:764) [...] Call Trace: <TASK> genl_family_rcv_msg_doit.constprop.0 (net/netlink/genetlink.c:1114) genl_rcv_msg (net/netlink/genetlink.c:1194 net/netlink/genetlink.c:1209) [...] netlink_rcv_skb (net/netlink/af_netlink.c:2550) genl_rcv (net/netlink/genetlink.c:1219) netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) netlink_sendmsg (net/netlink/af_netlink.c:1894) __sock_sendmsg (net/socket.c:727 (discriminator 1) net/socket.c:742 (discriminator 1)) __sys_sendto (./include/linux/file.h:62 (discriminator 1) ./include/linux/file.h:83 (discriminator 1) net/socket.c:2183 (discriminator 1)) __x64_sys_sendto (net/socket.c:2213 (discriminator 1) net/socket.c:2209 (discriminator 1) net/socket.c:2209 (discriminator 1)) do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1)) entry_SYSCALL_64_after_hwframe (net/arch/x86/entry/entry_64.S:130) This patch makes udp_sock_create6 return -EPFNOSUPPORT instead, so callers correctly take their error paths. There is only one caller of the vulnerable function and only privileged users can trigger it. CVE-2026-23439
VCID-9cpj-kd98-33bz kernel: net/sched: act_gate: snapshot parameters with RCU on replace CVE-2026-23245
VCID-9cuj-t2sc-bbdj kernel: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions CVE-2026-23317
VCID-9dfd-an6h-67gp kernel: btrfs: do not strictly require dirty metadata threshold for metadata writepages CVE-2026-23157
VCID-9ej7-7tra-zqcm kernel: netfilter: nft_set_rbtree: validate open interval overlap CVE-2026-23333
VCID-9jgy-8b6j-ayfz kernel: net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow CVE-2025-39834
VCID-9kuz-7fag-4qhv kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() CVE-2026-23231
VCID-9m2t-y1zb-hfar CVE-2026-31412
VCID-9qhe-6xhk-hfhf kernel: IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq() CVE-2026-23289
VCID-9sm6-shj5-cqh5 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure ieee80211_tx_prepare_skb() has three error paths, but only two of them free the skb. The first error path (ieee80211_tx_prepare() returning TX_DROP) does not free it, while invoke_tx_handlers() failure and the fragmentation check both do. Add kfree_skb() to the first error path so all three are consistent, and remove the now-redundant frees in callers (ath9k, mt76, mac80211_hwsim) to avoid double-free. Document the skb ownership guarantee in the function's kdoc. CVE-2026-23444
VCID-9tbh-mrhu-v3am kernel: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port CVE-2025-38597
VCID-9ur7-ynkr-rydr kernel: wifi: ath12k: Fix MSDU buffer types handling in RX error path CVE-2025-68729
VCID-a1ez-xh2w-7ba6 In the Linux kernel, the following vulnerability has been resolved: ext4: publish jinode after initialization ext4_inode_attach_jinode() publishes ei->jinode to concurrent users. It used to set ei->jinode before jbd2_journal_init_jbd_inode(), allowing a reader to observe a non-NULL jinode with i_vfs_inode still unset. The fast commit flush path can then pass this jinode to jbd2_wait_inode_data(), which dereferences i_vfs_inode->i_mapping and may crash. Below is the crash I observe: ``` BUG: unable to handle page fault for address: 000000010beb47f4 PGD 110e51067 P4D 110e51067 PUD 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 1 UID: 0 PID: 4850 Comm: fc_fsync_bench_ Not tainted 6.18.0-00764-g795a690c06a5 #1 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.17.0-2-2 04/01/2014 RIP: 0010:xas_find_marked+0x3d/0x2e0 Code: e0 03 48 83 f8 02 0f 84 f0 01 00 00 48 8b 47 08 48 89 c3 48 39 c6 0f 82 fd 01 00 00 48 85 c9 74 3d 48 83 f9 03 77 63 4c 8b 0f <49> 8b 71 08 48 c7 47 18 00 00 00 00 48 89 f1 83 e1 03 48 83 f9 02 RSP: 0018:ffffbbee806e7bf0 EFLAGS: 00010246 RAX: 000000000010beb4 RBX: 000000000010beb4 RCX: 0000000000000003 RDX: 0000000000000001 RSI: 0000002000300000 RDI: ffffbbee806e7c10 RBP: 0000000000000001 R08: 0000002000300000 R09: 000000010beb47ec R10: ffff9ea494590090 R11: 0000000000000000 R12: 0000002000300000 R13: ffffbbee806e7c90 R14: ffff9ea494513788 R15: ffffbbee806e7c88 FS: 00007fc2f9e3e6c0(0000) GS:ffff9ea6b1444000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000010beb47f4 CR3: 0000000119ac5000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: <TASK> filemap_get_folios_tag+0x87/0x2a0 __filemap_fdatawait_range+0x5f/0xd0 ? srso_alias_return_thunk+0x5/0xfbef5 ? __schedule+0x3e7/0x10c0 ? srso_alias_return_thunk+0x5/0xfbef5 ? srso_alias_return_thunk+0x5/0xfbef5 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ? srso_alias_return_thunk+0x5/0xfbef5 ? cap_safe_nice+0x37/0x70 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ? srso_alias_return_thunk+0x5/0xfbef5 filemap_fdatawait_range_keep_errors+0x12/0x40 ext4_fc_commit+0x697/0x8b0 ? ext4_file_write_iter+0x64b/0x950 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ? srso_alias_return_thunk+0x5/0xfbef5 ? vfs_write+0x356/0x480 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ext4_sync_file+0xf7/0x370 do_fsync+0x3b/0x80 ? syscall_trace_enter+0x108/0x1d0 __x64_sys_fdatasync+0x16/0x20 do_syscall_64+0x62/0x2c0 entry_SYSCALL_64_after_hwframe+0x76/0x7e ... ``` Fix this by initializing the jbd2_inode first. Use smp_wmb() and WRITE_ONCE() to publish ei->jinode after initialization. Readers use READ_ONCE() to fetch the pointer. CVE-2026-31450
VCID-a1xg-dyn3-skb6 kernel: Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ CVE-2026-23395
VCID-a28q-pf9z-abdm kernel: ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz CVE-2026-23377
VCID-a29y-u4f3-nkfk kernel: staging: most: remove broken i2c driver CVE-2025-68755
VCID-a36h-pqj3-9bhe kernel: xdp: produce a warning when calculated tailroom is negative CVE-2026-23343
VCID-a3d8-8qvy-ykdr kernel: sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting CVE-2026-23371
VCID-a5tz-dm6g-zqch kernel: smb: client: Don't log plaintext credentials in cifs_set_cifscreds CVE-2026-23303
VCID-a6bg-yemv-4kcf kernel: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() CVE-2025-40098
VCID-a7fc-8bje-hugq In the Linux kernel, the following vulnerability has been resolved: perf: Make sure to use pmu_ctx->pmu for groups Oliver reported that x86_pmu_del() ended up doing an out-of-bound memory access when group_sched_in() fails and needs to roll back. This *should* be handled by the transaction callbacks, but he found that when the group leader is a software event, the transaction handlers of the wrong PMU are used. Despite the move_group case in perf_event_open() and group_sched_in() using pmu_ctx->pmu. Turns out, inherit uses event->pmu to clone the events, effectively undoing the move_group case for all inherited contexts. Fix this by also making inherit use pmu_ctx->pmu, ensuring all inherited counters end up in the same pmu context. Similarly, __perf_event_read() should use equally use pmu_ctx->pmu for the group case. CVE-2026-31528
VCID-abfm-ssmn-1fap kernel: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr() CVE-2024-52560
VCID-ackw-rsbh-rubp kernel: drm/nouveau: fix a use-after-free in r535_gsp_rpc_push() CVE-2025-38187
VCID-ajfm-hpzg-uqck kernel: cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed() CVE-2026-23327
VCID-ajr2-wmhj-fbbj kernel: ksmbd: fix use-after-free of share_conf in compound request CVE-2026-23428
VCID-akq2-c6hp-tfda kernel: crypto: hisilicon/qm - request reserved interrupt for virtual function CVE-2025-40136
VCID-akv9-pdny-1yh6 kernel: fs: ntfs3: check return value of indx_find to avoid infinite loop CVE-2025-71266
VCID-an5c-5rea-u3aq kernel: dlm: prevent NPD when writing a positive value to event_done CVE-2025-23131
VCID-ans1-wmuz-e3bw kernel: memory leak in ubi driver CVE-2024-25740
VCID-apfq-mqch-jkgr In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() sip_help_tcp() parses the SIP Content-Length header with simple_strtoul(), which returns unsigned long, but stores the result in unsigned int clen. On 64-bit systems, values exceeding UINT_MAX are silently truncated before computing the SIP message boundary. For example, Content-Length 4294967328 (2^32 + 32) is truncated to 32, causing the parser to miscalculate where the current message ends. The loop then treats trailing data in the TCP segment as a second SIP message and processes it through the SDP parser. Fix this by changing clen to unsigned long to match the return type of simple_strtoul(), and reject Content-Length values that exceed the remaining TCP payload length. CVE-2026-23457
VCID-asy4-m48b-xydu kernel: netfilter: nf_tables: release flowtable after rcu grace period on error CVE-2026-23392
VCID-awyz-zwdv-quaa kernel: bnxt_en: Mask the bd_cnt field in the TX BD properly CVE-2025-22108
VCID-aymw-na2d-bqfy kernel: coresight: ETR: Fix ETR buffer use-after-free issue CVE-2025-68376
VCID-azqr-xmc7-13b5 kernel: xfs: check for deleted cursors when revalidating two btrees CVE-2026-23249
VCID-b1an-t4b8-4bd1 kernel: net: usb: pegasus: validate USB endpoints CVE-2026-23290
VCID-b2kt-hmz5-yuhb kernel: mm: fix uprobe pte be overwritten when expanding vma CVE-2025-38207
VCID-b51x-3ss2-67ex kernel: RDMA/siw: Fix potential NULL pointer dereference in header processing CVE-2026-23242
VCID-b9uq-ggy1-eyan kernel: Linux kernel: Denial of Service in qla2xxx SCSI driver due to improper command handling after chip reset CVE-2025-68745
VCID-bd8g-qrbe-23hx kernel: Linux kernel (erofs): Denial of Service via corrupted subpage compact indexes CVE-2025-68251
VCID-beg3-c4a1-cfay In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix memory leaks and NULL deref in smb2_lock() smb2_lock() has three error handling issues after list_del() detaches smb_lock from lock_list at no_check_cl: 1) If vfs_lock_file() returns an unexpected error in the non-UNLOCK path, goto out leaks smb_lock and its flock because the out: handler only iterates lock_list and rollback_list, neither of which contains the detached smb_lock. 2) If vfs_lock_file() returns -ENOENT in the UNLOCK path, goto out leaks smb_lock and flock for the same reason. The error code returned to the dispatcher is also stale. 3) In the rollback path, smb_flock_init() can return NULL on allocation failure. The result is dereferenced unconditionally, causing a kernel NULL pointer dereference. Add a NULL check to prevent the crash and clean up the bookkeeping; the VFS lock itself cannot be rolled back without the allocation and will be released at file or connection teardown. Fix cases 1 and 2 by hoisting the locks_free_lock()/kfree() to before the if(!rc) check in the UNLOCK branch so all exit paths share one free site, and by freeing smb_lock and flock before goto out in the non-UNLOCK branch. Propagate the correct error code in both cases. Fix case 3 by wrapping the VFS unlock in an if(rlock) guard and adding a NULL check for locks_free_lock(rlock) in the shared cleanup. Found via call-graph analysis using sqry. CVE-2026-31477
VCID-bfjx-x5b3-53bg kernel: of: unittest: Fix memory leak in unittest_data_add() CVE-2026-23137
VCID-bkp8-m2yc-qub7 kernel: cxl: Fix race of nvdimm_bus object when creating nvdimm objects CVE-2026-23348
VCID-bpmy-u7wr-kude kernel: can: mcp251x: fix deadlock in error path of mcp251x_open CVE-2026-23357
VCID-bq5a-jeg3-9ua7 kernel: nfc: pn533: properly drop the usb interface reference on disconnect CVE-2026-23291
VCID-brte-gqy3-r3ax In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix OOB write in QUERY_INFO for compound requests When a compound request such as READ + QUERY_INFO(Security) is received, and the first command (READ) consumes most of the response buffer, ksmbd could write beyond the allocated buffer while building a security descriptor. The root cause was that smb2_get_info_sec() checked buffer space using ppntsd_size from xattr, while build_sec_desc() often synthesized a significantly larger descriptor from POSIX ACLs. This patch introduces smb_acl_sec_desc_scratch_len() to accurately compute the final descriptor size beforehand, performs proper buffer checking with smb2_calc_max_out_buf_len(), and uses exact-sized allocation + iov pinning. CVE-2026-31432
VCID-bv67-hyh5-j7hm kernel: Linux kernel: Denial of Service due to incorrect SVE context restoration CVE-2026-23102
VCID-c2me-ar1y-y7dw kernel: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() CVE-2026-23004
VCID-c42q-j659-e3gt kernel: Linux kernel: PCI/ASPM use-after-free during hot-unplug CVE-2024-58093
VCID-c49r-knse-6bc5 kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length CVE-2025-39933
VCID-c7xf-x7d5-87gn CVE-2026-31418
VCID-c8mr-kkvc-akfv kernel: wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() CVE-2026-23363
VCID-cayc-j15f-ekdv kernel: wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() CVE-2026-23279
VCID-cepf-zr64-zyab kernel: Linux kernel: Denial of Service due to a race condition in gpiolib CVE-2026-22986
VCID-cfms-gd2h-v7gd kernel: f2fs: fix to do sanity check on node footer for non inode dnode CVE-2025-40025
VCID-chgp-ama8-5ycb In the Linux kernel, the following vulnerability has been resolved: esp: fix skb leak with espintcp and async crypto When the TX queue for espintcp is full, esp_output_tail_tcp will return an error and not free the skb, because with synchronous crypto, the common xfrm output code will drop the packet for us. With async crypto (esp_output_done), we need to drop the skb when esp_output_tail_tcp returns an error. CVE-2026-31518
VCID-cjnk-7asz-zuhp kernel: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing CVE-2026-23383
VCID-cpg7-6nst-gkfn kernel: Linux kernel: Denial of Service via deadlock in block layer sysfs store callbacks CVE-2025-71117
VCID-cqrs-uu2s-affj kernel: scsi: pm8001: Fix use-after-free in pm8001_queue_command() CVE-2026-23306
VCID-cubf-xau2-hbfv In the Linux kernel, the following vulnerability has been resolved: drm/xe: always keep track of remap prev/next During 3D workload, user is reporting hitting: [ 413.361679] WARNING: drivers/gpu/drm/xe/xe_vm.c:1217 at vm_bind_ioctl_ops_unwind+0x1e2/0x2e0 [xe], CPU#7: vkd3d_queue/9925 [ 413.361944] CPU: 7 UID: 1000 PID: 9925 Comm: vkd3d_queue Kdump: loaded Not tainted 7.0.0-070000rc3-generic #202603090038 PREEMPT(lazy) [ 413.361949] RIP: 0010:vm_bind_ioctl_ops_unwind+0x1e2/0x2e0 [xe] [ 413.362074] RSP: 0018:ffffd4c25c3df930 EFLAGS: 00010282 [ 413.362077] RAX: 0000000000000000 RBX: ffff8f3ee817ed10 RCX: 0000000000000000 [ 413.362078] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 413.362079] RBP: ffffd4c25c3df980 R08: 0000000000000000 R09: 0000000000000000 [ 413.362081] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8f41fbf99380 [ 413.362082] R13: ffff8f3ee817e968 R14: 00000000ffffffef R15: ffff8f43d00bd380 [ 413.362083] FS: 00000001040ff6c0(0000) GS:ffff8f4696d89000(0000) knlGS:00000000330b0000 [ 413.362085] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 413.362086] CR2: 00007ddfc4747000 CR3: 00000002e6262005 CR4: 0000000000f72ef0 [ 413.362088] PKRU: 55555554 [ 413.362089] Call Trace: [ 413.362092] <TASK> [ 413.362096] xe_vm_bind_ioctl+0xa9a/0xc60 [xe] Which seems to hint that the vma we are re-inserting for the ops unwind is either invalid or overlapping with something already inserted in the vm. It shouldn't be invalid since this is a re-insertion, so must have worked before. Leaving the likely culprit as something already placed where we want to insert the vma. Following from that, for the case where we do something like a rebind in the middle of a vma, and one or both mapped ends are already compatible, we skip doing the rebind of those vma and set next/prev to NULL. As well as then adjust the original unmap va range, to avoid unmapping the ends. However, if we trigger the unwind path, we end up with three va, with the two ends never being removed and the original va range in the middle still being the shrunken size. If this occurs, one failure mode is when another unwind op needs to interact with that range, which can happen with a vector of binds. For example, if we need to re-insert something in place of the original va. In this case the va is still the shrunken version, so when removing it and then doing a re-insert it can overlap with the ends, which were never removed, triggering a warning like above, plus leaving the vm in a bad state. With that, we need two things here: 1) Stop nuking the prev/next tracking for the skip cases. Instead relying on checking for skip prev/next, where needed. That way on the unwind path, we now correctly remove both ends. 2) Undo the unmap va shrinkage, on the unwind path. With the two ends now removed the unmap va should expand back to the original size again, before re-insertion. v2: - Update the explanation in the commit message, based on an actual IGT of triggering this issue, rather than conjecture. - Also undo the unmap shrinkage, for the skip case. With the two ends now removed, the original unmap va range should expand back to the original range. v3: - Track the old start/range separately. vma_size/start() uses the va info directly. (cherry picked from commit aec6969f75afbf4e01fd5fb5850ed3e9c27043ac) CVE-2026-31479
VCID-cv97-j139-vbfz In the Linux kernel, the following vulnerability has been resolved: ext4: convert inline data to extents when truncate exceeds inline size Add a check in ext4_setattr() to convert files from inline data storage to extent-based storage when truncate() grows the file size beyond the inline capacity. This prevents the filesystem from entering an inconsistent state where the inline data flag is set but the file size exceeds what can be stored inline. Without this fix, the following sequence causes a kernel BUG_ON(): 1. Mount filesystem with inode that has inline flag set and small size 2. truncate(file, 50MB) - grows size but inline flag remains set 3. sendfile() attempts to write data 4. ext4_write_inline_data() hits BUG_ON(write_size > inline_capacity) The crash occurs because ext4_write_inline_data() expects inline storage to accommodate the write, but the actual inline capacity (~60 bytes for i_block + ~96 bytes for xattrs) is far smaller than the file size and write request. The fix checks if the new size from setattr exceeds the inode's actual inline capacity (EXT4_I(inode)->i_inline_size) and converts the file to extent-based storage before proceeding with the size change. This addresses the root cause by ensuring the inline data flag and file size remain consistent during truncate operations. CVE-2026-31452
VCID-cwd1-xgzd-xyb5 CVE-2026-23417
VCID-cwk5-n1mq-kkd2 In the Linux kernel, the following vulnerability has been resolved: driver core: platform: use generic driver_override infrastructure When a driver is probed through __driver_attach(), the bus' match() callback is called without the device lock held, thus accessing the driver_override field without a lock, which can cause a UAF. Fix this by using the driver-core driver_override infrastructure taking care of proper locking internally. Note that calling match() from __driver_attach() without the device lock held is intentional. [1] CVE-2026-31527
VCID-cyj2-3f68-23cy In the Linux kernel, the following vulnerability has been resolved: bpf: Fix exception exit lock checking for subprogs process_bpf_exit_full() passes check_lock = !curframe to check_resource_leak(), which is false in cases when bpf_throw() is called from a static subprog. This makes check_resource_leak() to skip validation of active_rcu_locks, active_preempt_locks, and active_irq_id on exception exits from subprogs. At runtime bpf_throw() unwinds the stack via ORC without releasing any user-acquired locks, which may cause various issues as the result. Fix by setting check_lock = true for exception exits regardless of curframe, since exceptions bypass all intermediate frame cleanup. Update the error message prefix to "bpf_throw" for exception exits to distinguish them from normal BPF_EXIT. Fix reject_subprog_with_rcu_read_lock test which was previously passing for the wrong reason. Test program returned directly from the subprog call without closing the RCU section, so the error was triggered by the unclosed RCU lock on normal exit, not by bpf_throw. Update __msg annotations for affected tests to match the new "bpf_throw" error prefix. The spin_lock case is not affected because they are already checked [1] at the call site in do_check_insn() before bpf_throw can run. [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/kernel/bpf/verifier.c?h=v7.0-rc4#n21098 CVE-2026-31526
VCID-d4u6-bzuu-dubz kernel: dmaengine: lpc18xx-dmamux: fix device leak on route allocation CVE-2025-71188
VCID-d8tr-usd8-6yca kernel: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV CVE-2025-40219
VCID-dgr2-7fpq-4bgv In the Linux kernel, the following vulnerability has been resolved: btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create We have recently observed a number of subvolumes with broken dentries. ls-ing the parent dir looks like: drwxrwxrwt 1 root root 16 Jan 23 16:49 . drwxr-xr-x 1 root root 24 Jan 23 16:48 .. d????????? ? ? ? ? ? broken_subvol and similarly stat-ing the file fails. In this state, deleting the subvol fails with ENOENT, but attempting to create a new file or subvol over it errors out with EEXIST and even aborts the fs. Which leaves us a bit stuck. dmesg contains a single notable error message reading: "could not do orphan cleanup -2" 2 is ENOENT and the error comes from the failure handling path of btrfs_orphan_cleanup(), with the stack leading back up to btrfs_lookup(). btrfs_lookup btrfs_lookup_dentry btrfs_orphan_cleanup // prints that message and returns -ENOENT After some detailed inspection of the internal state, it became clear that: - there are no orphan items for the subvol - the subvol is otherwise healthy looking, it is not half-deleted or anything, there is no drop progress, etc. - the subvol was created a while ago and does the meaningful first btrfs_orphan_cleanup() call that sets BTRFS_ROOT_ORPHAN_CLEANUP much later. - after btrfs_orphan_cleanup() fails, btrfs_lookup_dentry() returns -ENOENT, which results in a negative dentry for the subvolume via d_splice_alias(NULL, dentry), leading to the observed behavior. The bug can be mitigated by dropping the dentry cache, at which point we can successfully delete the subvolume if we want. i.e., btrfs_lookup() btrfs_lookup_dentry() if (!sb_rdonly(inode->vfs_inode)->vfs_inode) btrfs_orphan_cleanup(sub_root) test_and_set_bit(BTRFS_ROOT_ORPHAN_CLEANUP) btrfs_search_slot() // finds orphan item for inode N ... prints "could not do orphan cleanup -2" if (inode == ERR_PTR(-ENOENT)) inode = NULL; return d_splice_alias(NULL, dentry) // NEGATIVE DENTRY for valid subvolume btrfs_orphan_cleanup() does test_and_set_bit(BTRFS_ROOT_ORPHAN_CLEANUP) on the root when it runs, so it cannot run more than once on a given root, so something else must run concurrently. However, the obvious routes to deleting an orphan when nlinks goes to 0 should not be able to run without first doing a lookup into the subvolume, which should run btrfs_orphan_cleanup() and set the bit. The final important observation is that create_subvol() calls d_instantiate_new() but does not set BTRFS_ROOT_ORPHAN_CLEANUP, so if the dentry cache gets dropped, the next lookup into the subvolume will make a real call into btrfs_orphan_cleanup() for the first time. This opens up the possibility of concurrently deleting the inode/orphan items but most typical evict() paths will be holding a reference on the parent dentry (child dentry holds parent->d_lockref.count via dget in d_alloc(), released in __dentry_kill()) and prevent the parent from being removed from the dentry cache. The one exception is delayed iputs. Ordered extent creation calls igrab() on the inode. If the file is unlinked and closed while those refs are held, iput() in __dentry_kill() decrements i_count but does not trigger eviction (i_count > 0). The child dentry is freed and the subvol dentry's d_lockref.count drops to 0, making it evictable while the inode is still alive. Since there are two races (the race between writeback and unlink and the race between lookup and delayed iputs), and there are too many moving parts, the following three diagrams show the complete picture. (Only the second and third are races) Phase 1: Create Subvol in dentry cache without BTRFS_ROOT_ORPHAN_CLEANUP set btrfs_mksubvol() lookup_one_len() __lookup_slow() d_alloc_parallel() __d_alloc() // d_lockref.count = 1 create_subvol(dentry) // doesn't touch the bit.. d_instantiate_new(dentry, inode) // dentry in cache with d_lockref.c ---truncated--- CVE-2026-31519
VCID-dq8r-defv-hbg6 kernel: nvme: memory corruption via unprivileged user passthrough CVE-2023-6238
VCID-dsrd-nv6n-5ygq kernel: scsi: core: Fix refcount leak for tagset_refcnt CVE-2026-23296
VCID-dxt9-x347-pufy kernel: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations CVE-2026-22985
VCID-dykz-252m-jkcu In the Linux kernel, the following vulnerability has been resolved: hwmon: (pmbus/core) Protect regulator operations with mutex The regulator operations pmbus_regulator_get_voltage(), pmbus_regulator_set_voltage(), and pmbus_regulator_list_voltage() access PMBus registers and shared data but were not protected by the update_lock mutex. This could lead to race conditions. However, adding mutex protection directly to these functions causes a deadlock because pmbus_regulator_notify() (which calls regulator_notifier_call_chain()) is often called with the mutex already held (e.g., from pmbus_fault_handler()). If a regulator callback then calls one of the now-protected voltage functions, it will attempt to acquire the same mutex. Rework pmbus_regulator_notify() to utilize a worker function to send notifications outside of the mutex protection. Events are stored as atomics in a per-page bitmask and processed by the worker. Initialize the worker and its associated data during regulator registration, and ensure it is cancelled on device removal using devm_add_action_or_reset(). While at it, remove the unnecessary include of linux/of.h. CVE-2026-31486
VCID-e8ky-fyhz-dqhc In the Linux kernel, the following vulnerability has been resolved: scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() A malicious or compromised VIO server can return a num_written value in the discover targets MAD response that exceeds max_targets. This value is stored directly in vhost->num_targets without validation, and is then used as the loop bound in ibmvfc_alloc_targets() to index into disc_buf[], which is only allocated for max_targets entries. Indices at or beyond max_targets access kernel memory outside the DMA-coherent allocation. The out-of-bounds data is subsequently embedded in Implicit Logout and PLOGI MADs that are sent back to the VIO server, leaking kernel memory. Fix by clamping num_written to max_targets before storing it. CVE-2026-31464
VCID-ecc5-64vs-ekgr In the Linux kernel, the following vulnerability has been resolved: crypto: atmel-sha204a - Fix OOM ->tfm_count leak If memory allocation fails, decrement ->tfm_count to avoid blocking future reads. CVE-2026-31391
VCID-ed3p-sm1w-33am kernel: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled CVE-2026-23293
VCID-edst-7exd-zud8 kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() CVE-2025-40168
VCID-es8r-wvmz-gfe6 kernel: net/sched: Fix backlog accounting in qdisc_dequeue_internal CVE-2025-39677
VCID-ex4p-ftap-h7fe kernel: net: annotate data-races around sk->sk_{data_ready,write_space} CVE-2026-23302
VCID-ex8u-z3r8-cycq In the Linux kernel, the following vulnerability has been resolved: ipv6: add NULL checks for idev in SRv6 paths __in6_dev_get() can return NULL when the device has no IPv6 configuration (e.g. MTU < IPV6_MIN_MTU or after NETDEV_UNREGISTER). Add NULL checks for idev returned by __in6_dev_get() in both seg6_hmac_validate_skb() and ipv6_srh_rcv() to prevent potential NULL pointer dereferences. CVE-2026-23442
VCID-exhn-kypt-2fbd kernel: jfs: fix array-index-out-of-bounds read in add_missing_indices CVE-2025-38204
VCID-exkr-nw4y-guf2 kernel: xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini() CVE-2026-31406
VCID-ezn1-bgny-1qdv kernel: io_uring/rw: free potentially allocated iovec on cache put failure CVE-2026-23259
VCID-f3sv-pbfs-cqcc kernel: um: work around sched_yield not yielding in time-travel mode CVE-2025-37880
VCID-f66d-p3w8-eqfs In the Linux kernel, the following vulnerability has been resolved: mm/pagewalk: fix race between concurrent split and refault The splitting of a PUD entry in walk_pud_range() can race with a concurrent thread refaulting the PUD leaf entry causing it to try walking a PMD range that has disappeared. An example and reproduction of this is to try reading numa_maps of a process while VFIO-PCI is setting up DMA (specifically the vfio_pin_pages_remote call) on a large BAR for that process. This will trigger a kernel BUG: vfio-pci 0000:03:00.0: enabling device (0000 -> 0002) BUG: unable to handle page fault for address: ffffa23980000000 PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI ... RIP: 0010:walk_pgd_range+0x3b5/0x7a0 Code: 8d 43 ff 48 89 44 24 28 4d 89 ce 4d 8d a7 00 00 20 00 48 8b 4c 24 28 49 81 e4 00 00 e0 ff 49 8d 44 24 ff 48 39 c8 4c 0f 43 e3 <49> f7 06 9f ff ff ff 75 3b 48 8b 44 24 20 48 8b 40 28 48 85 c0 74 RSP: 0018:ffffac23e1ecf808 EFLAGS: 00010287 RAX: 00007f44c01fffff RBX: 00007f4500000000 RCX: 00007f44ffffffff RDX: 0000000000000000 RSI: 000ffffffffff000 RDI: ffffffff93378fe0 RBP: ffffac23e1ecf918 R08: 0000000000000004 R09: ffffa23980000000 R10: 0000000000000020 R11: 0000000000000004 R12: 00007f44c0200000 R13: 00007f44c0000000 R14: ffffa23980000000 R15: 00007f44c0000000 FS: 00007fe884739580(0000) GS:ffff9b7d7a9c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffa23980000000 CR3: 000000c0650e2005 CR4: 0000000000770ef0 PKRU: 55555554 Call Trace: <TASK> __walk_page_range+0x195/0x1b0 walk_page_vma+0x62/0xc0 show_numa_map+0x12b/0x3b0 seq_read_iter+0x297/0x440 seq_read+0x11d/0x140 vfs_read+0xc2/0x340 ksys_read+0x5f/0xe0 do_syscall_64+0x68/0x130 ? get_page_from_freelist+0x5c2/0x17e0 ? mas_store_prealloc+0x17e/0x360 ? vma_set_page_prot+0x4c/0xa0 ? __alloc_pages_noprof+0x14e/0x2d0 ? __mod_memcg_lruvec_state+0x8d/0x140 ? __lruvec_stat_mod_folio+0x76/0xb0 ? __folio_mod_stat+0x26/0x80 ? do_anonymous_page+0x705/0x900 ? __handle_mm_fault+0xa8d/0x1000 ? __count_memcg_events+0x53/0xf0 ? handle_mm_fault+0xa5/0x360 ? do_user_addr_fault+0x342/0x640 ? arch_exit_to_user_mode_prepare.constprop.0+0x16/0xa0 ? irqentry_exit_to_user_mode+0x24/0x100 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fe88464f47e Code: c0 e9 b6 fe ff ff 50 48 8d 3d be 07 0b 00 e8 69 01 02 00 66 0f 1f 84 00 00 00 00 00 64 8b 04 25 18 00 00 00 85 c0 75 14 0f 05 <48> 3d 00 f0 ff ff 77 5a c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 28 RSP: 002b:00007ffe6cd9a9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007fe88464f47e RDX: 0000000000020000 RSI: 00007fe884543000 RDI: 0000000000000003 RBP: 00007fe884543000 R08: 00007fe884542010 R09: 0000000000000000 R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000 </TASK> Fix this by validating the PUD entry in walk_pmd_range() using a stable snapshot (pudp_get()). If the PUD is not present or is a leaf, retry the walk via ACTION_AGAIN instead of descending further. This mirrors the retry logic in walk_pte_range(), which lets walk_pmd_range() retry if the PTE is not being got by pte_offset_map_lock(). CVE-2026-31456
VCID-f76c-qhke-3bag kernel: can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message CVE-2026-23307
VCID-f892-ybkq-kbd7 In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Initialize free_qp completion before using it In irdma_create_qp, if ib_copy_to_udata fails, it will call irdma_destroy_qp to clean up which will attempt to wait on the free_qp completion, which is not initialized yet. Fix this by initializing the completion before the ib_copy_to_udata call. CVE-2026-31492
VCID-ffdb-88yu-3be1 kernel: drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() CVE-2026-23356
VCID-fq82-zz54-kuc6 kernel: Linux kernel: Denial of Service in mac80211 Wi-Fi due to out-of-bounds write CVE-2026-23246
VCID-fs73-5ucn-qke1 In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Avoid releasing netdev before teardown completes The patch cited in the Fixes tag below changed the teardown code for OVS ports to no longer unconditionally take the RTNL. After this change, the netdev_destroy() callback can proceed immediately to the call_rcu() invocation if the IFF_OVS_DATAPATH flag is already cleared on the netdev. The ovs_netdev_detach_dev() function clears the flag before completing the unregistration, and if it gets preempted after clearing the flag (as can happen on an -rt kernel), netdev_destroy() can complete and the device can be freed before the unregistration completes. This leads to a splat like: [ 998.393867] Oops: general protection fault, probably for non-canonical address 0xff00000001000239: 0000 [#1] SMP PTI [ 998.393877] CPU: 42 UID: 0 PID: 55177 Comm: ip Kdump: loaded Not tainted 6.12.0-211.1.1.el10_2.x86_64+rt #1 PREEMPT_RT [ 998.393886] Hardware name: Dell Inc. PowerEdge R740/0JMK61, BIOS 2.24.0 03/27/2025 [ 998.393889] RIP: 0010:dev_set_promiscuity+0x8d/0xa0 [ 998.393901] Code: 00 00 75 d8 48 8b 53 08 48 83 ba b0 02 00 00 00 75 ca 48 83 c4 08 5b c3 cc cc cc cc 48 83 bf 48 09 00 00 00 75 91 48 8b 47 08 <48> 83 b8 b0 02 00 00 00 74 97 eb 81 0f 1f 80 00 00 00 00 90 90 90 [ 998.393906] RSP: 0018:ffffce5864a5f6a0 EFLAGS: 00010246 [ 998.393912] RAX: ff00000000ffff89 RBX: ffff894d0adf5a05 RCX: 0000000000000000 [ 998.393917] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffff894d0adf5a05 [ 998.393921] RBP: ffff894d19252000 R08: ffff894d19252000 R09: 0000000000000000 [ 998.393924] R10: ffff894d19252000 R11: ffff894d192521b8 R12: 0000000000000006 [ 998.393927] R13: ffffce5864a5f738 R14: 00000000ffffffe2 R15: 0000000000000000 [ 998.393931] FS: 00007fad61971800(0000) GS:ffff894cc0140000(0000) knlGS:0000000000000000 [ 998.393936] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 998.393940] CR2: 000055df0a2a6e40 CR3: 000000011c7fe003 CR4: 00000000007726f0 [ 998.393944] PKRU: 55555554 [ 998.393946] Call Trace: [ 998.393949] <TASK> [ 998.393952] ? show_trace_log_lvl+0x1b0/0x2f0 [ 998.393961] ? show_trace_log_lvl+0x1b0/0x2f0 [ 998.393975] ? dp_device_event+0x41/0x80 [openvswitch] [ 998.394009] ? __die_body.cold+0x8/0x12 [ 998.394016] ? die_addr+0x3c/0x60 [ 998.394027] ? exc_general_protection+0x16d/0x390 [ 998.394042] ? asm_exc_general_protection+0x26/0x30 [ 998.394058] ? dev_set_promiscuity+0x8d/0xa0 [ 998.394066] ? ovs_netdev_detach_dev+0x3a/0x80 [openvswitch] [ 998.394092] dp_device_event+0x41/0x80 [openvswitch] [ 998.394102] notifier_call_chain+0x5a/0xd0 [ 998.394106] unregister_netdevice_many_notify+0x51b/0xa60 [ 998.394110] rtnl_dellink+0x169/0x3e0 [ 998.394121] ? rt_mutex_slowlock.constprop.0+0x95/0xd0 [ 998.394125] rtnetlink_rcv_msg+0x142/0x3f0 [ 998.394128] ? avc_has_perm_noaudit+0x69/0xf0 [ 998.394130] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 998.394132] netlink_rcv_skb+0x50/0x100 [ 998.394138] netlink_unicast+0x292/0x3f0 [ 998.394141] netlink_sendmsg+0x21b/0x470 [ 998.394145] ____sys_sendmsg+0x39d/0x3d0 [ 998.394149] ___sys_sendmsg+0x9a/0xe0 [ 998.394156] __sys_sendmsg+0x7a/0xd0 [ 998.394160] do_syscall_64+0x7f/0x170 [ 998.394162] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 998.394165] RIP: 0033:0x7fad61bf4724 [ 998.394188] Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d c5 e9 0c 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89 [ 998.394189] RSP: 002b:00007ffd7e2f7cb8 EFLAGS: 00000202 ORIG_RAX: 000000000000002e [ 998.394191] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fad61bf4724 [ 998.394193] RDX: 0000000000000000 RSI: 00007ffd7e2f7d20 RDI: 0000000000000003 [ 998.394194] RBP: 00007ffd7e2f7d90 R08: 0000000000000010 R09: 000000000000003f [ 998.394195] R10: 000055df11558010 R11: 0000000000000202 R12: 00007ffd7e2 ---truncated--- CVE-2026-31508
VCID-fvvb-p7r7-zkbk CVE-2026-31422
VCID-fx2q-84en-qyah kernel: can: bcm: fix locking for bcm_op runtime updates CVE-2026-23362
VCID-g162-81ms-93g7 kernel: ipv6: use RCU in ip6_output() CVE-2025-40158
VCID-g2yr-d1ta-93g7 In the Linux kernel, the following vulnerability has been resolved: module: Fix kernel panic when a symbol st_shndx is out of bounds The module loader doesn't check for bounds of the ELF section index in simplify_symbols(): for (i = 1; i < symsec->sh_size / sizeof(Elf_Sym); i++) { const char *name = info->strtab + sym[i].st_name; switch (sym[i].st_shndx) { case SHN_COMMON: [...] default: /* Divert to percpu allocation if a percpu var. */ if (sym[i].st_shndx == info->index.pcpu) secbase = (unsigned long)mod_percpu(mod); else /** HERE --> **/ secbase = info->sechdrs[sym[i].st_shndx].sh_addr; sym[i].st_value += secbase; break; } } A symbol with an out-of-bounds st_shndx value, for example 0xffff (known as SHN_XINDEX or SHN_HIRESERVE), may cause a kernel panic: BUG: unable to handle page fault for address: ... RIP: 0010:simplify_symbols+0x2b2/0x480 ... Kernel panic - not syncing: Fatal exception This can happen when module ELF is legitimately using SHN_XINDEX or when it is corrupted. Add a bounds check in simplify_symbols() to validate that st_shndx is within the valid range before using it. This issue was discovered due to a bug in llvm-objcopy, see relevant discussion for details [1]. [1] https://lore.kernel.org/linux-modules/20251224005752.201911-1-ihor.solodrai@linux.dev/ CVE-2026-31521
VCID-g3ku-5npc-v7gc kernel: net: phy: register phy led_triggers during probe to avoid AB-BA deadlock CVE-2026-23368
VCID-g48f-w2gu-s7c3 kernel: clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL CVE-2025-68318
VCID-g5sa-v8nq-gqge kernel: Kernel: Denial of Service in md driver via uninitialized bioset CVE-2025-68368
VCID-g737-aj6x-r3bd kernel: netconsole: Acquire su_mutex before navigating configs hierarchy CVE-2025-68319
VCID-g77j-7yap-qkgw kernel: pinctrl: cirrus: cs42l43: Fix double-put in cs42l43_pin_probe() CVE-2026-23387
VCID-g7k7-e2h7-a7f6 kernel: fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata CVE-2025-71265
VCID-g82z-3144-u3d2 In the Linux kernel, the following vulnerability has been resolved: RDMA/efa: Fix use of completion ctx after free On admin queue completion handling, if the admin command completed with error we print data from the completion context. The issue is that we already freed the completion context in polling/interrupts handler which means we print data from context in an unknown state (it might be already used again). Change the admin submission flow so alloc/dealloc of the context will be symmetric and dealloc will be called after any potential use of the context. CVE-2026-31493
VCID-g8k1-wwq1-yka2 In the Linux kernel, the following vulnerability has been resolved: xfrm: prevent policy_hthresh.work from racing with netns teardown A XFRM_MSG_NEWSPDINFO request can queue the per-net work item policy_hthresh.work onto the system workqueue. The queued callback, xfrm_hash_rebuild(), retrieves the enclosing struct net via container_of(). If the net namespace is torn down before that work runs, the associated struct net may already have been freed, and xfrm_hash_rebuild() may then dereference stale memory. xfrm_policy_fini() already flushes policy_hash_work during teardown, but it does not synchronize policy_hthresh.work. Synchronize policy_hthresh.work in xfrm_policy_fini() as well, so the queued work cannot outlive the net namespace teardown and access a freed struct net. CVE-2026-31516
VCID-gbkk-anun-a3ce CVE-2025-54505
XSA-488
VCID-gfq9-z9p8-kqhk CVE-2026-23413
VCID-gkap-5jhj-tbff kernel: net/sched: act_ife: Fix metalist update behavior CVE-2026-23378
VCID-gmun-zz47-suap In the Linux kernel, the following vulnerability has been resolved: nvme-pci: ensure we're polling a polled queue A user can change the polled queue count at run time. There's a brief window during a reset where a hipri task may try to poll that queue before the block layer has updated the queue maps, which would race with the now interrupt driven queue and may cause double completions. CVE-2026-31523
VCID-gpcp-4y8w-fka1 kernel: nfc: nci: complete pending data exchange on device close CVE-2026-23330
VCID-gtjv-ut7g-hqhv kernel: spi: tegra210-quad: Protect curr_xfer check in IRQ handler CVE-2026-23207
VCID-gtwd-5z2r-6ue9 kernel: RISC-V: KVM: Teardown riscv specific bits after kvm_exit CVE-2025-23135
VCID-gu84-p4ru-b7gj kernel: f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic CVE-2025-38627
VCID-gyhz-a9pm-zqav Linux privcmd driver can circumvent kernel lockdown CVE-2026-31788
VCID-h31q-rcq3-7ud3 kernel: spi: fix use-after-free on controller registration failure CVE-2026-31389
VCID-h3e8-fux5-3fe2 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access l2cap_information_rsp() checks that cmd_len covers the fixed l2cap_info_rsp header (type + result, 4 bytes) but then reads rsp->data without verifying that the payload is present: - L2CAP_IT_FEAT_MASK calls get_unaligned_le32(rsp->data), which reads 4 bytes past the header (needs cmd_len >= 8). - L2CAP_IT_FIXED_CHAN reads rsp->data[0], 1 byte past the header (needs cmd_len >= 5). A truncated L2CAP_INFO_RSP with result == L2CAP_IR_SUCCESS triggers an out-of-bounds read of adjacent skb data. Guard each data access with the required payload length check. If the payload is too short, skip the read and let the state machine complete with safe defaults (feat_mask and remote_fixed_chan remain zero from kzalloc), so the info timer cleanup and l2cap_conn_start() still run and the connection is not stalled. CVE-2026-31393
VCID-h57h-xt8g-y3f5 kernel: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() CVE-2025-38605
VCID-h7pm-dyef-1fan CVE-2026-31409
VCID-hbn4-nw7h-abg1 kernel: xfs: only call xf{array,blob}_destroy if we have a valid pointer CVE-2026-23251
VCID-hbzk-b7gn-9bgz kernel: riscv: save the SR_SUM status over switches CVE-2025-38261
VCID-hh8s-8fc8-pkgq kernel: netfilter: nft_set_pipapo: split gc into unlink and reclaim phase CVE-2026-23351
VCID-hjf7-23wz-1qeg kernel: net: mvpp2: guard flow control update with global_tx_fc in buffer switching CVE-2026-23438
VCID-hpqq-mr4h-gbcj In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false A UAF issue occurs when the virtio_net driver is configured with napi_tx=N and the device's IFF_XMIT_DST_RELEASE flag is cleared (e.g., during the configuration of tc route filter rules). When IFF_XMIT_DST_RELEASE is removed from the net_device, the network stack expects the driver to hold the reference to skb->dst until the packet is fully transmitted and freed. In virtio_net with napi_tx=N, skbs may remain in the virtio transmit ring for an extended period. If the network namespace is destroyed while these skbs are still pending, the corresponding dst_ops structure has freed. When a subsequent packet is transmitted, free_old_xmit() is triggered to clean up old skbs. It then calls dst_release() on the skb associated with the stale dst_entry. Since the dst_ops (referenced by the dst_entry) has already been freed, a UAF kernel paging request occurs. fix it by adds skb_dst_drop(skb) in start_xmit to explicitly release the dst reference before the skb is queued in virtio_net. Call Trace: Unable to handle kernel paging request at virtual address ffff80007e150000 CPU: 2 UID: 0 PID: 6236 Comm: ping Kdump: loaded Not tainted 7.0.0-rc1+ #6 PREEMPT ... percpu_counter_add_batch+0x3c/0x158 lib/percpu_counter.c:98 (P) dst_release+0xe0/0x110 net/core/dst.c:177 skb_release_head_state+0xe8/0x108 net/core/skbuff.c:1177 sk_skb_reason_drop+0x54/0x2d8 net/core/skbuff.c:1255 dev_kfree_skb_any_reason+0x64/0x78 net/core/dev.c:3469 napi_consume_skb+0x1c4/0x3a0 net/core/skbuff.c:1527 __free_old_xmit+0x164/0x230 drivers/net/virtio_net.c:611 [virtio_net] free_old_xmit drivers/net/virtio_net.c:1081 [virtio_net] start_xmit+0x7c/0x530 drivers/net/virtio_net.c:3329 [virtio_net] ... Reproduction Steps: NETDEV="enp3s0" config_qdisc_route_filter() { tc qdisc del dev $NETDEV root tc qdisc add dev $NETDEV root handle 1: prio tc filter add dev $NETDEV parent 1:0 \ protocol ip prio 100 route to 100 flowid 1:1 ip route add 192.168.1.100/32 dev $NETDEV realm 100 } test_ns() { ip netns add testns ip link set $NETDEV netns testns ip netns exec testns ifconfig $NETDEV 10.0.32.46/24 ip netns exec testns ping -c 1 10.0.32.1 ip netns del testns } config_qdisc_route_filter test_ns sleep 2 test_ns CVE-2026-31469
VCID-hq39-2qnw-v3dw In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix circular locking dependency in nci_close_device nci_close_device() flushes rx_wq and tx_wq while holding req_lock. This causes a circular locking dependency because nci_rx_work() running on rx_wq can end up taking req_lock too: nci_rx_work -> nci_rx_data_packet -> nci_data_exchange_complete -> __sk_destruct -> rawsock_destruct -> nfc_deactivate_target -> nci_deactivate_target -> nci_request -> mutex_lock(&ndev->req_lock) Move the flush of rx_wq after req_lock has been released. This should safe (I think) because NCI_UP has already been cleared and the transport is closed, so the work will see it and return -ENETDOWN. NIPA has been hitting this running the nci selftest with a debug kernel on roughly 4% of the runs. CVE-2026-31509
VCID-j7ng-yctd-3kc4 kernel: block: fix queue freeze vs limits lock order in sysfs store methods CVE-2025-21807
VCID-j87e-taah-ubbv kernel: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data CVE-2026-23370
VCID-j8yy-3tn1-63b5 kernel: ASoC: Intel: avs: Do not share the name pointer between components CVE-2025-40338
VCID-jamx-hf6t-bfcd kernel: Linux kernel: Denial of service and memory corruption in RDMA umad CVE-2026-23243
VCID-jr94-175s-s7cy kernel: perf/dwc_pcie: fix duplicate pci_dev devices CVE-2025-37746
VCID-jtnv-mefv-qqff kernel: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim CVE-2026-23319
VCID-jx72-vpup-p3gk kernel: f2fs: fix potential deadloop in prepare_compress_overwrite() CVE-2025-22127
VCID-jxkv-jbh3-9fhj kernel: drm/amd/display: add null check CVE-2025-39762
VCID-k1eg-sz6t-skg8 kernel: Bluetooth: hci_core: lookup hci_conn on RX path on protocol side CVE-2025-68304
VCID-k1v3-945q-47eh kernel: macvlan: observe an RCU grace period in macvlan_common_newlink() error path CVE-2026-23273
VCID-k3na-q9p9-4kbh kernel: drm/imagination: Synchronize interrupts before suspending the GPU CVE-2026-23469
VCID-k4wz-r6rn-rkfs kernel: f2fs: fix to avoid migrating empty section CVE-2025-40150
VCID-k5ww-5ut8-pfg7 kernel: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks CVE-2025-68360
VCID-k68k-tnns-mkga kernel: ipv4: start using dst_dev_rcu() CVE-2025-40074
VCID-k6tp-a2zd-2bc1 kernel: nvme: fix admin queue leak on controller reset CVE-2026-23360
VCID-kcmk-1zxh-2yhv kernel: net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs CVE-2026-23340
VCID-kd3n-3han-k7dm kernel: media: nxp: imx8-isi: Fix streaming cleanup on release CVE-2025-68175
VCID-kdmz-w6db-7ue2 In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check cdc_ncm_rx_verify_ndp16() validates that the NDP header and its DPE entries fit within the skb. The first check correctly accounts for ndpoffset: if ((ndpoffset + sizeof(struct usb_cdc_ncm_ndp16)) > skb_in->len) but the second check omits it: if ((sizeof(struct usb_cdc_ncm_ndp16) + ret * (sizeof(struct usb_cdc_ncm_dpe16))) > skb_in->len) This validates the DPE array size against the total skb length as if the NDP were at offset 0, rather than at ndpoffset. When the NDP is placed near the end of the NTB (large wNdpIndex), the DPE entries can extend past the skb data buffer even though the check passes. cdc_ncm_rx_fixup() then reads out-of-bounds memory when iterating the DPE array. Add ndpoffset to the nframes bounds check and use struct_size_t() to express the NDP-plus-DPE-array size more clearly. CVE-2026-23448
VCID-kgsv-ke1m-xkg5 kernel: LoongArch: Set hugetlb mmap base address aligned with pmd size CVE-2025-21949
VCID-kgv3-f25s-ckd5 kernel: Linux kernel KVM: Denial of Service due to uninitialized vCPU event handling CVE-2025-40102
VCID-kk4c-najx-kyhq In the Linux kernel, the following vulnerability has been resolved: ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len() After this commit (e2b76ab8b5c9 "ksmbd: add support for read compound"), response buffer management was changed to use dynamic iov array. In the new design, smb2_calc_max_out_buf_len() expects the second argument (hdr2_len) to be the offset of ->Buffer field in the response structure, not a hardcoded magic number. Fix the remaining call sites to use the correct offsetof() value. CVE-2026-31478
VCID-kn32-aqhq-k7c5 In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: serialize lock/unlock against other NAND operations nand_lock() and nand_unlock() call into chip->ops.lock_area/unlock_area without holding the NAND device lock. On controllers that implement SET_FEATURES via multiple low-level PIO commands, these can race with concurrent UBI/UBIFS background erase/write operations that hold the device lock, resulting in cmd_pending conflicts on the NAND controller. Add nand_get_device()/nand_release_device() around the lock/unlock operations to serialize them against all other NAND controller access. CVE-2026-23434
VCID-kns4-65da-v3bc In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix cache_request leak in cache_release When a reader's file descriptor is closed while in the middle of reading a cache_request (rp->offset != 0), cache_release() decrements the request's readers count but never checks whether it should free the request. In cache_read(), when readers drops to 0 and CACHE_PENDING is clear, the cache_request is removed from the queue and freed along with its buffer and cache_head reference. cache_release() lacks this cleanup. The only other path that frees requests with readers == 0 is cache_dequeue(), but it runs only when CACHE_PENDING transitions from set to clear. If that transition already happened while readers was still non-zero, cache_dequeue() will have skipped the request, and no subsequent call will clean it up. Add the same cleanup logic from cache_read() to cache_release(): after decrementing readers, check if it reached 0 with CACHE_PENDING clear, and if so, dequeue and free the cache_request. CVE-2026-31400
VCID-kp79-ejb3-u3ew kernel: block: zero non-PI portion of auto integrity buffer CVE-2026-23007
VCID-kpkx-qwue-bff4 In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct() ctnetlink_dump_exp_ct() stores a conntrack pointer in cb->data for the netlink dump callback ctnetlink_exp_ct_dump_table(), but drops the conntrack reference immediately after netlink_dump_start(). When the dump spans multiple rounds, the second recvmsg() triggers the dump callback which dereferences the now-freed conntrack via nfct_help(ct), leading to a use-after-free on ct->ext. The bug is that the netlink_dump_control has no .start or .done callbacks to manage the conntrack reference across dump rounds. Other dump functions in the same file (e.g. ctnetlink_get_conntrack) properly use .start/.done callbacks for this purpose. Fix this by adding .start and .done callbacks that hold and release the conntrack reference for the duration of the dump, and move the nfct_help() call after the cb->args[0] early-return check in the dump callback to avoid dereferencing ct->ext unnecessarily. BUG: KASAN: slab-use-after-free in ctnetlink_exp_ct_dump_table+0x4f/0x2e0 Read of size 8 at addr ffff88810597ebf0 by task ctnetlink_poc/133 CPU: 1 UID: 0 PID: 133 Comm: ctnetlink_poc Not tainted 7.0.0-rc2+ #3 PREEMPTLAZY Call Trace: <TASK> ctnetlink_exp_ct_dump_table+0x4f/0x2e0 netlink_dump+0x333/0x880 netlink_recvmsg+0x3e2/0x4b0 ? aa_sk_perm+0x184/0x450 sock_recvmsg+0xde/0xf0 Allocated by task 133: kmem_cache_alloc_noprof+0x134/0x440 __nf_conntrack_alloc+0xa8/0x2b0 ctnetlink_create_conntrack+0xa1/0x900 ctnetlink_new_conntrack+0x3cf/0x7d0 nfnetlink_rcv_msg+0x48e/0x510 netlink_rcv_skb+0xc9/0x1f0 nfnetlink_rcv+0xdb/0x220 netlink_unicast+0x3ec/0x590 netlink_sendmsg+0x397/0x690 __sys_sendmsg+0xf4/0x180 Freed by task 0: slab_free_after_rcu_debug+0xad/0x1e0 rcu_core+0x5c3/0x9c0 CVE-2026-23458
VCID-kus3-1ds4-8qfb kernel: riscv: trace: fix snapshot deadlock with sbi ecall CVE-2026-23217
VCID-kvbv-df49-gyaj In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request. CVE-2026-31402
VCID-kx5p-87fs-9kgw kernel: drm/amdgpu: Add basic validation for RAS header CVE-2025-38426
VCID-m21d-1mj4-3bbn kernel: drm/msm: Fix pgtable prealloc error path CVE-2025-40247
VCID-m35k-ahnu-abh1 kernel: net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock() CVE-2026-23450
VCID-m3ch-q8dr-xkay In the Linux kernel, the following vulnerability has been resolved: HID: asus: avoid memory leak in asus_report_fixup() The asus_report_fixup() function was returning a newly allocated kmemdup()-allocated buffer, but never freeing it. Switch to devm_kzalloc() to ensure the memory is managed and freed automatically when the device is removed. The caller of report_fixup() does not take ownership of the returned pointer, but it is permitted to return a pointer whose lifetime is at least that of the input buffer. Also fix a harmless out-of-bounds read by copying only the original descriptor size. CVE-2026-31524
VCID-m6h1-8erq-dqb8 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop l2cap_config_req() processes CONFIG_REQ for channels in BT_CONNECTED state to support L2CAP reconfiguration (e.g. MTU changes). However, since both CONF_INPUT_DONE and CONF_OUTPUT_DONE are already set from the initial configuration, the reconfiguration path falls through to l2cap_ertm_init(), which re-initializes tx_q, srej_q, srej_list, and retrans_list without freeing the previous allocations and sets chan->sdu to NULL without freeing the existing skb. This leaks all previously allocated ERTM resources. Additionally, l2cap_parse_conf_req() does not validate the minimum value of remote_mps derived from the RFC max_pdu_size option. A zero value propagates to l2cap_segment_sdu() where pdu_len becomes zero, causing the while loop to never terminate since len is never decremented, exhausting all available memory. Fix the double-init by skipping l2cap_ertm_init() and l2cap_chan_ready() when the channel is already in BT_CONNECTED state, while still allowing the reconfiguration parameters to be updated through l2cap_parse_conf_req(). Also add a pdu_len zero check in l2cap_segment_sdu() as a safeguard. CVE-2026-31498
VCID-m995-b8rn-tkgk In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() In DecodeQ931(), the UserUserIE code path reads a 16-bit length from the packet, then decrements it by 1 to skip the protocol discriminator byte before passing it to DecodeH323_UserInformation(). If the encoded length is 0, the decrement wraps to -1, which is then passed as a large value to the decoder, leading to an out-of-bounds read. Add a check to ensure len is positive after the decrement. CVE-2026-23455
VCID-m9u8-d7gp-37bk kernel: i40e: Fix preempt count leak in napi poll tracepoint CVE-2026-23313
VCID-madz-x835-s7cy In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: avoid memory leak in magicmouse_report_fixup() The magicmouse_report_fixup() function was returning a newly kmemdup()-allocated buffer, but never freeing it. The caller of report_fixup() does not take ownership of the returned pointer, but it *is* permitted to return a sub-portion of the input rdesc, whose lifetime is managed by the caller. CVE-2026-31522
VCID-meqx-5s5k-j3f7 kernel: xattr: switch to CLASS(fd) CVE-2024-14027
VCID-mgjc-55mm-kffq kernel: mISDN: hfcpci: Fix warning when deleting uninitialized timer CVE-2025-39833
VCID-mjbb-q1nx-8fgj kernel: Linux kernel (iavf): Denial of Service due to a locking issue CVE-2025-38311
VCID-mkjm-756w-5ygt kernel: Linux kernel: Use-after-free in traffic control (act_ct) may lead to denial of service or privilege escalation CVE-2026-23270
VCID-mkw6-9tye-x3fb kernel: nf_tables: nft_dynset: fix possible stateful expression memleak in error path CVE-2026-23399
VCID-mmj7-dk1d-yuga kernel: wifi: rtw89: pci: configure manual DAC mode via PCI config API only CVE-2025-38284
VCID-mmsk-j6bt-wuh1 CVE-2026-23419
VCID-mrj8-hhte-77a4 kernel: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog CVE-2025-39859
VCID-mzg4-exh3-pugu In the Linux kernel, the following vulnerability has been resolved: btrfs: fix leak of kobject name for sub-group space_info When create_space_info_sub_group() allocates elements of space_info->sub_group[], kobject_init_and_add() is called for each element via btrfs_sysfs_add_space_info_type(). However, when check_removing_space_info() frees these elements, it does not call btrfs_sysfs_remove_space_info() on them. As a result, kobject_put() is not called and the associated kobj->name objects are leaked. This memory leak is reproduced by running the blktests test case zbd/009 on kernels built with CONFIG_DEBUG_KMEMLEAK. The kmemleak feature reports the following error: unreferenced object 0xffff888112877d40 (size 16): comm "mount", pid 1244, jiffies 4294996972 hex dump (first 16 bytes): 64 61 74 61 2d 72 65 6c 6f 63 00 c4 c6 a7 cb 7f data-reloc...... backtrace (crc 53ffde4d): __kmalloc_node_track_caller_noprof+0x619/0x870 kstrdup+0x42/0xc0 kobject_set_name_vargs+0x44/0x110 kobject_init_and_add+0xcf/0x150 btrfs_sysfs_add_space_info_type+0xfc/0x210 [btrfs] create_space_info_sub_group.constprop.0+0xfb/0x1b0 [btrfs] create_space_info+0x211/0x320 [btrfs] btrfs_init_space_info+0x15a/0x1b0 [btrfs] open_ctree+0x33c7/0x4a50 [btrfs] btrfs_get_tree.cold+0x9f/0x1ee [btrfs] vfs_get_tree+0x87/0x2f0 vfs_cmd_create+0xbd/0x280 __do_sys_fsconfig+0x3df/0x990 do_syscall_64+0x136/0x1540 entry_SYSCALL_64_after_hwframe+0x76/0x7e To avoid the leak, call btrfs_sysfs_remove_space_info() instead of kfree() for the elements. CVE-2026-31434
VCID-n1tb-u9us-57bv kernel: Kernel: Race condition in espintcp can lead to denial of service CVE-2026-23239
VCID-n2ac-dtm2-sqa9 kernel: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race CVE-2026-23271
VCID-n59e-jkf6-13bf kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously CVE-2022-3238
VCID-n791-nrre-9qfv kernel: btrfs: don't use btrfs_set_item_key_safe on RAID stripe-extents CVE-2025-21752
VCID-n88t-yc67-r3f5 In the Linux kernel, the following vulnerability has been resolved: net: fix fanout UAF in packet_release() via NETDEV_UP race `packet_release()` has a race window where `NETDEV_UP` can re-register a socket into a fanout group's `arr[]` array. The re-registration is not cleaned up by `fanout_release()`, leaving a dangling pointer in the fanout array. `packet_release()` does NOT zero `po->num` in its `bind_lock` section. After releasing `bind_lock`, `po->num` is still non-zero and `po->ifindex` still matches the bound device. A concurrent `packet_notifier(NETDEV_UP)` that already found the socket in `sklist` can re-register the hook. For fanout sockets, this re-registration calls `__fanout_link(sk, po)` which adds the socket back into `f->arr[]` and increments `f->num_members`, but does NOT increment `f->sk_ref`. The fix sets `po->num` to zero in `packet_release` while `bind_lock` is held to prevent NETDEV_UP from linking, preventing the race window. This bug was found following an additional audit with Claude Code based on CVE-2025-38617. CVE-2026-31504
VCID-n8y5-74xq-f7ft kernel: can: usb: etas_es58x: correctly anchor the urb in the read bulk callback CVE-2026-23324
VCID-nb89-27n1-73e5 kernel: Linux kernel: Denial of Service due to null pointer dereference in GT MMIO initialization for VFs CVE-2025-38036
VCID-nc6z-qvqq-pbc8 kernel: nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit() CVE-2026-23297
VCID-ncy9-6whk-ckep kernel: ALSA: usb-audio: Prevent excessive number of frames CVE-2026-23208
VCID-nm9q-qfj8-4bb4 kernel: Octeontx2-af: Add proper checks for fwdata CVE-2026-23070
VCID-nnwa-29v5-jub3 kernel: idpf: Fix RSS LUT NULL ptr issue after soft reset CVE-2026-22993
VCID-nsbf-fkcw-cbed CVE-2026-31407
VCID-nuhs-4sjq-dkcb kernel: inet: frags: flush pending skbs in fqdir_pre_exit() CVE-2025-68768
VCID-p1cj-v8rw-rqf4 In the Linux kernel, the following vulnerability has been resolved: net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer smc_rx_splice() allocates one smc_spd_priv per pipe_buffer and stores the pointer in pipe_buffer.private. The pipe_buf_operations for these buffers used .get = generic_pipe_buf_get, which only increments the page reference count when tee(2) duplicates a pipe buffer. The smc_spd_priv pointer itself was not handled, so after tee() both the original and the cloned pipe_buffer share the same smc_spd_priv *. When both pipes are subsequently released, smc_rx_pipe_buf_release() is called twice against the same object: 1st call: kfree(priv) sock_put(sk) smc_rx_update_cons() [correct] 2nd call: kfree(priv) sock_put(sk) smc_rx_update_cons() [UAF] KASAN reports a slab-use-after-free in smc_rx_pipe_buf_release(), which then escalates to a NULL-pointer dereference and kernel panic via smc_rx_update_consumer() when it chases the freed priv->smc pointer: BUG: KASAN: slab-use-after-free in smc_rx_pipe_buf_release+0x78/0x2a0 Read of size 8 at addr ffff888004a45740 by task smc_splice_tee_/74 Call Trace: <TASK> dump_stack_lvl+0x53/0x70 print_report+0xce/0x650 kasan_report+0xc6/0x100 smc_rx_pipe_buf_release+0x78/0x2a0 free_pipe_info+0xd4/0x130 pipe_release+0x142/0x160 __fput+0x1c6/0x490 __x64_sys_close+0x4f/0x90 do_syscall_64+0xa6/0x1a0 entry_SYSCALL_64_after_hwframe+0x77/0x7f </TASK> BUG: kernel NULL pointer dereference, address: 0000000000000020 RIP: 0010:smc_rx_update_consumer+0x8d/0x350 Call Trace: <TASK> smc_rx_pipe_buf_release+0x121/0x2a0 free_pipe_info+0xd4/0x130 pipe_release+0x142/0x160 __fput+0x1c6/0x490 __x64_sys_close+0x4f/0x90 do_syscall_64+0xa6/0x1a0 entry_SYSCALL_64_after_hwframe+0x77/0x7f </TASK> Kernel panic - not syncing: Fatal exception Beyond the memory-safety problem, duplicating an SMC splice buffer is semantically questionable: smc_rx_update_cons() would advance the consumer cursor twice for the same data, corrupting receive-window accounting. A refcount on smc_spd_priv could fix the double-free, but the cursor-accounting issue would still need to be addressed separately. The .get callback is invoked by both tee(2) and splice_pipe_to_pipe() for partial transfers; both will now return -EFAULT. Users who need to duplicate SMC socket data must use a copy-based read path. CVE-2026-31507
VCID-p1cz-e94f-57c2 kernel: crypto: x86/aegis - Add missing error checks CVE-2025-39789
VCID-p2ng-3bek-d3b6 kernel: fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST CVE-2025-71267
VCID-p3s4-ha6m-bber kernel: drm/imagination: Fix deadlock in soft reset sequence CVE-2026-23470
VCID-p3vt-v7gj-gqbc kernel: io_uring: check if iowq is killed before queuing CVE-2024-56709
VCID-p4by-fm53-yybk CVE-2026-31425
VCID-p595-1qtr-tuae kernel: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled CVE-2026-23381
VCID-p9x5-syxd-fufc kernel: io_uring/poll: fix multishot recv missing EOF on wakeup race CVE-2026-23473
VCID-pbtm-mu23-9qat kernel: igc: fix page fault in XDP TX timestamps handling CVE-2026-23445
VCID-pepq-cqcb-dkdm kernel: net: add xmit recursion limit to tunnel xmit functions CVE-2026-23276
VCID-pmn9-t8by-myhb In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly. CVE-2026-31431
VCID-pnfa-xm28-w3bk kernel: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() CVE-2026-23304
VCID-pr3c-sy9g-t3f5 kernel: drm/tilcdc: Fix removal actions in case of failed probe CVE-2025-71141
VCID-psbr-e3ym-tyfv kernel: Linux kernel: ublk race condition causes kernel crash CVE-2025-37906
VCID-ptyj-1y6d-dud1 kernel: Linux kernel: Denial of Service via unsafe requeue in rxrpc_recvmsg CVE-2026-23066
VCID-pva7-b7rk-ykam CVE-2026-31410
VCID-pwd1-juze-77bx kernel: arm64: io: Extract user memory type in ioremap_prot() CVE-2026-23346
VCID-pytf-9ehq-ykc5 In the Linux kernel, the following vulnerability has been resolved: ext4: reject mount if bigalloc with s_first_data_block != 0 bigalloc with s_first_data_block != 0 is not supported, reject mounting it. CVE-2026-31447
VCID-q1cz-abcx-myc2 kernel: btrfs: fix double free of qgroup record after failure to add delayed ref head CVE-2025-68359
VCID-q567-ceh3-4bdq kernel: pinctrl: equilibrium: fix warning trace on load CVE-2026-23308
VCID-q7a3-cm2m-ayga kernel: smc: Fix use-after-free in __pnet_find_base_ndev() CVE-2025-40064
VCID-q8fu-8mce-7ue6 kernel: platform/x86/amd: pmf: Use device managed allocations CVE-2025-38421
VCID-qa1s-pr21-cycs kernel: Kernel: Denial of Service via DVB DVR ringbuffer reinitialization flaw CVE-2026-23253
VCID-qefy-64um-sqh7 kernel: Linux kernel: Denial of Service in ice driver due to race condition during VSI rebuild CVE-2026-23210
VCID-qffu-7n92-bbhy In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid boot crash in RedBoot partition table parser Given CONFIG_FORTIFY_SOURCE=y and a recent compiler, commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when available") produces the warning below and an oops. Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000 ------------[ cut here ]------------ WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1 memcmp: detected buffer overflow: 15 byte read of buffer size 14 Modules linked in: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE As Kees said, "'names' is pointing to the final 'namelen' many bytes of the allocation ... 'namelen' could be basically any length at all. This fortify warning looks legit to me -- this code used to be reading beyond the end of the allocation." Since the size of the dynamic allocation is calculated with strlen() we can use strcmp() instead of memcmp() and remain within bounds. CVE-2026-23474
VCID-qmuk-1txu-z3da kernel: Squashfs: check metadata block offset is within range CVE-2026-23388
VCID-qsdm-cyzs-aufy CVE-2026-31414
VCID-qx21-w7wn-tqap kernel: f2fs: fix to do sanity check on node footer in {read,write}_end_io CVE-2026-23265
VCID-qxd4-7ack-dkaf kernel: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc() CVE-2025-39910
VCID-qyxy-uh9d-fqhr kernel: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() CVE-2026-23335
VCID-qz4v-xapc-nqh9 kernel: wifi: mt76: mt7915: fix list corruption after hardware restart CVE-2025-39862
VCID-r1fj-r1mn-83fr CVE-2026-23412
VCID-r76g-d7px-hqff kernel: net/sched: ets: fix divide by zero in the offload path CVE-2026-23379
VCID-r7fp-rb7m-b7gs CVE-2026-31427
VCID-r89h-js19-77dr In the Linux kernel, the following vulnerability has been resolved: ext4: fix use-after-free in update_super_work when racing with umount Commit b98535d09179 ("ext4: fix bug_on in start_this_handle during umount filesystem") moved ext4_unregister_sysfs() before flushing s_sb_upd_work to prevent new error work from being queued via /proc/fs/ext4/xx/mb_groups reads during unmount. However, this introduced a use-after-free because update_super_work calls ext4_notify_error_sysfs() -> sysfs_notify() which accesses the kobject's kernfs_node after it has been freed by kobject_del() in ext4_unregister_sysfs(): update_super_work ext4_put_super ----------------- -------------- ext4_unregister_sysfs(sb) kobject_del(&sbi->s_kobj) __kobject_del() sysfs_remove_dir() kobj->sd = NULL sysfs_put(sd) kernfs_put() // RCU free ext4_notify_error_sysfs(sbi) sysfs_notify(&sbi->s_kobj) kn = kobj->sd // stale pointer kernfs_get(kn) // UAF on freed kernfs_node ext4_journal_destroy() flush_work(&sbi->s_sb_upd_work) Instead of reordering the teardown sequence, fix this by making ext4_notify_error_sysfs() detect that sysfs has already been torn down by checking s_kobj.state_in_sysfs, and skipping the sysfs_notify() call in that case. A dedicated mutex (s_error_notify_mutex) serializes ext4_notify_error_sysfs() against kobject_del() in ext4_unregister_sysfs() to prevent TOCTOU races where the kobject could be deleted between the state_in_sysfs check and the sysfs_notify() call. CVE-2026-31446
VCID-rfzp-v6r1-aqae kernel: wifi: ath12k: Fix memory leak due to multiple rx_stats allocation CVE-2025-38199
VCID-rh4e-sbew-nkbm kernel: virtio: break and reset virtio devices on device_shutdown() CVE-2025-38064
VCID-rkqz-erqh-dfh4 In the Linux kernel, the following vulnerability has been resolved: btrfs: log new dentries when logging parent dir of a conflicting inode If we log the parent directory of a conflicting inode, we are not logging the new dentries of the directory, so when we finish we have the parent directory's inode marked as logged but we did not log its new dentries. As a consequence if the parent directory is explicitly fsynced later and it does not have any new changes since we logged it, the fsync is a no-op and after a power failure the new dentries are missing. Example scenario: $ mkdir foo $ sync $rmdir foo $ mkdir dir1 $ mkdir dir2 # A file with the same name and parent as the directory we just deleted # and was persisted in a past transaction. So the deleted directory's # inode is a conflicting inode of this new file's inode. $ touch foo $ ln foo dir2/link # The fsync on dir2 will log the parent directory (".") because the # conflicting inode (deleted directory) does not exists anymore, but it # it does not log its new dentries (dir1). $ xfs_io -c "fsync" dir2 # This fsync on the parent directory is no-op, since the previous fsync # logged it (but without logging its new dentries). $ xfs_io -c "fsync" . <power failure> # After log replay dir1 is missing. Fix this by ensuring we log new dir dentries whenever we log the parent directory of a no longer existing conflicting inode. A test case for fstests will follow soon. CVE-2026-23465
VCID-rmuw-t9j1-sygw kernel: blk-mq: fix potential deadlock while nr_requests grown CVE-2025-40146
VCID-rrxa-r3j8-ubh3 In the Linux kernel, the following vulnerability has been resolved: media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex MEDIA_REQUEST_IOC_REINIT can run concurrently with VIDIOC_REQBUFS(0) queue teardown paths. This can race request object cleanup against vb2 queue cancellation and lead to use-after-free reports. We already serialize request queueing against STREAMON/OFF with req_queue_mutex. Extend that serialization to REQBUFS, and also take the same mutex in media_request_ioctl_reinit() so REINIT is in the same exclusion domain. This keeps request cleanup and queue cancellation from running in parallel for request-capable devices. CVE-2026-31473
VCID-rsz5-e5fc-syh2 kernel: ax25: Remove broken autobind CVE-2025-22109
VCID-rtdx-733f-4qcq kernel: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 CVE-2025-38205
VCID-rv7g-3bjt-qkgc In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix memory leak when a wq is reset idxd_wq_disable_cleanup() which is called from the reset path for a workqueue, sets the wq type to NONE, which for other parts of the driver mean that the wq is empty (all its resources were released). Only set the wq type to NONE after its resources are released. CVE-2026-31441
VCID-s81d-vavh-fudh kernel: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds CVE-2025-40086
VCID-se4d-mkta-c3dg kernel: netfilter: nf_tables: clone set on flush only CVE-2026-23385
VCID-sjam-bp41-27f4 kernel: net: usb: kalmia: validate USB endpoints CVE-2026-23365
VCID-sm3v-84rs-nyem In the Linux kernel, the following vulnerability has been resolved: net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect syzkaller reported a bug [1], and the reproducer is available at [2]. ROSE sockets use four sk->sk_state values: TCP_CLOSE, TCP_LISTEN, TCP_SYN_SENT, and TCP_ESTABLISHED. rose_connect() already rejects calls for TCP_ESTABLISHED (-EISCONN) and TCP_CLOSE with SS_CONNECTING (-ECONNREFUSED), but lacks a check for TCP_SYN_SENT. When rose_connect() is called a second time while the first connection attempt is still in progress (TCP_SYN_SENT), it overwrites rose->neighbour via rose_get_neigh(). If that returns NULL, the socket is left with rose->state == ROSE_STATE_1 but rose->neighbour == NULL. When the socket is subsequently closed, rose_release() sees ROSE_STATE_1 and calls rose_write_internal() -> rose_transmit_link(skb, NULL), causing a NULL pointer dereference. Per connect(2), a second connect() while a connection is already in progress should return -EALREADY. Add this missing check for TCP_SYN_SENT to complete the state validation in rose_connect(). [1] https://syzkaller.appspot.com/bug?extid=d00f90e0af54102fb271 [2] https://gist.github.com/mrpre/9e6779e0d13e2c66779b1653fef80516 CVE-2026-23460
VCID-sne8-13hq-mqan kernel: netfilter: nf_tables: unconditionally bump set->nelems before insertion CVE-2026-23272
VCID-spab-qnhh-vqap kernel: irqchip/sifive-plic: Fix frozen interrupt due to affinity setting CVE-2026-23287
VCID-sqf7-4e8r-7ken kernel: wifi: mac80211: fix NULL deref in mesh_matches_local() CVE-2026-23396
VCID-sr9e-6z4k-nqf9 In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix leaking event log memory During the device remove process, the device is reset, causing the configuration registers to go back to their default state, which is zero. As the driver is checking if the event log support was enabled before deallocating, it will fail if a reset happened before. Do not check if the support was enabled, the check for 'idxd->evl' being valid (only allocated if the HW capability is available) is enough. CVE-2026-31440
VCID-sv2x-sud7-9fcv In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Limit BO list entry count to prevent resource exhaustion Userspace can pass an arbitrary number of BO list entries via the bo_number field. Although the previous multiplication overflow check prevents out-of-bounds allocation, a large number of entries could still cause excessive memory allocation (up to potentially gigabytes) and unnecessarily long list processing times. Introduce a hard limit of 128k entries per BO list, which is more than sufficient for any realistic use case (e.g., a single list containing all buffers in a large scene). This prevents memory exhaustion attacks and ensures predictable performance. Return -EINVAL if the requested entry count exceeds the limit (cherry picked from commit 688b87d39e0aa8135105b40dc167d74b5ada5332) CVE-2026-23468
VCID-svm7-nyr5-kfa3 kernel: atm: lec: fix null-ptr-deref in lec_arp_clear_vccs CVE-2026-23286
VCID-sy3c-f5q7-qygm kernel: icmp: fix NULL pointer dereference in icmp_tag_validation() CVE-2026-23398
VCID-szdg-jd74-r7g1 kernel: wifi: mac80211: don't WARN for connections on invalid channels CVE-2025-71227
VCID-t2sv-vqq2-q7av kernel: netfilter: nf_tables: always walk all pending catchall elements CVE-2026-23278
VCID-t4n5-xvuu-uba1 kernel: idpf: fix error handling in the init_task on load CVE-2026-23017
VCID-td5e-4c6y-cyc9 kernel: net: usb: kaweth: validate USB endpoints CVE-2026-23312
VCID-texr-5weq-v3dw CVE-2026-31424
VCID-tpyv-xst5-vyd6 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_expect: skip expectations in other netns via proc Skip expectations that do not reside in this netns. Similar to e77e6ff502ea ("netfilter: conntrack: do not dump other netns's conntrack entries via proc"). CVE-2026-31496
VCID-tqmr-q8w3-cyg2 kernel: idpf: check error for register_netdev() on init CVE-2025-22116
VCID-tt18-fh9r-57c9 kernel: nfc: nci: free skb on nci_transceive early error paths CVE-2026-23339
VCID-tu5g-jnzs-33d4 In the Linux kernel, the following vulnerability has been resolved: spi: use generic driver_override infrastructure When a driver is probed through __driver_attach(), the bus' match() callback is called without the device lock held, thus accessing the driver_override field without a lock, which can cause a UAF. Fix this by using the driver-core driver_override infrastructure taking care of proper locking internally. Note that calling match() from __driver_attach() without the device lock held is intentional. [1] Also note that we do not enable the driver_override feature of struct bus_type, as SPI - in contrast to most other buses - passes "" to sysfs_emit() when the driver_override pointer is NULL. Thus, printing "\n" instead of "(null)\n". CVE-2026-31487
VCID-twwm-48md-yybs kernel: xfs: check return value of xchk_scrub_create_subord CVE-2026-23250
VCID-tzdq-wy6d-xbbx kernel: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry CVE-2026-23361
VCID-u6nn-wr8u-qqdj kernel: Linux kernel: Use-after-free in bonding module can cause system crash or arbitrary code execution CVE-2026-23171
VCID-u892-96zg-9ke6 In the Linux kernel, the following vulnerability has been resolved: udp: Fix wildcard bind conflict check when using hash2 When binding a udp_sock to a local address and port, UDP uses two hashes (udptable->hash and udptable->hash2) for collision detection. The current code switches to "hash2" when hslot->count > 10. "hash2" is keyed by local address and local port. "hash" is keyed by local port only. The issue can be shown in the following bind sequence (pseudo code): bind(fd1, "[fd00::1]:8888") bind(fd2, "[fd00::2]:8888") bind(fd3, "[fd00::3]:8888") bind(fd4, "[fd00::4]:8888") bind(fd5, "[fd00::5]:8888") bind(fd6, "[fd00::6]:8888") bind(fd7, "[fd00::7]:8888") bind(fd8, "[fd00::8]:8888") bind(fd9, "[fd00::9]:8888") bind(fd10, "[fd00::10]:8888") /* Correctly return -EADDRINUSE because "hash" is used * instead of "hash2". udp_lib_lport_inuse() detects the * conflict. */ bind(fail_fd, "[::]:8888") /* After one more socket is bound to "[fd00::11]:8888", * hslot->count exceeds 10 and "hash2" is used instead. */ bind(fd11, "[fd00::11]:8888") bind(fail_fd, "[::]:8888") /* succeeds unexpectedly */ The same issue applies to the IPv4 wildcard address "0.0.0.0" and the IPv4-mapped wildcard address "::ffff:0.0.0.0". For example, if there are existing sockets bound to "192.168.1.[1-11]:8888", then binding "0.0.0.0:8888" or "[::ffff:0.0.0.0]:8888" can also miss the conflict when hslot->count > 10. TCP inet_csk_get_port() already has the correct check in inet_use_bhash2_on_bind(). Rename it to inet_use_hash2_on_bind() and move it to inet_hashtables.h so udp.c can reuse it in this fix. CVE-2026-31503
VCID-ub6v-vb3r-83eh kernel: x86/efi: defer freeing of boot services memory CVE-2026-23352
VCID-ucab-wj54-hyey kernel: Linux kernel: Local denial of service in device mapper CVE-2025-38140
VCID-udny-3t6r-fyhn In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent immediate PASID reuse case PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PASID, it's possible that page faults are still pending in the IH ring buffer when the process exits and frees up its PASID. To prevent the case, it uses idr cyclic allocator same as kernel pid's. (cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d) CVE-2026-31462
VCID-uhng-dru9-7yht In the Linux kernel, the following vulnerability has been resolved: net: usb: aqc111: Do not perform PM inside suspend callback syzbot reports "task hung in rpm_resume" This is caused by aqc111_suspend calling the PM variant of its write_cmd routine. The simplified call trace looks like this: rpm_suspend() usb_suspend_both() - here udev->dev.power.runtime_status == RPM_SUSPENDING aqc111_suspend() - called for the usb device interface aqc111_write32_cmd() usb_autopm_get_interface() pm_runtime_resume_and_get() rpm_resume() - here we call rpm_resume() on our parent rpm_resume() - Here we wait for a status change that will never happen. At this point we block another task which holds rtnl_lock and locks up the whole networking stack. Fix this by replacing the write_cmd calls with their _nopm variants CVE-2026-23446
VCID-ukr2-rp6y-rkf1 kernel: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels CVE-2026-23274
VCID-unjj-qvdj-zkev In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix tx.buf use-after-free in isotp_sendmsg() isotp_sendmsg() uses only cmpxchg() on so->tx.state to serialize access to so->tx.buf. isotp_release() waits for ISOTP_IDLE via wait_event_interruptible() and then calls kfree(so->tx.buf). If a signal interrupts the wait_event_interruptible() inside close() while tx.state is ISOTP_SENDING, the loop exits early and release proceeds to force ISOTP_SHUTDOWN and continues to kfree(so->tx.buf) while sendmsg may still be reading so->tx.buf for the final CAN frame in isotp_fill_dataframe(). The so->tx.buf can be allocated once when the standard tx.buf length needs to be extended. Move the kfree() of this potentially extended tx.buf to sk_destruct time when either isotp_sendmsg() and isotp_release() are done. CVE-2026-31474
VCID-up76-yp3d-5kaj kernel: nvme: fix memory allocation in nvme_pr_read_keys() CVE-2026-23244
VCID-upcd-ngpy-ekeu CVE-2026-31411
VCID-uvyu-va81-wbgj In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use netlink policy range checks Replace manual range and mask validations with netlink policy annotations in ctnetlink code paths, so that the netlink core rejects invalid values early and can generate extack errors. - CTA_PROTOINFO_TCP_STATE: reject values > TCP_CONNTRACK_SYN_SENT2 at policy level, removing the manual >= TCP_CONNTRACK_MAX check. - CTA_PROTOINFO_TCP_WSCALE_ORIGINAL/REPLY: reject values > TCP_MAX_WSCALE (14). The normal TCP option parsing path already clamps to this value, but the ctnetlink path accepted 0-255, causing undefined behavior when used as a u32 shift count. - CTA_FILTER_ORIG_FLAGS/REPLY_FLAGS: use NLA_POLICY_MASK with CTA_FILTER_F_ALL, removing the manual mask checks. - CTA_EXPECT_FLAGS: use NLA_POLICY_MASK with NF_CT_EXPECT_MASK, adding a new mask define grouping all valid expect flags. Extracted from a broader nf-next patch by Florian Westphal, scoped to ctnetlink for the fixes tree. CVE-2026-31495
VCID-uwe8-jkbr-3kdk In the Linux kernel, the following vulnerability has been resolved: dmaengine: xilinx: xdma: Fix regmap init error handling devm_regmap_init_mmio returns an ERR_PTR() upon error, not NULL. Fix the error check and also fix the error message. Use the error code from ERR_PTR() instead of the wrong value in ret. CVE-2026-31439
VCID-uywc-57rt-7ue6 kernel: Linux kernel: mremap local denial of service CVE-2025-39775
VCID-uzfu-ke47-1qaq CVE-2026-23426
VCID-v13n-b9vm-3yej kernel: x86/fred: Correct speculative safety in fred_extint() CVE-2026-23354
VCID-v2rb-s1g7-1ub4 In the Linux kernel, the following vulnerability has been resolved: NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd The /proc/fs/nfs/exports proc entry is created at module init and persists for the module's lifetime. exports_proc_open() captures the caller's current network namespace and stores its svc_export_cache in seq->private, but takes no reference on the namespace. If the namespace is subsequently torn down (e.g. container destruction after the opener does setns() to a different namespace), nfsd_net_exit() calls nfsd_export_shutdown() which frees the cache. Subsequent reads on the still-open fd dereference the freed cache_detail, walking a freed hash table. Hold a reference on the struct net for the lifetime of the open file descriptor. This prevents nfsd_net_exit() from running -- and thus prevents nfsd_export_shutdown() from freeing the cache -- while any exports fd is open. cache_detail already stores its net pointer (cd->net, set by cache_create_net()), so exports_release() can retrieve it without additional per-file storage. CVE-2026-31403
VCID-v3ba-uvsy-ybfv kernel: dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue() CVE-2025-71221
VCID-v3m5-xj2s-5yef kernel: s390/mm: Fix in_atomic() handling in do_secure_storage_access() CVE-2025-38359
VCID-v4eq-5uts-e7es kernel: can: usb: f81604: handle short interrupt urb messages properly CVE-2026-23334
VCID-v813-y477-vkhn CVE-2026-31429
VCID-v9bm-48ec-9fc2 kernel: net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown CVE-2026-23454
VCID-v9p4-t339-t3g4 kernel: net: dsa: properly keep track of conduit reference CVE-2025-71152
VCID-vccj-gtv8-kug3 kernel: bpf: Fix stack-out-of-bounds write in devmap CVE-2026-23359
VCID-vdnv-8h83-7kfs kernel: ipv6: use RCU in ip6_xmit() CVE-2025-40135
VCID-vgze-rbc5-bbc6 kernel: netfilter: xt_CT: drop pending enqueued packets on template removal CVE-2026-23391
VCID-vr91-8n9z-dfh2 kernel: accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context() CVE-2025-68730
VCID-vtwb-e5mq-6bgq kernel: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit CVE-2026-23277
VCID-vw6j-sby6-dbh3 In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: Fix double-free in teql_master_xmit Whenever a TEQL devices has a lockless Qdisc as root, qdisc_reset should be called using the seq_lock to avoid racing with the datapath. Failure to do so may cause crashes like the following: [ 238.028993][ T318] BUG: KASAN: double-free in skb_release_data (net/core/skbuff.c:1139) [ 238.029328][ T318] Free of addr ffff88810c67ec00 by task poc_teql_uaf_ke/318 [ 238.029749][ T318] [ 238.029900][ T318] CPU: 3 UID: 0 PID: 318 Comm: poc_teql_ke Not tainted 7.0.0-rc3-00149-ge5b31d988a41 #704 PREEMPT(full) [ 238.029906][ T318] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 238.029910][ T318] Call Trace: [ 238.029913][ T318] <TASK> [ 238.029916][ T318] dump_stack_lvl (lib/dump_stack.c:122) [ 238.029928][ T318] print_report (mm/kasan/report.c:379 mm/kasan/report.c:482) [ 238.029940][ T318] ? skb_release_data (net/core/skbuff.c:1139) [ 238.029944][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) ... [ 238.029957][ T318] ? skb_release_data (net/core/skbuff.c:1139) [ 238.029969][ T318] kasan_report_invalid_free (mm/kasan/report.c:221 mm/kasan/report.c:563) [ 238.029979][ T318] ? skb_release_data (net/core/skbuff.c:1139) [ 238.029989][ T318] check_slab_allocation (mm/kasan/common.c:231) [ 238.029995][ T318] kmem_cache_free (mm/slub.c:2637 (discriminator 1) mm/slub.c:6168 (discriminator 1) mm/slub.c:6298 (discriminator 1)) [ 238.030004][ T318] skb_release_data (net/core/skbuff.c:1139) ... [ 238.030025][ T318] sk_skb_reason_drop (net/core/skbuff.c:1256) [ 238.030032][ T318] pfifo_fast_reset (./include/linux/ptr_ring.h:171 ./include/linux/ptr_ring.h:309 ./include/linux/skb_array.h:98 net/sched/sch_generic.c:827) [ 238.030039][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) ... [ 238.030054][ T318] qdisc_reset (net/sched/sch_generic.c:1034) [ 238.030062][ T318] teql_destroy (./include/linux/spinlock.h:395 net/sched/sch_teql.c:157) [ 238.030071][ T318] __qdisc_destroy (./include/net/pkt_sched.h:328 net/sched/sch_generic.c:1077) [ 238.030077][ T318] qdisc_graft (net/sched/sch_api.c:1062 net/sched/sch_api.c:1053 net/sched/sch_api.c:1159) [ 238.030089][ T318] ? __pfx_qdisc_graft (net/sched/sch_api.c:1091) [ 238.030095][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 238.030102][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 238.030106][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 238.030114][ T318] tc_get_qdisc (net/sched/sch_api.c:1529 net/sched/sch_api.c:1556) ... [ 238.072958][ T318] Allocated by task 303 on cpu 5 at 238.026275s: [ 238.073392][ T318] kasan_save_stack (mm/kasan/common.c:58) [ 238.073884][ T318] kasan_save_track (mm/kasan/common.c:64 (discriminator 5) mm/kasan/common.c:79 (discriminator 5)) [ 238.074230][ T318] __kasan_slab_alloc (mm/kasan/common.c:369) [ 238.074578][ T318] kmem_cache_alloc_node_noprof (./include/linux/kasan.h:253 mm/slub.c:4542 mm/slub.c:4869 mm/slub.c:4921) [ 238.076091][ T318] kmalloc_reserve (net/core/skbuff.c:616 (discriminator 107)) [ 238.076450][ T318] __alloc_skb (net/core/skbuff.c:713) [ 238.076834][ T318] alloc_skb_with_frags (./include/linux/skbuff.h:1383 net/core/skbuff.c:6763) [ 238.077178][ T318] sock_alloc_send_pskb (net/core/sock.c:2997) [ 238.077520][ T318] packet_sendmsg (net/packet/af_packet.c:2926 net/packet/af_packet.c:3019 net/packet/af_packet.c:3108) [ 238.081469][ T318] [ 238.081870][ T318] Freed by task 299 on cpu 1 at 238.028496s: [ 238.082761][ T318] kasan_save_stack (mm/kasan/common.c:58) [ 238.083481][ T318] kasan_save_track (mm/kasan/common.c:64 (discriminator 5) mm/kasan/common.c:79 (discriminator 5)) [ 238.085348][ T318] kasan_save_free_info (mm/kasan/generic.c:587 (discriminator 1)) [ 238.085900][ T318] __kasan_slab_free (mm/ ---truncated--- CVE-2026-23449
VCID-vz73-y2va-5kbw In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check The same bounds-check bug fixed for NDP16 in the previous patch also exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated against the total skb length without accounting for ndpoffset, allowing out-of-bounds reads when the NDP32 is placed near the end of the NTB. Add ndpoffset to the nframes bounds check and use struct_size_t() to express the NDP-plus-DPE-array size more clearly. Compile-tested only. CVE-2026-23447
VCID-vzkt-5648-ukh7 CVE-2026-31415
VCID-w53c-hafw-6kbb In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case In decode_int(), the CONS case calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) without checking that len bytes remain in the buffer. The existing boundary check only validates the 2 bits for get_bits(), not the subsequent 1-4 bytes that get_uint() reads. This allows a malformed H.323/RAS packet to cause a 1-4 byte slab-out-of-bounds read. Add a boundary check for len bytes after get_bits() and before get_uint(). CVE-2026-23456
VCID-w93w-cj1t-cqcj kernel: remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E CVE-2025-40113
VCID-wanj-gu4w-2qaz kernel: padata: Fix pd UAF once and for all CVE-2025-38584
VCID-wbcp-4jjd-e3cg In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel BUG in netfs_limit_iter() for ITER_KVEC iterators When a process crashes and the kernel writes a core dump to a 9P filesystem, __kernel_write() creates an ITER_KVEC iterator. This iterator reaches netfs_limit_iter() via netfs_unbuffered_write(), which only handles ITER_FOLIOQ, ITER_BVEC and ITER_XARRAY iterator types, hitting the BUG() for any other type. Fix this by adding netfs_limit_kvec() following the same pattern as netfs_limit_bvec(), since both kvec and bvec are simple segment arrays with pointer and length fields. Dispatch it from netfs_limit_iter() when the iterator type is ITER_KVEC. CVE-2026-31438
VCID-wcu7-me4d-bugc kernel: ksmbd: add chann_lock to protect ksmbd_chann_list xarray CVE-2026-23226
VCID-wdmm-5qwk-w7dv kernel: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling CVE-2025-40130
VCID-wk3t-3jvn-quf1 kernel: media: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode() CVE-2025-38237
VCID-wp6e-yac6-t7fj kernel: drm/xe/guc: Add devm release action to safely tear down CT CVE-2025-68193
VCID-wpd8-35bc-dka3 kernel: wifi: ath12k: Fix for out-of bound access error CVE-2024-58015
VCID-wq4h-q7vt-23ex In the Linux kernel, the following vulnerability has been resolved: nvdimm/bus: Fix potential use after free in asynchronous initialization Dingisoul with KASAN reports a use after free if device_add() fails in nd_async_device_register(). Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while scheduling async init") correctly added a reference on the parent device to be held until asynchronous initialization was complete. However, if device_add() results in an allocation failure the ref count of the device drops to 0 prior to the parent pointer being accessed. Thus resulting in use after free. The bug bot AI correctly identified the fix. Save a reference to the parent pointer to be used to drop the parent reference regardless of the outcome of device_add(). CVE-2026-31399
VCID-wtcb-jzbu-fkcn In the Linux kernel, the following vulnerability has been resolved: s390/syscalls: Add spectre boundary for syscall dispatch table The s390 syscall number is directly controlled by userspace, but does not have an array_index_nospec() boundary to prevent access past the syscall function pointer tables. CVE-2026-31483
VCID-wv35-ucjn-3bb5 In the Linux kernel, the following vulnerability has been resolved: ext4: avoid infinite loops caused by residual data On the mkdir/mknod path, when mapping logical blocks to physical blocks, if inserting a new extent into the extent tree fails (in this example, because the file system disabled the huge file feature when marking the inode as dirty), ext4_ext_map_blocks() only calls ext4_free_blocks() to reclaim the physical block without deleting the corresponding data in the extent tree. This causes subsequent mkdir operations to reference the previously reclaimed physical block number again, even though this physical block is already being used by the xattr block. Therefore, a situation arises where both the directory and xattr are using the same buffer head block in memory simultaneously. The above causes ext4_xattr_block_set() to enter an infinite loop about "inserted" and cannot release the inode lock, ultimately leading to the 143s blocking problem mentioned in [1]. If the metadata is corrupted, then trying to remove some extent space can do even more harm. Also in case EXT4_GET_BLOCKS_DELALLOC_RESERVE was passed, remove space wrongly update quota information. Jan Kara suggests distinguishing between two cases: 1) The error is ENOSPC or EDQUOT - in this case the filesystem is fully consistent and we must maintain its consistency including all the accounting. However these errors can happen only early before we've inserted the extent into the extent tree. So current code works correctly for this case. 2) Some other error - this means metadata is corrupted. We should strive to do as few modifications as possible to limit damage. So I'd just skip freeing of allocated blocks. [1] INFO: task syz.0.17:5995 blocked for more than 143 seconds. Call Trace: inode_lock_nested include/linux/fs.h:1073 [inline] __start_dirop fs/namei.c:2923 [inline] start_dirop fs/namei.c:2934 [inline] CVE-2026-31448
VCID-wwax-w4gg-cuhy kernel: functionfs: fix the open/removal races CVE-2025-71074
VCID-wxx7-3a43-h7gh CVE-2026-31408
VCID-wzwn-qk64-h3e9 kernel: net/mlx5e: Prevent concurrent access to IPSec ASO context CVE-2026-23441
VCID-x1m4-hf24-27hq kernel: scsi: target: Fix recursive locking in __configfs_open_file() CVE-2026-23292
VCID-x5jd-ruv2-1qac CVE-2026-31428
VCID-x5y6-u3c8-3qbe In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] Multiple sysfs command paths dereference contexts_arr[0] without first verifying that kdamond->contexts->nr == 1. A user can set nr_contexts to 0 via sysfs while DAMON is running, causing NULL pointer dereferences. In more detail, the issue can be triggered by privileged users like below. First, start DAMON and make contexts directory empty (kdamond->contexts->nr == 0). # damo start # cd /sys/kernel/mm/damon/admin/kdamonds/0 # echo 0 > contexts/nr_contexts Then, each of below commands will cause the NULL pointer dereference. # echo update_schemes_stats > state # echo update_schemes_tried_regions > state # echo update_schemes_tried_bytes > state # echo update_schemes_effective_quotas > state # echo update_tuned_intervals > state Guard all commands (except OFF) at the entry point of damon_sysfs_handle_cmd(). CVE-2026-31458
VCID-x9a9-thjn-yya5 In the Linux kernel, the following vulnerability has been resolved: xfs: save ailp before dropping the AIL lock in push callbacks In xfs_inode_item_push() and xfs_qm_dquot_logitem_push(), the AIL lock is dropped to perform buffer IO. Once the cluster buffer no longer protects the log item from reclaim, the log item may be freed by background reclaim or the dquot shrinker. The subsequent spin_lock() call dereferences lip->li_ailp, which is a use-after-free. Fix this by saving the ailp pointer in a local variable while the AIL lock is held and the log item is guaranteed to be valid. CVE-2026-31454
VCID-xafq-y8ca-hkhe kernel: rv: Use strings in da monitors tracepoints CVE-2025-38636
VCID-xdde-euh1-dqfv kernel: spi: cadence-quadspi: Implement refcount to handle unbind during busy CVE-2025-40005
VCID-xfxw-wbk5-8ugr In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() At the end of this function, d is the traversal cursor of flist, but the code completes found instead. This can lead to issues such as NULL pointer dereferences, double completion, or descriptor leaks. Fix this by completing d instead of found in the final list_for_each_entry_safe() loop. CVE-2026-31436
VCID-xh1w-u484-dbet In the Linux kernel, the following vulnerability has been resolved: erofs: add GFP_NOIO in the bio completion if needed The bio completion path in the process context (e.g. dm-verity) will directly call into decompression rather than trigger another workqueue context for minimal scheduling latencies, which can then call vm_map_ram() with GFP_KERNEL. Due to insufficient memory, vm_map_ram() may generate memory swapping I/O, which can cause submit_bio_wait to deadlock in some scenarios. Trimmed down the call stack, as follows: f2fs_submit_read_io submit_bio //bio_list is initialized. mmc_blk_mq_recovery z_erofs_endio vm_map_ram __pte_alloc_kernel __alloc_pages_direct_reclaim shrink_folio_list __swap_writepage submit_bio_wait //bio_list is non-NULL, hang!!! Use memalloc_noio_{save,restore}() to wrap up this path. CVE-2026-31467
VCID-xhfy-gkwq-afbr kernel: wifi: libertas: fix use-after-free in lbs_free_adapter() CVE-2026-23281
VCID-xjyz-ptu2-jyc5 kernel: Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user CVE-2026-23461
VCID-xqpe-25bd-vygx CVE-2026-23401
VCID-xs4a-ha3z-2bej kernel: tracing: Add recursion protection in kernel stack trace recording CVE-2026-23138
VCID-xsc7-awsw-33fq kernel: drm/i915: Grab intel_display from the encoder to avoid potential oopsies CVE-2024-58074
VCID-xyz6-bu7n-a7ha kernel: drm/xe: Open-code GGTT MMIO access protection CVE-2026-23466
VCID-xzc2-9tmc-7qey In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock btintel_hw_error() issues two __hci_cmd_sync() calls (HCI_OP_RESET and Intel exception-info retrieval) without holding hci_req_sync_lock(). This lets it race against hci_dev_do_close() -> btintel_shutdown_combined(), which also runs __hci_cmd_sync() under the same lock. When both paths manipulate hdev->req_status/req_rsp concurrently, the close path may free the response skb first, and the still-running hw_error path hits a slab-use-after-free in kfree_skb(). Wrap the whole recovery sequence in hci_req_sync_lock/unlock so it is serialized with every other synchronous HCI command issuer. Below is the data race report and the kasan report: BUG: data-race in __hci_cmd_sync_sk / btintel_shutdown_combined read of hdev->req_rsp at net/bluetooth/hci_sync.c:199 by task kworker/u17:1/83: __hci_cmd_sync_sk+0x12f2/0x1c30 net/bluetooth/hci_sync.c:200 __hci_cmd_sync+0x55/0x80 net/bluetooth/hci_sync.c:223 btintel_hw_error+0x114/0x670 drivers/bluetooth/btintel.c:254 hci_error_reset+0x348/0xa30 net/bluetooth/hci_core.c:1030 write/free by task ioctl/22580: btintel_shutdown_combined+0xd0/0x360 drivers/bluetooth/btintel.c:3648 hci_dev_close_sync+0x9ae/0x2c10 net/bluetooth/hci_sync.c:5246 hci_dev_do_close+0x232/0x460 net/bluetooth/hci_core.c:526 BUG: KASAN: slab-use-after-free in sk_skb_reason_drop+0x43/0x380 net/core/skbuff.c:1202 Read of size 4 at addr ffff888144a738dc by task kworker/u17:1/83: __hci_cmd_sync_sk+0x12f2/0x1c30 net/bluetooth/hci_sync.c:200 __hci_cmd_sync+0x55/0x80 net/bluetooth/hci_sync.c:223 btintel_hw_error+0x186/0x670 drivers/bluetooth/btintel.c:260 CVE-2026-31500
VCID-y439-52f2-rfck kernel: net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop CVE-2026-23300
VCID-y4w2-qru6-p3g4 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix krb5 mount with username option Customer reported that some of their krb5 mounts were failing against a single server as the client was trying to mount the shares with wrong credentials. It turned out the client was reusing SMB session from first mount to try mounting the other shares, even though a different username= option had been specified to the other mounts. By using username mount option along with sec=krb5 to search for principals from keytab is supported by cifs.upcall(8) since cifs-utils-4.8. So fix this by matching username mount option in match_session() even with Kerberos. For example, the second mount below should fail with -ENOKEY as there is no 'foobar' principal in keytab (/etc/krb5.keytab). The client ends up reusing SMB session from first mount to perform the second one, which is wrong. ``` $ ktutil ktutil: add_entry -password -p testuser -k 1 -e aes256-cts Password for testuser@ZELDA.TEST: ktutil: write_kt /etc/krb5.keytab ktutil: quit $ klist -ke Keytab name: FILE:/etc/krb5.keytab KVNO Principal ---- ---------------------------------------------------------------- 1 testuser@ZELDA.TEST (aes256-cts-hmac-sha1-96) $ mount.cifs //w22-root2/scratch /mnt/1 -o sec=krb5,username=testuser $ mount.cifs //w22-root2/scratch /mnt/2 -o sec=krb5,username=foobar $ mount -t cifs | grep -Po 'username=\K\w+' testuser testuser ``` CVE-2026-31392
VCID-ya2f-awge-mfae kernel: drm/panthor: Prevent potential UAF in group creation CVE-2025-68735
VCID-yaz4-szyc-afg8 kernel: drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free CVE-2026-23227
VCID-ycev-sqxs-13da kernel: Kernel: Double free vulnerability in exFAT filesystem can lead to denial of service CVE-2025-38206
VCID-yehk-tjrt-rbbe kernel: dm-verity: disable recursive forward error correction CVE-2025-71161
VCID-ygbb-8ebm-pydv kernel: HID: bpf: prevent buffer overflow in hid_hw_request CVE-2026-31401
VCID-yj3z-hvs9-47hj In the Linux kernel, the following vulnerability has been resolved: PM: runtime: Fix a race condition related to device removal The following code in pm_runtime_work() may dereference the dev->parent pointer after the parent device has been freed: /* Maybe the parent is now able to suspend. */ if (parent && !parent->power.ignore_children) { spin_unlock(&dev->power.lock); spin_lock(&parent->power.lock); rpm_idle(parent, RPM_ASYNC); spin_unlock(&parent->power.lock); spin_lock(&dev->power.lock); } Fix this by inserting a flush_work() call in pm_runtime_remove(). Without this patch blktest block/001 triggers the following complaint sporadically: BUG: KASAN: slab-use-after-free in lock_acquire+0x70/0x160 Read of size 1 at addr ffff88812bef7198 by task kworker/u553:1/3081 Workqueue: pm pm_runtime_work Call Trace: <TASK> dump_stack_lvl+0x61/0x80 print_address_description.constprop.0+0x8b/0x310 print_report+0xfd/0x1d7 kasan_report+0xd8/0x1d0 __kasan_check_byte+0x42/0x60 lock_acquire.part.0+0x38/0x230 lock_acquire+0x70/0x160 _raw_spin_lock+0x36/0x50 rpm_suspend+0xc6a/0xfe0 rpm_idle+0x578/0x770 pm_runtime_work+0xee/0x120 process_one_work+0xde3/0x1410 worker_thread+0x5eb/0xfe0 kthread+0x37b/0x480 ret_from_fork+0x6cb/0x920 ret_from_fork_asm+0x11/0x20 </TASK> Allocated by task 4314: kasan_save_stack+0x2a/0x50 kasan_save_track+0x18/0x40 kasan_save_alloc_info+0x3d/0x50 __kasan_kmalloc+0xa0/0xb0 __kmalloc_noprof+0x311/0x990 scsi_alloc_target+0x122/0xb60 [scsi_mod] __scsi_scan_target+0x101/0x460 [scsi_mod] scsi_scan_channel+0x179/0x1c0 [scsi_mod] scsi_scan_host_selected+0x259/0x2d0 [scsi_mod] store_scan+0x2d2/0x390 [scsi_mod] dev_attr_store+0x43/0x80 sysfs_kf_write+0xde/0x140 kernfs_fop_write_iter+0x3ef/0x670 vfs_write+0x506/0x1470 ksys_write+0xfd/0x230 __x64_sys_write+0x76/0xc0 x64_sys_call+0x213/0x1810 do_syscall_64+0xee/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 Freed by task 4314: kasan_save_stack+0x2a/0x50 kasan_save_track+0x18/0x40 kasan_save_free_info+0x3f/0x50 __kasan_slab_free+0x67/0x80 kfree+0x225/0x6c0 scsi_target_dev_release+0x3d/0x60 [scsi_mod] device_release+0xa3/0x220 kobject_cleanup+0x105/0x3a0 kobject_put+0x72/0xd0 put_device+0x17/0x20 scsi_device_dev_release+0xacf/0x12c0 [scsi_mod] device_release+0xa3/0x220 kobject_cleanup+0x105/0x3a0 kobject_put+0x72/0xd0 put_device+0x17/0x20 scsi_device_put+0x7f/0xc0 [scsi_mod] sdev_store_delete+0xa5/0x120 [scsi_mod] dev_attr_store+0x43/0x80 sysfs_kf_write+0xde/0x140 kernfs_fop_write_iter+0x3ef/0x670 vfs_write+0x506/0x1470 ksys_write+0xfd/0x230 __x64_sys_write+0x76/0xc0 x64_sys_call+0x213/0x1810 CVE-2026-23452
VCID-yjuh-uacz-xfhm kernel: md: make rdev_addable usable for rcu mode CVE-2025-38621
VCID-yp8m-zttt-ffdt kernel: Linux kernel: Denial of service due to a race condition in the TLS subsystem CVE-2026-23240
VCID-yqcj-27j2-tqb8 CVE-2026-31419
VCID-yr2z-pe4g-8yhu kernel: nfc: rawsock: cancel tx_work before socket teardown CVE-2026-23372
VCID-ytfc-yqtw-4yhb kernel: bridge: cfm: Fix race condition in peer_mep deletion CVE-2026-23393
VCID-yumk-yrcg-7qet kernel: wifi: ath12k: Avoid memory leak while enabling statistics CVE-2025-37743
VCID-yx1f-r3sr-rues In the Linux kernel, the following vulnerability has been resolved: ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio Replace BUG_ON() with proper error handling when inline data size exceeds PAGE_SIZE. This prevents kernel panic and allows the system to continue running while properly reporting the filesystem corruption. The error is logged via ext4_error_inode(), the buffer head is released to prevent memory leak, and -EFSCORRUPTED is returned to indicate filesystem corruption. CVE-2026-31451
VCID-z1gu-rwfd-7yfa kernel: f2fs: fix UAF issue in f2fs_merge_page_bio() CVE-2025-40054
VCID-z22s-ebq4-y7a4 kernel: s390/fpu: Fix false-positive kmsan report in fpu_vstl() CVE-2025-68751
VCID-z35d-gch3-1uct kernel: kernel: be more careful about dup_mmap() failures and uprobe registering CVE-2025-21709
VCID-z6xa-pf4r-4kbm In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix folio isn't locked in softleaf_to_folio() On arm64 server, we found folio that get from migration entry isn't locked in softleaf_to_folio(). This issue triggers when mTHP splitting and zap_nonpresent_ptes() races, and the root cause is lack of memory barrier in softleaf_to_folio(). The race is as follows: CPU0 CPU1 deferred_split_scan() zap_nonpresent_ptes() lock folio split_folio() unmap_folio() change ptes to migration entries __split_folio_to_order() softleaf_to_folio() set flags(including PG_locked) for tail pages folio = pfn_folio(softleaf_to_pfn(entry)) smp_wmb() VM_WARN_ON_ONCE(!folio_test_locked(folio)) prep_compound_page() for tail pages In __split_folio_to_order(), smp_wmb() guarantees page flags of tail pages are visible before the tail page becomes non-compound. smp_wmb() should be paired with smp_rmb() in softleaf_to_folio(), which is missed. As a result, if zap_nonpresent_ptes() accesses migration entry that stores tail pfn, softleaf_to_folio() may see the updated compound_head of tail page before page->flags. This issue will trigger VM_WARN_ON_ONCE() in pfn_swap_entry_folio() because of the race between folio split and zap_nonpresent_ptes() leading to a folio incorrectly undergoing modification without a folio lock being held. This is a BUG_ON() before commit 93976a20345b ("mm: eliminate further swapops predicates"), which in merged in v6.19-rc1. To fix it, add missing smp_rmb() if the softleaf entry is migration entry in softleaf_to_folio() and softleaf_to_page(). [tujinjiang@huawei.com: update function name and comments] CVE-2026-31466
VCID-zh73-s87g-vfff CVE-2026-31430
VCID-zhaf-5de2-tycd In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use-after-free access to PTP clock PTP clock is registered on every opening of the interface and destroyed on every closing. However it may be accessed via get_ts_info ethtool call which is possible while the interface is just present in the kernel. BUG: KASAN: use-after-free in ptp_clock_index+0x47/0x50 drivers/ptp/ptp_clock.c:426 Read of size 4 at addr ffff8880194345cc by task syz.0.6/948 CPU: 1 PID: 948 Comm: syz.0.6 Not tainted 6.1.164+ #109 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.1-0-g3208b098f51a-prebuilt.qemu.org 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x8d/0xba lib/dump_stack.c:106 print_address_description mm/kasan/report.c:316 [inline] print_report+0x17f/0x496 mm/kasan/report.c:420 kasan_report+0xd9/0x180 mm/kasan/report.c:524 ptp_clock_index+0x47/0x50 drivers/ptp/ptp_clock.c:426 gem_get_ts_info+0x138/0x1e0 drivers/net/ethernet/cadence/macb_main.c:3349 macb_get_ts_info+0x68/0xb0 drivers/net/ethernet/cadence/macb_main.c:3371 __ethtool_get_ts_info+0x17c/0x260 net/ethtool/common.c:558 ethtool_get_ts_info net/ethtool/ioctl.c:2367 [inline] __dev_ethtool net/ethtool/ioctl.c:3017 [inline] dev_ethtool+0x2b05/0x6290 net/ethtool/ioctl.c:3095 dev_ioctl+0x637/0x1070 net/core/dev_ioctl.c:510 sock_do_ioctl+0x20d/0x2c0 net/socket.c:1215 sock_ioctl+0x577/0x6d0 net/socket.c:1320 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __x64_sys_ioctl+0x18c/0x210 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 </TASK> Allocated by task 457: kmalloc include/linux/slab.h:563 [inline] kzalloc include/linux/slab.h:699 [inline] ptp_clock_register+0x144/0x10e0 drivers/ptp/ptp_clock.c:235 gem_ptp_init+0x46f/0x930 drivers/net/ethernet/cadence/macb_ptp.c:375 macb_open+0x901/0xd10 drivers/net/ethernet/cadence/macb_main.c:2920 __dev_open+0x2ce/0x500 net/core/dev.c:1501 __dev_change_flags+0x56a/0x740 net/core/dev.c:8651 dev_change_flags+0x92/0x170 net/core/dev.c:8722 do_setlink+0xaf8/0x3a80 net/core/rtnetlink.c:2833 __rtnl_newlink+0xbf4/0x1940 net/core/rtnetlink.c:3608 rtnl_newlink+0x63/0xa0 net/core/rtnetlink.c:3655 rtnetlink_rcv_msg+0x3c6/0xed0 net/core/rtnetlink.c:6150 netlink_rcv_skb+0x15d/0x430 net/netlink/af_netlink.c:2511 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x6d7/0xa30 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x97e/0xeb0 net/netlink/af_netlink.c:1872 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x14b/0x180 net/socket.c:730 __sys_sendto+0x320/0x3b0 net/socket.c:2152 __do_sys_sendto net/socket.c:2164 [inline] __se_sys_sendto net/socket.c:2160 [inline] __x64_sys_sendto+0xdc/0x1b0 net/socket.c:2160 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Freed by task 938: kasan_slab_free include/linux/kasan.h:177 [inline] slab_free_hook mm/slub.c:1729 [inline] slab_free_freelist_hook mm/slub.c:1755 [inline] slab_free mm/slub.c:3687 [inline] __kmem_cache_free+0xbc/0x320 mm/slub.c:3700 device_release+0xa0/0x240 drivers/base/core.c:2507 kobject_cleanup lib/kobject.c:681 [inline] kobject_release lib/kobject.c:712 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1cd/0x350 lib/kobject.c:729 put_device+0x1b/0x30 drivers/base/core.c:3805 ptp_clock_unregister+0x171/0x270 drivers/ptp/ptp_clock.c:391 gem_ptp_remove+0x4e/0x1f0 drivers/net/ethernet/cadence/macb_ptp.c:404 macb_close+0x1c8/0x270 drivers/net/ethernet/cadence/macb_main.c:2966 __dev_close_many+0x1b9/0x310 net/core/dev.c:1585 __dev_close net/core/dev.c:1597 [inline] __dev_change_flags+0x2bb/0x740 net/core/dev.c:8649 dev_change_fl ---truncated--- CVE-2026-31396
VCID-zs1j-hpbv-7qbz kernel: ibmvnic: Use kernel helpers for hex dumps CVE-2025-22104

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-24T12:18:06.205252+00:00 Debian Importer Fixing VCID-7kxd-yjnx-m7f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:12:59.712726+00:00 Debian Importer Fixing VCID-hpqq-mr4h-gbcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:06:29.333915+00:00 Debian Importer Fixing VCID-sr9e-6z4k-nqf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:04:34.612661+00:00 Debian Importer Fixing VCID-179u-b611-z7hc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:02:38.094138+00:00 Debian Importer Fixing VCID-pytf-9ehq-ykc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:01:16.114587+00:00 Debian Importer Fixing VCID-cubf-xau2-hbfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:59:31.974731+00:00 Debian Importer Fixing VCID-wv35-ucjn-3bb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:54:17.309272+00:00 Debian Importer Fixing VCID-e8ky-fyhz-dqhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:50:24.549017+00:00 Debian Importer Fixing VCID-unjj-qvdj-zkev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:49:45.263168+00:00 Debian Importer Fixing VCID-z6xa-pf4r-4kbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:42:12.028157+00:00 Debian Importer Fixing VCID-f892-ybkq-kbd7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:38:44.672996+00:00 Debian Importer Fixing VCID-a7fc-8bje-hugq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:36:58.265621+00:00 Debian Importer Fixing VCID-188w-9sxd-5khx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:31:38.269405+00:00 Debian Importer Fixing VCID-x5y6-u3c8-3qbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:30:15.485144+00:00 Debian Importer Fixing VCID-cwk5-n1mq-kkd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:27:40.905558+00:00 Debian Importer Fixing VCID-gmun-zz47-suap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:26:51.847347+00:00 Debian Importer Fixing VCID-7b27-phbd-fqbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:25:51.571109+00:00 Debian Importer Fixing VCID-udny-3t6r-fyhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:23:54.937417+00:00 Debian Importer Fixing VCID-fs73-5ucn-qke1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:06:20.699072+00:00 Debian Importer Fixing VCID-xh1w-u484-dbet https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:59:57.986314+00:00 Debian Importer Fixing VCID-r89h-js19-77dr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:54:56.049820+00:00 Debian Importer Fixing VCID-8qcc-chc3-yuaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:38:38.018002+00:00 Debian Importer Fixing VCID-u892-96zg-9ke6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:33:18.350442+00:00 Debian Importer Fixing VCID-cv97-j139-vbfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:29:51.763924+00:00 Debian Importer Fixing VCID-uwe8-jkbr-3kdk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:28:14.352017+00:00 Debian Importer Fixing VCID-brte-gqy3-r3ax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:24:10.034919+00:00 Debian Importer Fixing VCID-1h5j-qg28-fka7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:22:27.037784+00:00 Debian Importer Fixing VCID-beg3-c4a1-cfay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:16:56.698439+00:00 Debian Importer Fixing VCID-mzg4-exh3-pugu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:51:16.030310+00:00 Debian Importer Fixing VCID-n88t-yc67-r3f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:45:02.628204+00:00 Debian Importer Fixing VCID-g2yr-d1ta-93g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:37:46.797090+00:00 Debian Importer Fixing VCID-uvyu-va81-wbgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:28:13.196655+00:00 Debian Importer Fixing VCID-93h7-cr4j-sbfn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:25:35.490200+00:00 Debian Importer Fixing VCID-651u-f45c-57de https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:23:15.797031+00:00 Debian Importer Fixing VCID-a1ez-xh2w-7ba6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:21:48.171549+00:00 Debian Importer Fixing VCID-chgp-ama8-5ycb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:10:04.003989+00:00 Debian Importer Fixing VCID-3ay8-sdv3-3ydv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:04:41.093747+00:00 Debian Importer Fixing VCID-rv7g-3bjt-qkgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:40:34.770535+00:00 Debian Importer Fixing VCID-1xws-te5q-8fh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:39:09.217264+00:00 Debian Importer Fixing VCID-dgr2-7fpq-4bgv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:30:14.815690+00:00 Debian Importer Fixing VCID-xzc2-9tmc-7qey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:28:00.891670+00:00 Debian Importer Fixing VCID-yx1f-r3sr-rues https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:25:16.034450+00:00 Debian Importer Fixing VCID-1s26-havx-dkey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:22:16.446185+00:00 Debian Importer Fixing VCID-pmn9-t8by-myhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:21:03.474922+00:00 Debian Importer Fixing VCID-f66d-p3w8-eqfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:13:05.580219+00:00 Debian Importer Fixing VCID-98ws-1jnk-67hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:12:38.152289+00:00 Debian Importer Fixing VCID-cyj2-3f68-23cy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:10:36.810079+00:00 Debian Importer Fixing VCID-m6h1-8erq-dqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:04:28.910720+00:00 Debian Importer Fixing VCID-tu5g-jnzs-33d4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:00:28.196223+00:00 Debian Importer Fixing VCID-wtcb-jzbu-fkcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:49:32.839540+00:00 Debian Importer Fixing VCID-hq39-2qnw-v3dw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:45:10.588309+00:00 Debian Importer Fixing VCID-14ey-bdy6-5qe9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:43:38.431921+00:00 Debian Importer Fixing VCID-2bbj-94mj-rfa7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:43:18.562854+00:00 Debian Importer Fixing VCID-x9a9-thjn-yya5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:28:54.151632+00:00 Debian Importer Fixing VCID-7t89-3m8t-1ydq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:24:58.783499+00:00 Debian Importer Fixing VCID-3ans-72mm-sfh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:24:48.678521+00:00 Debian Importer Fixing VCID-p1cj-v8rw-rqf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:24:37.152789+00:00 Debian Importer Fixing VCID-m3ch-q8dr-xkay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:17:08.467198+00:00 Debian Importer Fixing VCID-5kdh-vgcu-kkf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:16:02.989131+00:00 Debian Importer Fixing VCID-8xay-cepn-vfdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:14:16.465282+00:00 Debian Importer Fixing VCID-kk4c-najx-kyhq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:07:41.063042+00:00 Debian Importer Fixing VCID-95hc-n74c-s3bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:06:56.432005+00:00 Debian Importer Fixing VCID-g8k1-wwq1-yka2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:00:40.197149+00:00 Debian Importer Fixing VCID-3tns-khmb-aqbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:58:12.793518+00:00 Debian Importer Fixing VCID-xfxw-wbk5-8ugr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:55:32.922406+00:00 Debian Importer Fixing VCID-8q1z-p2qp-nkbf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:52:51.766500+00:00 Debian Importer Fixing VCID-g82z-3144-u3d2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:47:08.648953+00:00 Debian Importer Fixing VCID-wbcp-4jjd-e3cg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:32:18.123084+00:00 Debian Importer Fixing VCID-madz-x835-s7cy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:31:31.062226+00:00 Debian Importer Fixing VCID-7y4h-xvdh-s3bs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:29:35.998878+00:00 Debian Importer Fixing VCID-64bq-3uw9-yua2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:27:58.203612+00:00 Debian Importer Fixing VCID-rrxa-r3j8-ubh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:14:22.298671+00:00 Debian Importer Fixing VCID-16bf-g26g-z3db https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:11:35.646176+00:00 Debian Importer Fixing VCID-tpyv-xst5-vyd6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:08:04.424905+00:00 Debian Importer Fixing VCID-898p-crnv-w7cb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:04:50.651053+00:00 Debian Importer Fixing VCID-4g8h-bz4a-uydk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T05:58:05.448072+00:00 Debian Importer Fixing VCID-dykz-252m-jkcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-21T18:54:04.620666+00:00 Debian Importer Fixing VCID-gbkk-anun-a3ce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-21T17:34:03.125749+00:00 Debian Importer Fixing VCID-v813-y477-vkhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-21T17:10:10.207756+00:00 Debian Importer Fixing VCID-zh73-s87g-vfff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:25.847183+00:00 Debian Importer Fixing VCID-4jvb-unxd-3qg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:57:17.787861+00:00 Debian Importer Fixing VCID-94k1-ja9w-2fd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:54.788119+00:00 Debian Importer Fixing VCID-yj3z-hvs9-47hj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:40:34.857423+00:00 Debian Importer Fixing VCID-v9bm-48ec-9fc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:26:03.493699+00:00 Debian Importer Fixing VCID-5ahq-saw1-suf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:06.138312+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:19:06.836823+00:00 Debian Importer Fixing VCID-8qua-yr2x-s7fd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:08.213547+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:53.433395+00:00 Debian Importer Fixing VCID-7v66-8w2u-duf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:13:54.268301+00:00 Debian Importer Fixing VCID-vzkt-5648-ukh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:10:35.892947+00:00 Debian Importer Fixing VCID-uzfu-ke47-1qaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:11.485824+00:00 Debian Importer Fixing VCID-1g77-qwuy-nkg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:50.489460+00:00 Debian Importer Fixing VCID-c7xf-x7d5-87gn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:27.691059+00:00 Debian Importer Fixing VCID-x5jd-ruv2-1qac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:37.633103+00:00 Debian Importer Fixing VCID-3jmx-jfhk-yqh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:53.184321+00:00 Debian Importer Fixing VCID-1s77-djzb-xffp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:40.893362+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:36.441837+00:00 Debian Importer Fixing VCID-texr-5weq-v3dw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:54.034227+00:00 Debian Importer Fixing VCID-p9x5-syxd-fufc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:14.520465+00:00 Debian Importer Fixing VCID-p4by-fm53-yybk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:48.097061+00:00 Debian Importer Fixing VCID-v3ba-uvsy-ybfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:33:20.770315+00:00 Debian Importer Fixing VCID-kns4-65da-v3bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:30:33.960301+00:00 Debian Importer Fixing VCID-kvbv-df49-gyaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:30.676745+00:00 Debian Importer Fixing VCID-xyz6-bu7n-a7ha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:02.044030+00:00 Debian Importer Fixing VCID-h7pm-dyef-1fan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:28:55.915827+00:00 Debian Importer Fixing VCID-kdmz-w6db-7ue2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:52.616017+00:00 Debian Importer Fixing VCID-jxkv-jbh3-9fhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:48.144948+00:00 Debian Importer Fixing VCID-v2rb-s1g7-1ub4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:24.177761+00:00 Debian Importer Fixing VCID-ex8u-z3r8-cycq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:23.345503+00:00 Debian Importer Fixing VCID-uhng-dru9-7yht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:15.939063+00:00 Debian Importer Fixing VCID-pr3c-sy9g-t3f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:01.157243+00:00 Debian Importer Fixing VCID-mmj7-dk1d-yuga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:48.190882+00:00 Debian Importer Fixing VCID-jx72-vpup-p3gk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:07.958000+00:00 Debian Importer Fixing VCID-yqcj-27j2-tqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:49.859750+00:00 Debian Importer Fixing VCID-kgv3-f25s-ckd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:46.167431+00:00 Debian Importer Fixing VCID-t2sv-vqq2-q7av https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:20.445466+00:00 Debian Importer Fixing VCID-9m2t-y1zb-hfar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:29.669490+00:00 Debian Importer Fixing VCID-b1an-t4b8-4bd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:18.067151+00:00 Debian Importer Fixing VCID-9ur7-ynkr-rydr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:43.252059+00:00 Debian Importer Fixing VCID-8hgk-zrmy-tbba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:17.121493+00:00 Debian Importer Fixing VCID-w53c-hafw-6kbb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:42.895621+00:00 Debian Importer Fixing VCID-sm3v-84rs-nyem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:10.045340+00:00 Debian Importer Fixing VCID-fq82-zz54-kuc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:19.015365+00:00 Debian Importer Fixing VCID-mgjc-55mm-kffq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:18.183866+00:00 Debian Importer Fixing VCID-cepf-zr64-zyab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:07.527211+00:00 Debian Importer Fixing VCID-6ggj-8ema-x7f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:52:22.994316+00:00 Debian Importer Fixing VCID-3usq-zn13-r3hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:56.687917+00:00 Debian Importer Fixing VCID-vtwb-e5mq-6bgq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:42.661716+00:00 Debian Importer Fixing VCID-hjf7-23wz-1qeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:37.568053+00:00 Debian Importer Fixing VCID-k1eg-sz6t-skg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:34.494025+00:00 Debian Importer Fixing VCID-xdde-euh1-dqfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:18.583490+00:00 Debian Importer Fixing VCID-k6tp-a2zd-2bc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:52.896689+00:00 Debian Importer Fixing VCID-se4d-mkta-c3dg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:16.639684+00:00 Debian Importer Fixing VCID-3btm-9twv-8kdh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:38.699059+00:00 Debian Importer Fixing VCID-gkap-5jhj-tbff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:32.971570+00:00 Debian Importer Fixing VCID-k1v3-945q-47eh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:18.575914+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:57.294836+00:00 Debian Importer Fixing VCID-zs1j-hpbv-7qbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:58.707206+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:35.150309+00:00 Debian Importer Fixing VCID-sqf7-4e8r-7ken https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:45.257535+00:00 Debian Importer Fixing VCID-sy3c-f5q7-qygm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:37.775112+00:00 Debian Importer Fixing VCID-es8r-wvmz-gfe6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:18.884748+00:00 Debian Importer Fixing VCID-qz4v-xapc-nqh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:41.483224+00:00 Debian Importer Fixing VCID-d4u6-bzuu-dubz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:10.100668+00:00 Debian Importer Fixing VCID-g77j-7yap-qkgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:47.622572+00:00 Debian Importer Fixing VCID-tqmr-q8w3-cyg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:28.451497+00:00 Debian Importer Fixing VCID-ed3p-sm1w-33am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:41.735692+00:00 Debian Importer Fixing VCID-qffu-7n92-bbhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:32.976268+00:00 Debian Importer Fixing VCID-nc6z-qvqq-pbc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:09.422960+00:00 Debian Importer Fixing VCID-g7k7-e2h7-a7f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:36.873716+00:00 Debian Importer Fixing VCID-g162-81ms-93g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:25.201701+00:00 Debian Importer Fixing VCID-q7a3-cm2m-ayga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:20.868912+00:00 Debian Importer Fixing VCID-9sm6-shj5-cqh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:48.869566+00:00 Debian Importer Fixing VCID-b51x-3ss2-67ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:31.962841+00:00 Debian Importer Fixing VCID-p1cz-e94f-57c2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:35.045262+00:00 Debian Importer Fixing VCID-h31q-rcq3-7ud3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:06.591523+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:34.062015+00:00 Debian Importer Fixing VCID-25nt-fa4m-97fm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:12.582736+00:00 Debian Importer Fixing VCID-cpg7-6nst-gkfn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:11.850157+00:00 Debian Importer Fixing VCID-qefy-64um-sqh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:05.373341+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:02.368375+00:00 Debian Importer Fixing VCID-ezn1-bgny-1qdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:48.915662+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:32.306655+00:00 Debian Importer Fixing VCID-g737-aj6x-r3bd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:20.612800+00:00 Debian Importer Fixing VCID-mjbb-q1nx-8fgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:45.763503+00:00 Debian Importer Fixing VCID-xhfy-gkwq-afbr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:31.922595+00:00 Debian Importer Fixing VCID-rkqz-erqh-dfh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:49.777473+00:00 Debian Importer Fixing VCID-4399-j8sn-t3b1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:26.254375+00:00 Debian Importer Fixing VCID-pepq-cqcb-dkdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:32.145215+00:00 Debian Importer Fixing VCID-v4eq-5uts-e7es https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:00.084259+00:00 Debian Importer Fixing VCID-3km6-xsxg-4bcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:36.376741+00:00 Debian Importer Fixing VCID-y439-52f2-rfck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:33.751831+00:00 Debian Importer Fixing VCID-k4wz-r6rn-rkfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:58.954300+00:00 Debian Importer Fixing VCID-k3na-q9p9-4kbh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:06.092500+00:00 Debian Importer Fixing VCID-m995-b8rn-tkgk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:28.769388+00:00 Debian Importer Fixing VCID-qxd4-7ack-dkaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:54.314844+00:00 Debian Importer Fixing VCID-1dxt-yy4z-y7cs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:11.304291+00:00 Debian Importer Fixing VCID-vz73-y2va-5kbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:01.165094+00:00 Debian Importer Fixing VCID-9axb-sz3w-ubcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:47.656283+00:00 Debian Importer Fixing VCID-81z1-7axu-rqep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:41.952158+00:00 Debian Importer Fixing VCID-6hur-ug1s-83am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:33.110921+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:27.583045+00:00 Debian Importer Fixing VCID-xs4a-ha3z-2bej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:34.915325+00:00 Debian Importer Fixing VCID-kus3-1ds4-8qfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:59.437394+00:00 Debian Importer Fixing VCID-rfzp-v6r1-aqae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:35.085524+00:00 Debian Importer Fixing VCID-9cuj-t2sc-bbdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:46.348663+00:00 Debian Importer Fixing VCID-33re-7rh6-2bg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:30.112608+00:00 Debian Importer Fixing VCID-asy4-m48b-xydu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:55.700251+00:00 Debian Importer Fixing VCID-k68k-tnns-mkga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:30.815193+00:00 Debian Importer Fixing VCID-1zbm-pnj5-xqb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:24.249486+00:00 Debian Importer Fixing VCID-9qhe-6xhk-hfhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:38.529197+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:02.210327+00:00 Debian Importer Fixing VCID-sne8-13hq-mqan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:08.517904+00:00 Debian Importer Fixing VCID-3aa5-4rp5-g7h3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:05.334898+00:00 Debian Importer Fixing VCID-gfq9-z9p8-kqhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:49.972267+00:00 Debian Importer Fixing VCID-r7fp-rb7m-b7gs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:56.215853+00:00 Debian Importer Fixing VCID-v9p4-t339-t3g4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:29.416882+00:00 Debian Importer Fixing VCID-pnfa-xm28-w3bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:19.491457+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:42.582399+00:00 Debian Importer Fixing VCID-341t-wy9a-p7fz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:21.915487+00:00 Debian Importer Fixing VCID-q1cz-abcx-myc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:19.315497+00:00 Debian Importer Fixing VCID-yp8m-zttt-ffdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:03.928450+00:00 Debian Importer Fixing VCID-apfq-mqch-jkgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:55.937810+00:00 Debian Importer Fixing VCID-94ed-vp4v-mqeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:32.241544+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:04.362600+00:00 Debian Importer Fixing VCID-mkw6-9tye-x3fb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:34.144856+00:00 Debian Importer Fixing VCID-f3sv-pbfs-cqcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:23.067345+00:00 Debian Importer Fixing VCID-bkp8-m2yc-qub7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:55.841769+00:00 Debian Importer Fixing VCID-ucab-wj54-hyey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:31.762960+00:00 Debian Importer Fixing VCID-n8y5-74xq-f7ft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:08.245218+00:00 Debian Importer Fixing VCID-s81d-vavh-fudh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:00.607353+00:00 Debian Importer Fixing VCID-j8yy-3tn1-63b5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:35.734407+00:00 Debian Importer Fixing VCID-ex4p-ftap-h7fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:43.899710+00:00 Debian Importer Fixing VCID-q8fu-8mce-7ue6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:06.331201+00:00 Debian Importer Fixing VCID-17tu-a4wu-b3hv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:57.634623+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:52.141673+00:00 Debian Importer Fixing VCID-qsdm-cyzs-aufy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:35.577883+00:00 Debian Importer Fixing VCID-qa1s-pr21-cycs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:20.250986+00:00 Debian Importer Fixing VCID-142k-7wgv-pfh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:13.614669+00:00 Debian Importer Fixing VCID-nuhs-4sjq-dkcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:43.951049+00:00 Debian Importer Fixing VCID-wzwn-qk64-h3e9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:26.144332+00:00 Debian Importer Fixing VCID-4spt-a3n7-z7fu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:55.103230+00:00 Debian Importer Fixing VCID-3ng4-wb1y-wyem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:42.790732+00:00 Debian Importer Fixing VCID-8xmp-5z38-1qaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:39.985145+00:00 Debian Importer Fixing VCID-8swc-xby9-cygu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:37.265937+00:00 Debian Importer Fixing VCID-wcu7-me4d-bugc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:54.727492+00:00 Debian Importer Fixing VCID-pbtm-mu23-9qat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:52.620863+00:00 Debian Importer Fixing VCID-wdmm-5qwk-w7dv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:11.275482+00:00 Debian Importer Fixing VCID-gtwd-5z2r-6ue9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:10.393900+00:00 Debian Importer Fixing VCID-z35d-gch3-1uct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:56.102263+00:00 Debian Importer Fixing VCID-exhn-kypt-2fbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:27.931003+00:00 Debian Importer Fixing VCID-cqrs-uu2s-affj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:56.146043+00:00 Debian Importer Fixing VCID-mmsk-j6bt-wuh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:42.940921+00:00 Debian Importer Fixing VCID-u6nn-wr8u-qqdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:11.120976+00:00 Debian Importer Fixing VCID-nb89-27n1-73e5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:09.402771+00:00 Debian Importer Fixing VCID-ajfm-hpzg-uqck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:42.909032+00:00 Debian Importer Fixing VCID-r1fj-r1mn-83fr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:14.262772+00:00 Debian Importer Fixing VCID-8edx-kmgw-jue5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:11.554230+00:00 Debian Importer Fixing VCID-6pmj-r187-kqcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:28.935572+00:00 Debian Importer Fixing VCID-w93w-cj1t-cqcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:27.007015+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:59.528878+00:00 Debian Importer Fixing VCID-1xj4-m963-nkb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:45.048323+00:00 Debian Importer Fixing VCID-gyhz-a9pm-zqav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:31.313838+00:00 Debian Importer Fixing VCID-wxx7-3a43-h7gh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:15.944461+00:00 Debian Importer Fixing VCID-p3vt-v7gj-gqbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:06.154199+00:00 Debian Importer Fixing VCID-c2me-ar1y-y7dw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:03.540541+00:00 Debian Importer Fixing VCID-v13n-b9vm-3yej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:54.841783+00:00 Debian Importer Fixing VCID-dxt9-x347-pufy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:50.737657+00:00 Debian Importer Fixing VCID-8ab4-cv5e-2kff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:46.703501+00:00 Debian Importer Fixing VCID-p2ng-3bek-d3b6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:35.852874+00:00 Debian Importer Fixing VCID-m35k-ahnu-abh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:54.668514+00:00 Debian Importer Fixing VCID-hbzk-b7gn-9bgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:50.986463+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:43.777940+00:00 Debian Importer Fixing VCID-1g8r-w5jy-6kes https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:36.837163+00:00 Debian Importer Fixing VCID-98y4-8sve-mfbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:01.894556+00:00 Debian Importer Fixing VCID-8bmx-4nbw-6qcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:45.141630+00:00 Debian Importer Fixing VCID-wanj-gu4w-2qaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:43.075998+00:00 Debian Importer Fixing VCID-nnwa-29v5-jub3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:09.721880+00:00 Debian Importer Fixing VCID-ptyj-1y6d-dud1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:56.950379+00:00 Debian Importer Fixing VCID-6wrr-yr71-xuhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:39.160361+00:00 Debian Importer Fixing VCID-hh8s-8fc8-pkgq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:10.725362+00:00 Debian Importer Fixing VCID-xafq-y8ca-hkhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:09.998992+00:00 Debian Importer Fixing VCID-cwd1-xgzd-xyb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:45.238641+00:00 Debian Importer Fixing VCID-ans1-wmuz-e3bw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:37.781219+00:00 Debian Importer Fixing VCID-aymw-na2d-bqfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:45.055255+00:00 Debian Importer Fixing VCID-rtdx-733f-4qcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:42.820347+00:00 Debian Importer Fixing VCID-2cxv-ay17-4kh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:41.706086+00:00 Debian Importer Fixing VCID-v3m5-xj2s-5yef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:31.121545+00:00 Debian Importer Fixing VCID-n1tb-u9us-57bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:15.281258+00:00 Debian Importer Fixing VCID-t4n5-xvuu-uba1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:12.904019+00:00 Debian Importer Fixing VCID-f76c-qhke-3bag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:09.978458+00:00 Debian Importer Fixing VCID-bfjx-x5b3-53bg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:06.955198+00:00 Debian Importer Fixing VCID-ecc5-64vs-ekgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:02.360415+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:47.431000+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:19.011545+00:00 Debian Importer Fixing VCID-3yzs-sjd2-53d7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:53.285349+00:00 Debian Importer Fixing VCID-9kuz-7fag-4qhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:49.258528+00:00 Debian Importer Fixing VCID-j7ng-yctd-3kc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:35.311932+00:00 Debian Importer Fixing VCID-fx2q-84en-qyah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:19.447563+00:00 Debian Importer Fixing VCID-4vs9-vhrd-zfgn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:10.041783+00:00 Debian Importer Fixing VCID-xqpe-25bd-vygx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:40.524211+00:00 Debian Importer Fixing VCID-915z-uxfx-3uh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:37.454803+00:00 Debian Importer Fixing VCID-g5sa-v8nq-gqge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:31.529969+00:00 Debian Importer Fixing VCID-z22s-ebq4-y7a4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:19.012373+00:00 Debian Importer Fixing VCID-ackw-rsbh-rubp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:38.730852+00:00 Debian Importer Fixing VCID-nm9q-qfj8-4bb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:29.422287+00:00 Debian Importer Fixing VCID-8a31-1mz8-17cu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:19.717609+00:00 Debian Importer Fixing VCID-6rpd-ws7d-4qeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:39.732315+00:00 Debian Importer Fixing VCID-wq4h-q7vt-23ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:24.911551+00:00 Debian Importer Fixing VCID-5v5u-d5mg-53bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:12.322148+00:00 Debian Importer Fixing VCID-7bmu-z2mb-cbbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:10.346264+00:00 Debian Importer Fixing VCID-a29y-u4f3-nkfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:06.019913+00:00 Debian Importer Fixing VCID-qyxy-uh9d-fqhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:03.650723+00:00 Debian Importer Fixing VCID-cfms-gd2h-v7gd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:53.418821+00:00 Debian Importer Fixing VCID-9dfd-an6h-67gp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:45.947366+00:00 Debian Importer Fixing VCID-ytfc-yqtw-4yhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:28.756149+00:00 Debian Importer Fixing VCID-b9uq-ggy1-eyan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:04.627830+00:00 Debian Importer Fixing VCID-8kug-7bk5-t3bf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:18.979577+00:00 Debian Importer Fixing VCID-xsc7-awsw-33fq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:04.620662+00:00 Debian Importer Fixing VCID-a28q-pf9z-abdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:33.754260+00:00 Debian Importer Fixing VCID-bq5a-jeg3-9ua7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:50.819218+00:00 Debian Importer Fixing VCID-awyz-zwdv-quaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:45.815383+00:00 Debian Importer Fixing VCID-ncy9-6whk-ckep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:31.627684+00:00 Debian Importer Fixing VCID-qmuk-1txu-z3da https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:24.289676+00:00 Debian Importer Fixing VCID-akq2-c6hp-tfda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:02.158813+00:00 Debian Importer Fixing VCID-wwax-w4gg-cuhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:58.380763+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:07.810692+00:00 Debian Importer Fixing VCID-j87e-taah-ubbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:59.729079+00:00 Debian Importer Fixing VCID-wp6e-yac6-t7fj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:50.891452+00:00 Debian Importer Fixing VCID-kpkx-qwue-bff4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:41.760069+00:00 Debian Importer Fixing VCID-wk3t-3jvn-quf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:38.797333+00:00 Debian Importer Fixing VCID-szdg-jd74-r7g1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:31.163528+00:00 Debian Importer Fixing VCID-upcd-ngpy-ekeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:30.479894+00:00 Debian Importer Fixing VCID-1n5v-auw6-wbcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:01.380950+00:00 Debian Importer Fixing VCID-ya2f-awge-mfae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:58.292133+00:00 Debian Importer Fixing VCID-7gw9-7kbs-2uh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:41.859047+00:00 Debian Importer Fixing VCID-p3s4-ha6m-bber https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:27.337154+00:00 Debian Importer Fixing VCID-3pv5-s5r1-vkdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:10.216437+00:00 Debian Importer Fixing VCID-2198-cz4u-87hu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:29.605998+00:00 Debian Importer Fixing VCID-k5ww-5ut8-pfg7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:21.348108+00:00 Debian Importer Fixing VCID-n791-nrre-9qfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:15.799844+00:00 Debian Importer Fixing VCID-psbr-e3ym-tyfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:07.461914+00:00 Debian Importer Fixing VCID-kx5p-87fs-9kgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:46.800692+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:03.243696+00:00 Debian Importer Fixing VCID-q567-ceh3-4bdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:50.662375+00:00 Debian Importer Fixing VCID-mkjm-756w-5ygt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:37.003006+00:00 Debian Importer Fixing VCID-h57h-xt8g-y3f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:22.266222+00:00 Debian Importer Fixing VCID-m9u8-d7gp-37bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:55.235081+00:00 Debian Importer Fixing VCID-a6bg-yemv-4kcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:39.672712+00:00 Debian Importer Fixing VCID-98mp-5h68-73eg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:31.900676+00:00 Debian Importer Fixing VCID-an5c-5rea-u3aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:03.044372+00:00 Debian Importer Fixing VCID-bd8g-qrbe-23hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:50.155777+00:00 Debian Importer Fixing VCID-vdnv-8h83-7kfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:42.574621+00:00 Debian Importer Fixing VCID-4tj5-m3wf-xkca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:19.235272+00:00 Debian Importer Fixing VCID-37t1-1qg2-hqc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:14.732068+00:00 Debian Importer Fixing VCID-3fpy-fq8u-r3gb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:07.453694+00:00 Debian Importer Fixing VCID-hbn4-nw7h-abg1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:06.471407+00:00 Debian Importer Fixing VCID-kn32-aqhq-k7c5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:52.425471+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:27.912248+00:00 Debian Importer Fixing VCID-x1m4-hf24-27hq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:52.765507+00:00 Debian Importer Fixing VCID-vr91-8n9z-dfh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:52.097766+00:00 Debian Importer Fixing VCID-g48f-w2gu-s7c3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:34.855675+00:00 Debian Importer Fixing VCID-twwm-48md-yybs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:27.722675+00:00 Debian Importer Fixing VCID-yumk-yrcg-7qet https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:07.334611+00:00 Debian Importer Fixing VCID-bv67-hyh5-j7hm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:46.158949+00:00 Debian Importer Fixing VCID-gtjv-ut7g-hqhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:13.116287+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:08.587154+00:00 Debian Importer Fixing VCID-ygbb-8ebm-pydv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:03.012553+00:00 Debian Importer Fixing VCID-744r-rpqc-k3gx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:52.768542+00:00 Debian Importer Fixing VCID-4qwu-fw8y-t7et https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:46.822595+00:00 Debian Importer Fixing VCID-exkr-nw4y-guf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:24.649998+00:00 Debian Importer Fixing VCID-rsz5-e5fc-syh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:08.485907+00:00 Debian Importer Fixing VCID-5eks-kg2z-5ye1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:56.835738+00:00 Debian Importer Fixing VCID-tt18-fh9r-57c9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:40.060266+00:00 Debian Importer Fixing VCID-jr94-175s-s7cy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:11.781421+00:00 Debian Importer Fixing VCID-a1xg-dyn3-skb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:09.709213+00:00 Debian Importer Fixing VCID-a3d8-8qvy-ykdr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:08.691959+00:00 Debian Importer Fixing VCID-meqx-5s5k-j3f7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:08.050701+00:00 Debian Importer Fixing VCID-9tbh-mrhu-v3am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:47.679885+00:00 Debian Importer Fixing VCID-5g2a-qj5r-uub4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:22.797425+00:00 Debian Importer Fixing VCID-nsbf-fkcw-cbed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:01.504686+00:00 Debian Importer Fixing VCID-fvvb-p7r7-zkbk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:53.915777+00:00 Debian Importer Fixing VCID-b2kt-hmz5-yuhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:43.920555+00:00 Debian Importer Fixing VCID-xjyz-ptu2-jyc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:35.624604+00:00 Debian Importer Fixing VCID-c49r-knse-6bc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:31.778837+00:00 Debian Importer Fixing VCID-cjnk-7asz-zuhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:27.302445+00:00 Debian Importer Fixing VCID-7ey4-wrhk-zfce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:24.449569+00:00 Debian Importer Fixing VCID-6cqc-um2d-1kfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:08.045223+00:00 Debian Importer Fixing VCID-yr2z-pe4g-8yhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:33.689641+00:00 Debian Importer Fixing VCID-wpd8-35bc-dka3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:28.089479+00:00 Debian Importer Fixing VCID-yjuh-uacz-xfhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:24.323694+00:00 Debian Importer Fixing VCID-ub6v-vb3r-83eh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:03.362213+00:00 Debian Importer Fixing VCID-d8tr-usd8-6yca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:36.692142+00:00 Debian Importer Fixing VCID-a5tz-dm6g-zqch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:34.285605+00:00 Debian Importer Fixing VCID-851j-pvmm-8yc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:01.554793+00:00 Debian Importer Fixing VCID-1kgs-19ue-wbe1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:56.731735+00:00 Debian Importer Fixing VCID-kp79-ejb3-u3ew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:40.734325+00:00 Debian Importer Fixing VCID-9jgy-8b6j-ayfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:26.802962+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:19.957298+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:15.096421+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:27.029538+00:00 Debian Importer Fixing VCID-kd3n-3han-k7dm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:14.880503+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:09.996549+00:00 Debian Importer Fixing VCID-286c-64ry-67cz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:31.338842+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:07.095431+00:00 Debian Importer Fixing VCID-7xah-5pdm-eqfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:50.316215+00:00 Debian Importer Fixing VCID-c8mr-kkvc-akfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:37.386901+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:29.844253+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:25.846213+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:24.835238+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:20.346660+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:15.354010+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:34.934568+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:18.292647+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:14.521994+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:02.543092+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:47.881431+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:47.123342+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:42.406341+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:20.524975+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:53.124920+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:48.631791+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:42.096711+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:18.924677+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:14.052153+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:13.347437+00:00 Debian Importer Fixing VCID-azqr-xmc7-13b5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:48.264282+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:26.407009+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:53.173290+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:06.448459+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:05.133579+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:03.254219+00:00 Debian Importer Fixing VCID-dq8r-defv-hbg6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:53.255970+00:00 Debian Importer Fixing VCID-8vkt-e4d8-qfgn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:48.370377+00:00 Debian Importer Fixing VCID-uywc-57rt-7ue6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:47.060970+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:39.371451+00:00 Debian Importer Fixing VCID-4avh-yaub-uqg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:25.767805+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:11.336710+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:04.597801+00:00 Debian Importer Fixing VCID-up76-yp3d-5kaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:03.566732+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:52.249695+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:41.639161+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:25.600398+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:15.412656+00:00 Debian Importer Fixing VCID-3453-ez2g-97ax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:06.737589+00:00 Debian Importer Fixing VCID-514d-7urs-m7ge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:04.976487+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:10:30.860098+00:00 Debian Importer Fixing VCID-yj3z-hvs9-47hj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:03:14.853274+00:00 Debian Importer Fixing VCID-kn32-aqhq-k7c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:35.219841+00:00 Debian Importer Fixing VCID-pbtm-mu23-9qat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:54:57.377630+00:00 Debian Importer Fixing VCID-v9bm-48ec-9fc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:50.545422+00:00 Debian Importer Fixing VCID-k3na-q9p9-4kbh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:50:58.600169+00:00 Debian Importer Fixing VCID-wzwn-qk64-h3e9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:32.609392+00:00 Debian Importer Fixing VCID-sqf7-4e8r-7ken https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:05.309940+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:02.120185+00:00 Debian Importer Fixing VCID-kdmz-w6db-7ue2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:48.126004+00:00 Debian Importer Fixing VCID-uzfu-ke47-1qaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:51.790909+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:45.662051+00:00 Debian Importer Fixing VCID-m995-b8rn-tkgk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:17.954937+00:00 Debian Importer Fixing VCID-9ur7-ynkr-rydr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:09.908517+00:00 Debian Importer Fixing VCID-pepq-cqcb-dkdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:30:32.508153+00:00 Debian Importer Fixing VCID-wdmm-5qwk-w7dv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:14.591222+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:54.079184+00:00 Debian Importer Fixing VCID-ex8u-z3r8-cycq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:33.335263+00:00 Debian Importer Fixing VCID-8qua-yr2x-s7fd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:50.287074+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:56.022561+00:00 Debian Importer Fixing VCID-7v66-8w2u-duf9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:02.501542+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:19:51.324364+00:00 Debian Importer Fixing VCID-h31q-rcq3-7ud3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:52.677212+00:00 Debian Importer Fixing VCID-sm3v-84rs-nyem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:18.920370+00:00 Debian Importer Fixing VCID-ed3p-sm1w-33am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:40.632753+00:00 Debian Importer Fixing VCID-3jmx-jfhk-yqh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:20.278669+00:00 Debian Importer Fixing VCID-v3ba-uvsy-ybfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:28.180143+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:55.793664+00:00 Debian Importer Fixing VCID-nc6z-qvqq-pbc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:01.341006+00:00 Debian Importer Fixing VCID-p9x5-syxd-fufc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:29.996221+00:00 Debian Importer Fixing VCID-x1m4-hf24-27hq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:38.568945+00:00 Debian Importer Fixing VCID-wp6e-yac6-t7fj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:54.921752+00:00 Debian Importer Fixing VCID-kns4-65da-v3bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:26.225853+00:00 Debian Importer Fixing VCID-sy3c-f5q7-qygm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:13.421460+00:00 Debian Importer Fixing VCID-ygbb-8ebm-pydv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:38.417778+00:00 Debian Importer Fixing VCID-jxkv-jbh3-9fhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:39.821364+00:00 Debian Importer Fixing VCID-kvbv-df49-gyaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:05.727330+00:00 Debian Importer Fixing VCID-j87e-taah-ubbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:53.618439+00:00 Debian Importer Fixing VCID-xyz6-bu7n-a7ha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:33.142010+00:00 Debian Importer Fixing VCID-h7pm-dyef-1fan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:09.235079+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:05.198938+00:00 Debian Importer Fixing VCID-xdde-euh1-dqfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:45.961513+00:00 Debian Importer Fixing VCID-gkap-5jhj-tbff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:17.128173+00:00 Debian Importer Fixing VCID-qxd4-7ack-dkaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:38.650311+00:00 Debian Importer Fixing VCID-v2rb-s1g7-1ub4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:35.787148+00:00 Debian Importer Fixing VCID-uhng-dru9-7yht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:33.586982+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:29.605857+00:00 Debian Importer Fixing VCID-qffu-7n92-bbhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:05.000427+00:00 Debian Importer Fixing VCID-pr3c-sy9g-t3f5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:53.954251+00:00 Debian Importer Fixing VCID-mmj7-dk1d-yuga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:57.547936+00:00 Debian Importer Fixing VCID-jx72-vpup-p3gk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:44.635806+00:00 Debian Importer Fixing VCID-kgv3-f25s-ckd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:41.746326+00:00 Debian Importer Fixing VCID-t2sv-vqq2-q7av https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:39.799425+00:00 Debian Importer Fixing VCID-9m2t-y1zb-hfar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:23.085029+00:00 Debian Importer Fixing VCID-b9uq-ggy1-eyan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:29.191617+00:00 Debian Importer Fixing VCID-b1an-t4b8-4bd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:55.261230+00:00 Debian Importer Fixing VCID-8hgk-zrmy-tbba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:46.621921+00:00 Debian Importer Fixing VCID-w53c-hafw-6kbb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:49.867067+00:00 Debian Importer Fixing VCID-k6tp-a2zd-2bc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:38.101242+00:00 Debian Importer Fixing VCID-cepf-zr64-zyab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:11.609044+00:00 Debian Importer Fixing VCID-j8yy-3tn1-63b5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:22.045209+00:00 Debian Importer Fixing VCID-fq82-zz54-kuc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:01.540263+00:00 Debian Importer Fixing VCID-6ggj-8ema-x7f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:37.408860+00:00 Debian Importer Fixing VCID-mgjc-55mm-kffq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:54.521414+00:00 Debian Importer Fixing VCID-3usq-zn13-r3hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:32.544595+00:00 Debian Importer Fixing VCID-vtwb-e5mq-6bgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:21.660017+00:00 Debian Importer Fixing VCID-hjf7-23wz-1qeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:17.224445+00:00 Debian Importer Fixing VCID-k1eg-sz6t-skg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:48.167964+00:00 Debian Importer Fixing VCID-xs4a-ha3z-2bej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:01.723603+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:18.341100+00:00 Debian Importer Fixing VCID-8vkt-e4d8-qfgn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:41.957826+00:00 Debian Importer Fixing VCID-se4d-mkta-c3dg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:13.443044+00:00 Debian Importer Fixing VCID-3btm-9twv-8kdh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:05.871043+00:00 Debian Importer Fixing VCID-dq8r-defv-hbg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:36.990413+00:00 Debian Importer Fixing VCID-k1v3-945q-47eh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:29.270515+00:00 Debian Importer Fixing VCID-cpg7-6nst-gkfn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:44.263478+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:27.113703+00:00 Debian Importer Fixing VCID-zs1j-hpbv-7qbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:09.080726+00:00 Debian Importer Fixing VCID-nb89-27n1-73e5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:52.470099+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:49.397449+00:00 Debian Importer Fixing VCID-98y4-8sve-mfbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:16.843166+00:00 Debian Importer Fixing VCID-851j-pvmm-8yc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:32.828512+00:00 Debian Importer Fixing VCID-es8r-wvmz-gfe6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:16.885402+00:00 Debian Importer Fixing VCID-qz4v-xapc-nqh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:47.861269+00:00 Debian Importer Fixing VCID-d4u6-bzuu-dubz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:22.671160+00:00 Debian Importer Fixing VCID-g77j-7yap-qkgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:18.579216+00:00 Debian Importer Fixing VCID-p1cz-e94f-57c2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:52.271539+00:00 Debian Importer Fixing VCID-m35k-ahnu-abh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:28.040309+00:00 Debian Importer Fixing VCID-tqmr-q8w3-cyg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:52.112086+00:00 Debian Importer Fixing VCID-g7k7-e2h7-a7f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:56.337968+00:00 Debian Importer Fixing VCID-g162-81ms-93g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:19.394193+00:00 Debian Importer Fixing VCID-q7a3-cm2m-ayga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:16.345549+00:00 Debian Importer Fixing VCID-9sm6-shj5-cqh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:50.151279+00:00 Debian Importer Fixing VCID-b51x-3ss2-67ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:30.299853+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:04.730085+00:00 Debian Importer Fixing VCID-25nt-fa4m-97fm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:47.450639+00:00 Debian Importer Fixing VCID-qefy-64um-sqh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:42.246650+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:39.841500+00:00 Debian Importer Fixing VCID-ezn1-bgny-1qdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:32.711441+00:00 Debian Importer Fixing VCID-g737-aj6x-r3bd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:22.461380+00:00 Debian Importer Fixing VCID-mjbb-q1nx-8fgj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:55.736769+00:00 Debian Importer Fixing VCID-xhfy-gkwq-afbr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:44.279128+00:00 Debian Importer Fixing VCID-rkqz-erqh-dfh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:43.355557+00:00 Debian Importer Fixing VCID-4399-j8sn-t3b1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:48.071467+00:00 Debian Importer Fixing VCID-v4eq-5uts-e7es https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:29.464210+00:00 Debian Importer Fixing VCID-341t-wy9a-p7fz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:16.698565+00:00 Debian Importer Fixing VCID-y439-52f2-rfck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:14.587463+00:00 Debian Importer Fixing VCID-k4wz-r6rn-rkfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:55.078432+00:00 Debian Importer Fixing VCID-bq5a-jeg3-9ua7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:45.608195+00:00 Debian Importer Fixing VCID-1dxt-yy4z-y7cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:39.741451+00:00 Debian Importer Fixing VCID-3pv5-s5r1-vkdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:09.358042+00:00 Debian Importer Fixing VCID-vz73-y2va-5kbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:01.470436+00:00 Debian Importer Fixing VCID-9axb-sz3w-ubcx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:51.384122+00:00 Debian Importer Fixing VCID-81z1-7axu-rqep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:46.146115+00:00 Debian Importer Fixing VCID-6hur-ug1s-83am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:39.871964+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:11.990029+00:00 Debian Importer Fixing VCID-kus3-1ds4-8qfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:58.436086+00:00 Debian Importer Fixing VCID-rfzp-v6r1-aqae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:39.939023+00:00 Debian Importer Fixing VCID-9cuj-t2sc-bbdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:24.127680+00:00 Debian Importer Fixing VCID-yr2z-pe4g-8yhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:57.923100+00:00 Debian Importer Fixing VCID-33re-7rh6-2bg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:44.629580+00:00 Debian Importer Fixing VCID-asy4-m48b-xydu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:38.538290+00:00 Debian Importer Fixing VCID-8kug-7bk5-t3bf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:18.212898+00:00 Debian Importer Fixing VCID-k68k-tnns-mkga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:57.017069+00:00 Debian Importer Fixing VCID-1zbm-pnj5-xqb4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:52.040253+00:00 Debian Importer Fixing VCID-9qhe-6xhk-hfhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:18.514914+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:02.004908+00:00 Debian Importer Fixing VCID-sne8-13hq-mqan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:59.559559+00:00 Debian Importer Fixing VCID-upcd-ngpy-ekeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:17.635258+00:00 Debian Importer Fixing VCID-3aa5-4rp5-g7h3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:14.664697+00:00 Debian Importer Fixing VCID-gfq9-z9p8-kqhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:24.488827+00:00 Debian Importer Fixing VCID-v9p4-t339-t3g4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:02.869061+00:00 Debian Importer Fixing VCID-pnfa-xm28-w3bk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:54.404004+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:30.580348+00:00 Debian Importer Fixing VCID-rsz5-e5fc-syh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:09.366433+00:00 Debian Importer Fixing VCID-q1cz-abcx-myc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:07.061791+00:00 Debian Importer Fixing VCID-yp8m-zttt-ffdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:54.077050+00:00 Debian Importer Fixing VCID-apfq-mqch-jkgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:46.607888+00:00 Debian Importer Fixing VCID-94ed-vp4v-mqeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:29.364380+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:10.329512+00:00 Debian Importer Fixing VCID-mkw6-9tye-x3fb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:46.722158+00:00 Debian Importer Fixing VCID-f3sv-pbfs-cqcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:36.930380+00:00 Debian Importer Fixing VCID-bkp8-m2yc-qub7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:15.617241+00:00 Debian Importer Fixing VCID-ucab-wj54-hyey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:55.948337+00:00 Debian Importer Fixing VCID-n8y5-74xq-f7ft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:39.500453+00:00 Debian Importer Fixing VCID-s81d-vavh-fudh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:53.393929+00:00 Debian Importer Fixing VCID-7bmu-z2mb-cbbe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:43.688560+00:00 Debian Importer Fixing VCID-ex4p-ftap-h7fe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:01.137697+00:00 Debian Importer Fixing VCID-q8fu-8mce-7ue6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:02.613095+00:00 Debian Importer Fixing VCID-4vs9-vhrd-zfgn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:50.811079+00:00 Debian Importer Fixing VCID-17tu-a4wu-b3hv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:26.667475+00:00 Debian Importer Fixing VCID-qa1s-pr21-cycs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:24:30.277502+00:00 Debian Importer Fixing VCID-exhn-kypt-2fbd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:41.837831+00:00 Debian Importer Fixing VCID-mmsk-j6bt-wuh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:32.460772+00:00 Debian Importer Fixing VCID-u6nn-wr8u-qqdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:21:45.425194+00:00 Debian Importer Fixing VCID-8edx-kmgw-jue5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:21:17.640731+00:00 Debian Importer Fixing VCID-w93w-cj1t-cqcj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:19:24.242605+00:00 Debian Importer Fixing VCID-1xj4-m963-nkb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:19:14.546474+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:18:56.240566+00:00 Debian Importer Fixing VCID-wxx7-3a43-h7gh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:18:29.246683+00:00 Debian Importer Fixing VCID-v13n-b9vm-3yej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:16:51.653046+00:00 Debian Importer Fixing VCID-hbzk-b7gn-9bgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:16:42.903483+00:00 Debian Importer Fixing VCID-1g8r-w5jy-6kes https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:16:09.964293+00:00 Debian Importer Fixing VCID-8bmx-4nbw-6qcn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:14:21.508523+00:00 Debian Importer Fixing VCID-aymw-na2d-bqfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:38.657912+00:00 Debian Importer Fixing VCID-rtdx-733f-4qcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:37.457220+00:00 Debian Importer Fixing VCID-2cxv-ay17-4kh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:28.342327+00:00 Debian Importer Fixing VCID-n1tb-u9us-57bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:14.825733+00:00 Debian Importer Fixing VCID-f76c-qhke-3bag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:12:32.639124+00:00 Debian Importer Fixing VCID-3yzs-sjd2-53d7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:10:09.152028+00:00 Debian Importer Fixing VCID-ackw-rsbh-rubp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:08:14.485193+00:00 Debian Importer Fixing VCID-9dfd-an6h-67gp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:05:24.838503+00:00 Debian Importer Fixing VCID-a28q-pf9z-abdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:04:57.742738+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:04:26.896421+00:00 Debian Importer Fixing VCID-awyz-zwdv-quaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:02:18.116223+00:00 Debian Importer Fixing VCID-an5c-5rea-u3aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:00:07.061401+00:00 Debian Importer Fixing VCID-2198-cz4u-87hu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:57:27.073549+00:00 Debian Importer Fixing VCID-98mp-5h68-73eg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:56:02.794526+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:55:18.572182+00:00 Debian Importer Fixing VCID-vr91-8n9z-dfh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:55:03.688733+00:00 Debian Importer Fixing VCID-twwm-48md-yybs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:54:00.365352+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:53:40.403010+00:00 Debian Importer Fixing VCID-exkr-nw4y-guf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:52:22.110307+00:00 Debian Importer Fixing VCID-meqx-5s5k-j3f7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:50:26.776499+00:00 Debian Importer Fixing VCID-c49r-knse-6bc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:49:18.257912+00:00 Debian Importer Fixing VCID-d8tr-usd8-6yca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:48:58.686306+00:00 Debian Importer Fixing VCID-a5tz-dm6g-zqch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:47:59.481641+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:47:12.629670+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:44:26.664070+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:44:22.012116+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:43:01.254454+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:41:26.501032+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:40:02.932891+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:39:49.464193+00:00 Debian Importer Fixing VCID-uywc-57rt-7ue6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:39:14.456361+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:38:35.482340+00:00 Debian Importer Fixing VCID-3453-ez2g-97ax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:12.886798+00:00 Debian Importer Fixing VCID-142k-7wgv-pfh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:18.220385+00:00 Debian Importer Fixing VCID-psbr-e3ym-tyfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:16.757891+00:00 Debian Importer Fixing VCID-z22s-ebq4-y7a4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:11.436939+00:00 Debian Importer Fixing VCID-nuhs-4sjq-dkcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:51.925811+00:00 Debian Importer Fixing VCID-fx2q-84en-qyah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:44.696117+00:00 Debian Importer Fixing VCID-4spt-a3n7-z7fu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:27.359497+00:00 Debian Importer Fixing VCID-3ng4-wb1y-wyem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:20.918115+00:00 Debian Importer Fixing VCID-8xmp-5z38-1qaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:20.265004+00:00 Debian Importer Fixing VCID-xafq-y8ca-hkhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:18.700794+00:00 Debian Importer Fixing VCID-8swc-xby9-cygu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:17.329377+00:00 Debian Importer Fixing VCID-wcu7-me4d-bugc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:07.149616+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:48.205205+00:00 Debian Importer Fixing VCID-gtwd-5z2r-6ue9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:31.478782+00:00 Debian Importer Fixing VCID-wwax-w4gg-cuhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:13.539797+00:00 Debian Importer Fixing VCID-z35d-gch3-1uct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:49.582639+00:00 Debian Importer Fixing VCID-cqrs-uu2s-affj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:43.635489+00:00 Debian Importer Fixing VCID-kd3n-3han-k7dm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:06.859238+00:00 Debian Importer Fixing VCID-ajfm-hpzg-uqck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:52.079752+00:00 Debian Importer Fixing VCID-r1fj-r1mn-83fr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:04.683071+00:00 Debian Importer Fixing VCID-6pmj-r187-kqcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:03.643610+00:00 Debian Importer Fixing VCID-6cqc-um2d-1kfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:02.600659+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:42.726229+00:00 Debian Importer Fixing VCID-7xah-5pdm-eqfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:11.801944+00:00 Debian Importer Fixing VCID-b2kt-hmz5-yuhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:59.156532+00:00 Debian Importer Fixing VCID-gyhz-a9pm-zqav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:42.583241+00:00 Debian Importer Fixing VCID-p2ng-3bek-d3b6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:37.376916+00:00 Debian Importer Fixing VCID-p3vt-v7gj-gqbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:30.309664+00:00 Debian Importer Fixing VCID-c2me-ar1y-y7dw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:21.055391+00:00 Debian Importer Fixing VCID-dxt9-x347-pufy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:17.004262+00:00 Debian Importer Fixing VCID-8ab4-cv5e-2kff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:11.540759+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:35.204129+00:00 Debian Importer Fixing VCID-wanj-gu4w-2qaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:33.457368+00:00 Debian Importer Fixing VCID-nnwa-29v5-jub3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:30.974035+00:00 Debian Importer Fixing VCID-1n5v-auw6-wbcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:12.201120+00:00 Debian Importer Fixing VCID-ptyj-1y6d-dud1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:03.549609+00:00 Debian Importer Fixing VCID-6wrr-yr71-xuhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:00.399402+00:00 Debian Importer Fixing VCID-a29y-u4f3-nkfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:53.652605+00:00 Debian Importer Fixing VCID-hh8s-8fc8-pkgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:34.570235+00:00 Debian Importer Fixing VCID-cwd1-xgzd-xyb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:30.299357+00:00 Debian Importer Fixing VCID-tt18-fh9r-57c9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:29.170123+00:00 Debian Importer Fixing VCID-bfjx-x5b3-53bg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:20.605009+00:00 Debian Importer Fixing VCID-ans1-wmuz-e3bw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:45.189883+00:00 Debian Importer Fixing VCID-v3m5-xj2s-5yef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:30.066824+00:00 Debian Importer Fixing VCID-t4n5-xvuu-uba1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:25.574795+00:00 Debian Importer Fixing VCID-ecc5-64vs-ekgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:13.114479+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:03.883199+00:00 Debian Importer Fixing VCID-9kuz-7fag-4qhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:01.409961+00:00 Debian Importer Fixing VCID-hbn4-nw7h-abg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:00.593058+00:00 Debian Importer Fixing VCID-j7ng-yctd-3kc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:33.755841+00:00 Debian Importer Fixing VCID-xqpe-25bd-vygx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:17.084885+00:00 Debian Importer Fixing VCID-915z-uxfx-3uh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:15.525643+00:00 Debian Importer Fixing VCID-g5sa-v8nq-gqge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:10.621882+00:00 Debian Importer Fixing VCID-5v5u-d5mg-53bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:38.745471+00:00 Debian Importer Fixing VCID-nm9q-qfj8-4bb4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:32.497597+00:00 Debian Importer Fixing VCID-8a31-1mz8-17cu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:24.868056+00:00 Debian Importer Fixing VCID-6rpd-ws7d-4qeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:01.502954+00:00 Debian Importer Fixing VCID-wq4h-q7vt-23ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:58.279808+00:00 Debian Importer Fixing VCID-286c-64ry-67cz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:43.501980+00:00 Debian Importer Fixing VCID-qyxy-uh9d-fqhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:42.017537+00:00 Debian Importer Fixing VCID-cfms-gd2h-v7gd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:31.538068+00:00 Debian Importer Fixing VCID-ytfc-yqtw-4yhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:02.035439+00:00 Debian Importer Fixing VCID-xjyz-ptu2-jyc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:33.186558+00:00 Debian Importer Fixing VCID-xsc7-awsw-33fq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:41.225749+00:00 Debian Importer Fixing VCID-ncy9-6whk-ckep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:31.068784+00:00 Debian Importer Fixing VCID-qmuk-1txu-z3da https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:29.116781+00:00 Debian Importer Fixing VCID-wpd8-35bc-dka3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:26.203708+00:00 Debian Importer Fixing VCID-akq2-c6hp-tfda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:14.282850+00:00 Debian Importer Fixing VCID-9jgy-8b6j-ayfz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:33.966811+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:57.830438+00:00 Debian Importer Fixing VCID-kpkx-qwue-bff4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:52.607130+00:00 Debian Importer Fixing VCID-wk3t-3jvn-quf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:51.464820+00:00 Debian Importer Fixing VCID-szdg-jd74-r7g1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:39.185744+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:34.023975+00:00 Debian Importer Fixing VCID-k5ww-5ut8-pfg7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:27.783711+00:00 Debian Importer Fixing VCID-ya2f-awge-mfae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:25.510854+00:00 Debian Importer Fixing VCID-7gw9-7kbs-2uh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:13.398473+00:00 Debian Importer Fixing VCID-p3s4-ha6m-bber https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:50.533259+00:00 Debian Importer Fixing VCID-n791-nrre-9qfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:42.684694+00:00 Debian Importer Fixing VCID-kx5p-87fs-9kgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:29.752489+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:04.081982+00:00 Debian Importer Fixing VCID-q567-ceh3-4bdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:55.972417+00:00 Debian Importer Fixing VCID-mkjm-756w-5ygt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:47.700125+00:00 Debian Importer Fixing VCID-h57h-xt8g-y3f5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:38.794931+00:00 Debian Importer Fixing VCID-m9u8-d7gp-37bk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:20.863028+00:00 Debian Importer Fixing VCID-a6bg-yemv-4kcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:46.044682+00:00 Debian Importer Fixing VCID-bd8g-qrbe-23hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:37.808581+00:00 Debian Importer Fixing VCID-vdnv-8h83-7kfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:32.816621+00:00 Debian Importer Fixing VCID-gtjv-ut7g-hqhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:31.848674+00:00 Debian Importer Fixing VCID-4tj5-m3wf-xkca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:17.814651+00:00 Debian Importer Fixing VCID-37t1-1qg2-hqc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:15.235366+00:00 Debian Importer Fixing VCID-3fpy-fq8u-r3gb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:59.389603+00:00 Debian Importer Fixing VCID-yjuh-uacz-xfhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:26.412865+00:00 Debian Importer Fixing VCID-g48f-w2gu-s7c3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:10.508296+00:00 Debian Importer Fixing VCID-yumk-yrcg-7qet https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:07.511762+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:58.514222+00:00 Debian Importer Fixing VCID-bv67-hyh5-j7hm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:25.166714+00:00 Debian Importer Fixing VCID-744r-rpqc-k3gx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:17.558836+00:00 Debian Importer Fixing VCID-4qwu-fw8y-t7et https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:45.548621+00:00 Debian Importer Fixing VCID-5eks-kg2z-5ye1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:28.017279+00:00 Debian Importer Fixing VCID-jr94-175s-s7cy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:11.304391+00:00 Debian Importer Fixing VCID-a1xg-dyn3-skb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:10.405045+00:00 Debian Importer Fixing VCID-a3d8-8qvy-ykdr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:09.575226+00:00 Debian Importer Fixing VCID-9tbh-mrhu-v3am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:52.639565+00:00 Debian Importer Fixing VCID-5g2a-qj5r-uub4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:36.333859+00:00 Debian Importer Fixing VCID-nsbf-fkcw-cbed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:29.836398+00:00 Debian Importer Fixing VCID-cjnk-7asz-zuhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:28.417044+00:00 Debian Importer Fixing VCID-7ey4-wrhk-zfce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:54.038526+00:00 Debian Importer Fixing VCID-ub6v-vb3r-83eh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:07.235591+00:00 Debian Importer Fixing VCID-1kgs-19ue-wbe1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:03.566086+00:00 Debian Importer Fixing VCID-kp79-ejb3-u3ew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:38.165829+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:55.082418+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:10.015315+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:14.528591+00:00 Debian Importer Fixing VCID-c8mr-kkvc-akfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:00.143300+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:57.110183+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:54.870227+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:25.415992+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:13.292246+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:12.251107+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:55.122796+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:52.517116+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:36.366754+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:20.408720+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:00.853830+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:57.049758+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:56.298134+00:00 Debian Importer Fixing VCID-azqr-xmc7-13b5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:27.286920+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:35.377492+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:24.585077+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:18.923658+00:00 Debian Importer Fixing VCID-4avh-yaub-uqg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:58.517695+00:00 Debian Importer Fixing VCID-up76-yp3d-5kaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:52.751970+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:34.673455+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:23.730890+00:00 Debian Importer Fixing VCID-514d-7urs-m7ge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:22.440015+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-10T07:30:01.300828+00:00 Debian Importer Fixing VCID-upcd-ngpy-ekeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:10:59.758121+00:00 Debian Importer Fixing VCID-exkr-nw4y-guf2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:06:34.735570+00:00 Debian Importer Fixing VCID-mmsk-j6bt-wuh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:05:53.639139+00:00 Debian Importer Fixing VCID-yj3z-hvs9-47hj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:01:18.968922+00:00 Debian Importer Fixing VCID-kn32-aqhq-k7c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:57:47.162936+00:00 Debian Importer Fixing VCID-pbtm-mu23-9qat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:56:02.014065+00:00 Debian Importer Fixing VCID-v9bm-48ec-9fc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:53:54.912151+00:00 Debian Importer Fixing VCID-k3na-q9p9-4kbh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:53:42.919569+00:00 Debian Importer Fixing VCID-awyz-zwdv-quaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:53:21.505446+00:00 Debian Importer Fixing VCID-wzwn-qk64-h3e9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:45.917659+00:00 Debian Importer Fixing VCID-sqf7-4e8r-7ken https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:29.025697+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:27.005209+00:00 Debian Importer Fixing VCID-kdmz-w6db-7ue2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:22.778379+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:50:50.447981+00:00 Debian Importer Fixing VCID-ed3p-sm1w-33am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:50:33.387682+00:00 Debian Importer Fixing VCID-uzfu-ke47-1qaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:49:03.179165+00:00 Debian Importer Fixing VCID-hbzk-b7gn-9bgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:45:11.135284+00:00 Debian Importer Fixing VCID-kgv3-f25s-ckd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:44:12.681346+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:43:08.411753+00:00 Debian Importer Fixing VCID-meqx-5s5k-j3f7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:46.890174+00:00 Debian Importer Fixing VCID-m995-b8rn-tkgk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:25.575544+00:00 Debian Importer Fixing VCID-d8tr-usd8-6yca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:41:43.242008+00:00 Debian Importer Fixing VCID-v13n-b9vm-3yej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:41:14.068961+00:00 Debian Importer Fixing VCID-9ur7-ynkr-rydr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:41:09.835731+00:00 Debian Importer Fixing VCID-pepq-cqcb-dkdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:40:03.600029+00:00 Debian Importer Fixing VCID-wdmm-5qwk-w7dv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:39:13.469513+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:38:21.324013+00:00 Debian Importer Fixing VCID-3yzs-sjd2-53d7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:43.101245+00:00 Debian Importer Fixing VCID-ex8u-z3r8-cycq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:29.095263+00:00 Debian Importer Fixing VCID-d4u6-bzuu-dubz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:36:46.831491+00:00 Debian Importer Fixing VCID-8qua-yr2x-s7fd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:36:19.638391+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:36:01.083153+00:00 Debian Importer Fixing VCID-an5c-5rea-u3aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:35:38.922232+00:00 Debian Importer Fixing VCID-7v66-8w2u-duf9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:35:13.205993+00:00 Debian Importer Fixing VCID-b1an-t4b8-4bd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:33:55.531807+00:00 Debian Importer Fixing VCID-w93w-cj1t-cqcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:33:47.545265+00:00 Debian Importer Fixing VCID-f3sv-pbfs-cqcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:33:24.065760+00:00 Debian Importer Fixing VCID-gkap-5jhj-tbff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:32:36.141151+00:00 Debian Importer Fixing VCID-h31q-rcq3-7ud3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:32:17.837182+00:00 Debian Importer Fixing VCID-81z1-7axu-rqep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:31:23.385181+00:00 Debian Importer Fixing VCID-sm3v-84rs-nyem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:31.672840+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:07.668713+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:28:42.644288+00:00 Debian Importer Fixing VCID-3jmx-jfhk-yqh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:27:51.856216+00:00 Debian Importer Fixing VCID-v3ba-uvsy-ybfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:45.422428+00:00 Debian Importer Fixing VCID-rtdx-733f-4qcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:28.602801+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:23.157207+00:00 Debian Importer Fixing VCID-3aa5-4rp5-g7h3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:24:46.156456+00:00 Debian Importer Fixing VCID-2cxv-ay17-4kh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:24:12.427357+00:00 Debian Importer Fixing VCID-nc6z-qvqq-pbc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:23:30.988576+00:00 Debian Importer Fixing VCID-p9x5-syxd-fufc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:23:11.595446+00:00 Debian Importer Fixing VCID-x1m4-hf24-27hq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:22:02.769156+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:35.666349+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:23.955883+00:00 Debian Importer Fixing VCID-v4eq-5uts-e7es https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:06.453175+00:00 Debian Importer Fixing VCID-b51x-3ss2-67ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:01.319268+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:20:44.107705+00:00 Debian Importer Fixing VCID-4399-j8sn-t3b1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:20:41.828097+00:00 Debian Importer Fixing VCID-dq8r-defv-hbg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:17:33.460371+00:00 Debian Importer Fixing VCID-wp6e-yac6-t7fj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:17:18.673032+00:00 Debian Importer Fixing VCID-a28q-pf9z-abdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:16:56.209315+00:00 Debian Importer Fixing VCID-kns4-65da-v3bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:16:31.823646+00:00 Debian Importer Fixing VCID-sy3c-f5q7-qygm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:15:32.035317+00:00 Debian Importer Fixing VCID-ygbb-8ebm-pydv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:31.642483+00:00 Debian Importer Fixing VCID-jxkv-jbh3-9fhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:30.898040+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:08.967012+00:00 Debian Importer Fixing VCID-kvbv-df49-gyaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:57.452113+00:00 Debian Importer Fixing VCID-1xj4-m963-nkb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:42.422004+00:00 Debian Importer Fixing VCID-j87e-taah-ubbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:33.112735+00:00 Debian Importer Fixing VCID-xyz6-bu7n-a7ha https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:18.275051+00:00 Debian Importer Fixing VCID-h7pm-dyef-1fan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:13.941446+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:07.333508+00:00 Debian Importer Fixing VCID-u6nn-wr8u-qqdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:44.852007+00:00 Debian Importer Fixing VCID-xdde-euh1-dqfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:07:52.485267+00:00 Debian Importer Fixing VCID-qxd4-7ack-dkaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:07:33.285024+00:00 Debian Importer Fixing VCID-k1v3-945q-47eh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:07:25.782047+00:00 Debian Importer Fixing VCID-v2rb-s1g7-1ub4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:47.569552+00:00 Debian Importer Fixing VCID-f76c-qhke-3bag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:13.709669+00:00 Debian Importer Fixing VCID-c49r-knse-6bc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:44.845116+00:00 Debian Importer Fixing VCID-uhng-dru9-7yht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:43.018506+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:03:26.085007+00:00 Debian Importer Fixing VCID-twwm-48md-yybs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:02:50.255035+00:00 Debian Importer Fixing VCID-qffu-7n92-bbhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:02:21.271255+00:00 Debian Importer Fixing VCID-aymw-na2d-bqfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:54.307578+00:00 Debian Importer Fixing VCID-pr3c-sy9g-t3f5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:47.718182+00:00 Debian Importer Fixing VCID-mmj7-dk1d-yuga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:06.997459+00:00 Debian Importer Fixing VCID-jx72-vpup-p3gk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:30.650428+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:27.060854+00:00 Debian Importer Fixing VCID-8bmx-4nbw-6qcn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:36.747526+00:00 Debian Importer Fixing VCID-t2sv-vqq2-q7av https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:01.264596+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:58:01.740206+00:00 Debian Importer Fixing VCID-b9uq-ggy1-eyan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:41.940715+00:00 Debian Importer Fixing VCID-yp8m-zttt-ffdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:20.507631+00:00 Debian Importer Fixing VCID-98mp-5h68-73eg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:56:14.767843+00:00 Debian Importer Fixing VCID-w53c-hafw-6kbb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:39.189130+00:00 Debian Importer Fixing VCID-n1tb-u9us-57bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:37.334222+00:00 Debian Importer Fixing VCID-k6tp-a2zd-2bc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:27.441764+00:00 Debian Importer Fixing VCID-j8yy-3tn1-63b5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:26.682076+00:00 Debian Importer Fixing VCID-cepf-zr64-zyab https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:38.715256+00:00 Debian Importer Fixing VCID-fq82-zz54-kuc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:26.831701+00:00 Debian Importer Fixing VCID-6ggj-8ema-x7f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:09.430623+00:00 Debian Importer Fixing VCID-mgjc-55mm-kffq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:43.636340+00:00 Debian Importer Fixing VCID-3usq-zn13-r3hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:28.637075+00:00 Debian Importer Fixing VCID-vtwb-e5mq-6bgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:21.812014+00:00 Debian Importer Fixing VCID-hjf7-23wz-1qeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:18.381620+00:00 Debian Importer Fixing VCID-k1eg-sz6t-skg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:52:58.456461+00:00 Debian Importer Fixing VCID-xs4a-ha3z-2bej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:51:25.659117+00:00 Debian Importer Fixing VCID-8vkt-e4d8-qfgn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:51:00.042330+00:00 Debian Importer Fixing VCID-se4d-mkta-c3dg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:52.093122+00:00 Debian Importer Fixing VCID-8edx-kmgw-jue5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:51.407382+00:00 Debian Importer Fixing VCID-1g8r-w5jy-6kes https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:40.066961+00:00 Debian Importer Fixing VCID-3btm-9twv-8kdh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:10.143696+00:00 Debian Importer Fixing VCID-cpg7-6nst-gkfn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:41.739076+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:29.696341+00:00 Debian Importer Fixing VCID-zs1j-hpbv-7qbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:17.146972+00:00 Debian Importer Fixing VCID-nb89-27n1-73e5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:04.153393+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:01.855528+00:00 Debian Importer Fixing VCID-98y4-8sve-mfbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:48:33.593847+00:00 Debian Importer Fixing VCID-851j-pvmm-8yc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:33.188470+00:00 Debian Importer Fixing VCID-exhn-kypt-2fbd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:23.452122+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:16.677453+00:00 Debian Importer Fixing VCID-es8r-wvmz-gfe6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:04.444713+00:00 Debian Importer Fixing VCID-qz4v-xapc-nqh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:28.500859+00:00 Debian Importer Fixing VCID-g77j-7yap-qkgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:21.655534+00:00 Debian Importer Fixing VCID-yr2z-pe4g-8yhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:00.085324+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:45:27.955702+00:00 Debian Importer Fixing VCID-1dxt-yy4z-y7cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:45:26.474433+00:00 Debian Importer Fixing VCID-9qhe-6xhk-hfhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:44:04.770984+00:00 Debian Importer Fixing VCID-2198-cz4u-87hu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:56.483105+00:00 Debian Importer Fixing VCID-p1cz-e94f-57c2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:38.985074+00:00 Debian Importer Fixing VCID-m35k-ahnu-abh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:21.019593+00:00 Debian Importer Fixing VCID-tqmr-q8w3-cyg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:41:39.294196+00:00 Debian Importer Fixing VCID-g7k7-e2h7-a7f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:40:22.090550+00:00 Debian Importer Fixing VCID-g162-81ms-93g7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:45.361127+00:00 Debian Importer Fixing VCID-q7a3-cm2m-ayga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:42.777846+00:00 Debian Importer Fixing VCID-9sm6-shj5-cqh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:30.175992+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:31.478140+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:15.847780+00:00 Debian Importer Fixing VCID-25nt-fa4m-97fm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:05.804839+00:00 Debian Importer Fixing VCID-qefy-64um-sqh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:01.944026+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:00.320968+00:00 Debian Importer Fixing VCID-ezn1-bgny-1qdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:36:31.019042+00:00 Debian Importer Fixing VCID-ackw-rsbh-rubp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:36:19.867837+00:00 Debian Importer Fixing VCID-g737-aj6x-r3bd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:36:13.596312+00:00 Debian Importer Fixing VCID-mjbb-q1nx-8fgj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:58.759586+00:00 Debian Importer Fixing VCID-vr91-8n9z-dfh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:56.141634+00:00 Debian Importer Fixing VCID-xhfy-gkwq-afbr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:47.871789+00:00 Debian Importer Fixing VCID-rkqz-erqh-dfh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:39.859783+00:00 Debian Importer Fixing VCID-341t-wy9a-p7fz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:25.155248+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:52.181571+00:00 Debian Importer Fixing VCID-y439-52f2-rfck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:51.113023+00:00 Debian Importer Fixing VCID-k4wz-r6rn-rkfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:31:17.312294+00:00 Debian Importer Fixing VCID-bq5a-jeg3-9ua7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:25.910224+00:00 Debian Importer Fixing VCID-3pv5-s5r1-vkdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:04.137312+00:00 Debian Importer Fixing VCID-vz73-y2va-5kbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:59.566661+00:00 Debian Importer Fixing VCID-9axb-sz3w-ubcx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:57.447072+00:00 Debian Importer Fixing VCID-wxx7-3a43-h7gh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:48.824972+00:00 Debian Importer Fixing VCID-6hur-ug1s-83am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:44.903440+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:28:45.277359+00:00 Debian Importer Fixing VCID-kus3-1ds4-8qfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:55.293121+00:00 Debian Importer Fixing VCID-rfzp-v6r1-aqae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:44.063581+00:00 Debian Importer Fixing VCID-9cuj-t2sc-bbdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:15.259129+00:00 Debian Importer Fixing VCID-33re-7rh6-2bg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:07.979496+00:00 Debian Importer Fixing VCID-asy4-m48b-xydu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:04.212227+00:00 Debian Importer Fixing VCID-8kug-7bk5-t3bf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:49.812134+00:00 Debian Importer Fixing VCID-k68k-tnns-mkga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:35.634879+00:00 Debian Importer Fixing VCID-1zbm-pnj5-xqb4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:27.622562+00:00 Debian Importer Fixing VCID-3453-ez2g-97ax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:08.509985+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:19.266069+00:00 Debian Importer Fixing VCID-sne8-13hq-mqan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:07.958359+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:46.317354+00:00 Debian Importer Fixing VCID-gfq9-z9p8-kqhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:25.513147+00:00 Debian Importer Fixing VCID-uywc-57rt-7ue6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:08.092641+00:00 Debian Importer Fixing VCID-v9p4-t339-t3g4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:54.553067+00:00 Debian Importer Fixing VCID-pnfa-xm28-w3bk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:33.655419+00:00 Debian Importer Fixing VCID-rsz5-e5fc-syh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:19.149057+00:00 Debian Importer Fixing VCID-q1cz-abcx-myc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:07.691489+00:00 Debian Importer Fixing VCID-apfq-mqch-jkgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:02.430255+00:00 Debian Importer Fixing VCID-94ed-vp4v-mqeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:50.374135+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:36.680864+00:00 Debian Importer Fixing VCID-mkw6-9tye-x3fb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:16.482705+00:00 Debian Importer Fixing VCID-bkp8-m2yc-qub7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:00.814089+00:00 Debian Importer Fixing VCID-ucab-wj54-hyey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:48.108287+00:00 Debian Importer Fixing VCID-n8y5-74xq-f7ft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:36.688988+00:00 Debian Importer Fixing VCID-s81d-vavh-fudh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:20:26.019363+00:00 Debian Importer Fixing VCID-7bmu-z2mb-cbbe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:19:55.481708+00:00 Debian Importer Fixing VCID-a5tz-dm6g-zqch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:18:07.387367+00:00 Debian Importer Fixing VCID-psbr-e3ym-tyfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:18:06.137087+00:00 Debian Importer Fixing VCID-z22s-ebq4-y7a4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:42.531840+00:00 Debian Importer Fixing VCID-fx2q-84en-qyah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:20.433442+00:00 Debian Importer Fixing VCID-3ng4-wb1y-wyem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:12.509056+00:00 Debian Importer Fixing VCID-8swc-xby9-cygu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:11.305576+00:00 Debian Importer Fixing VCID-wcu7-me4d-bugc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:49.971268+00:00 Debian Importer Fixing VCID-gtwd-5z2r-6ue9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:14:57.054444+00:00 Debian Importer Fixing VCID-cqrs-uu2s-affj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:12:24.611750+00:00 Debian Importer Fixing VCID-6cqc-um2d-1kfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:11:09.535807+00:00 Debian Importer Fixing VCID-p2ng-3bek-d3b6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:11:05.230344+00:00 Debian Importer Fixing VCID-p3vt-v7gj-gqbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T17:52:24.871354+00:00 Debian Importer Fixing VCID-nsbf-fkcw-cbed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T17:50:12.744300+00:00 Debian Importer Fixing VCID-1kgs-19ue-wbe1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:24:19.732547+00:00 Debian Importer Fixing VCID-dxt9-x347-pufy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:24:13.231837+00:00 Debian Importer Fixing VCID-8ab4-cv5e-2kff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:45.288662+00:00 Debian Importer Fixing VCID-wanj-gu4w-2qaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:44.320637+00:00 Debian Importer Fixing VCID-nnwa-29v5-jub3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:41.818328+00:00 Debian Importer Fixing VCID-1n5v-auw6-wbcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:03.757246+00:00 Debian Importer Fixing VCID-hh8s-8fc8-pkgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:21:02.243256+00:00 Debian Importer Fixing VCID-v3m5-xj2s-5yef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:20:48.800300+00:00 Debian Importer Fixing VCID-t4n5-xvuu-uba1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:20:45.859994+00:00 Debian Importer Fixing VCID-ecc5-64vs-ekgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:20:33.212513+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:18.839988+00:00 Debian Importer Fixing VCID-9kuz-7fag-4qhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:16.111587+00:00 Debian Importer Fixing VCID-hbn4-nw7h-abg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:15.301656+00:00 Debian Importer Fixing VCID-j7ng-yctd-3kc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:17:34.989446+00:00 Debian Importer Fixing VCID-915z-uxfx-3uh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:17:33.696086+00:00 Debian Importer Fixing VCID-g5sa-v8nq-gqge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:17:29.067399+00:00 Debian Importer Fixing VCID-5v5u-d5mg-53bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:27.642314+00:00 Debian Importer Fixing VCID-wq4h-q7vt-23ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:10.546940+00:00 Debian Importer Fixing VCID-cfms-gd2h-v7gd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:01.311063+00:00 Debian Importer Fixing VCID-ytfc-yqtw-4yhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:14:20.779040+00:00 Debian Importer Fixing VCID-xjyz-ptu2-jyc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:13:51.154534+00:00 Debian Importer Fixing VCID-xsc7-awsw-33fq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:13:05.725120+00:00 Debian Importer Fixing VCID-ncy9-6whk-ckep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:12:56.760298+00:00 Debian Importer Fixing VCID-qmuk-1txu-z3da https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:12:54.965411+00:00 Debian Importer Fixing VCID-wpd8-35bc-dka3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:12:10.191893+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:11:30.239931+00:00 Debian Importer Fixing VCID-kpkx-qwue-bff4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:11:25.009879+00:00 Debian Importer Fixing VCID-szdg-jd74-r7g1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:11:02.206180+00:00 Debian Importer Fixing VCID-ya2f-awge-mfae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:10:05.102128+00:00 Debian Importer Fixing VCID-p3s4-ha6m-bber https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:08:42.222159+00:00 Debian Importer Fixing VCID-kx5p-87fs-9kgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:07:26.476298+00:00 Debian Importer Fixing VCID-q567-ceh3-4bdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:06:32.294296+00:00 Debian Importer Fixing VCID-h57h-xt8g-y3f5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:03:49.839221+00:00 Debian Importer Fixing VCID-4tj5-m3wf-xkca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:03:36.859183+00:00 Debian Importer Fixing VCID-37t1-1qg2-hqc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:02:52.880072+00:00 Debian Importer Fixing VCID-g48f-w2gu-s7c3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:01:38.168338+00:00 Debian Importer Fixing VCID-744r-rpqc-k3gx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:01:30.807348+00:00 Debian Importer Fixing VCID-4qwu-fw8y-t7et https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:01:07.781586+00:00 Debian Importer Fixing VCID-5eks-kg2z-5ye1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:51.660997+00:00 Debian Importer Fixing VCID-jr94-175s-s7cy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:38.640435+00:00 Debian Importer Fixing VCID-a1xg-dyn3-skb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:25.191397+00:00 Debian Importer Fixing VCID-5g2a-qj5r-uub4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:59:06.285360+00:00 Debian Importer Fixing VCID-7ey4-wrhk-zfce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:57:30.745737+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:19.320773+00:00 Debian Importer Fixing VCID-c8mr-kkvc-akfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:02.311071+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:00.211270+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:53:44.775783+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:56.424508+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:55.370025+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:39.191306+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:37.333150+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:08.034700+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:51:45.984134+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:51:19.843698+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:47.268014+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:37.857606+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:32.843212+00:00 Debian Importer Fixing VCID-4avh-yaub-uqg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:10.240223+00:00 Debian Importer Fixing VCID-up76-yp3d-5kaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:04.946312+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:48:37.283045+00:00 Debian Importer Fixing VCID-514d-7urs-m7ge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:55.293515+00:00 Debian Importer Fixing VCID-ex4p-ftap-h7fe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:48.869606+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:37.421103+00:00 Debian Importer Fixing VCID-q8fu-8mce-7ue6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:03.386942+00:00 Debian Importer Fixing VCID-4vs9-vhrd-zfgn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:56.985222+00:00 Debian Importer Fixing VCID-17tu-a4wu-b3hv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:53.567886+00:00 Debian Importer Fixing VCID-9dfd-an6h-67gp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:43.244073+00:00 Debian Importer Fixing VCID-qa1s-pr21-cycs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:37.733470+00:00 Debian Importer Fixing VCID-142k-7wgv-pfh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:27.943633+00:00 Debian Importer Fixing VCID-a29y-u4f3-nkfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:15.015339+00:00 Debian Importer Fixing VCID-nuhs-4sjq-dkcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:58.068470+00:00 Debian Importer Fixing VCID-4spt-a3n7-z7fu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:45.781291+00:00 Debian Importer Fixing VCID-8xmp-5z38-1qaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:45.060226+00:00 Debian Importer Fixing VCID-xafq-y8ca-hkhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:38.351026+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:33.027221+00:00 Debian Importer Fixing VCID-wwax-w4gg-cuhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:22.406241+00:00 Debian Importer Fixing VCID-z35d-gch3-1uct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:20.919628+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:02.346041+00:00 Debian Importer Fixing VCID-kd3n-3han-k7dm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:37.783579+00:00 Debian Importer Fixing VCID-ajfm-hpzg-uqck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:26.733222+00:00 Debian Importer Fixing VCID-r1fj-r1mn-83fr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:15.284220+00:00 Debian Importer Fixing VCID-286c-64ry-67cz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:56.818374+00:00 Debian Importer Fixing VCID-6pmj-r187-kqcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:16.850601+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:53.435696+00:00 Debian Importer Fixing VCID-7xah-5pdm-eqfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:32.972372+00:00 Debian Importer Fixing VCID-b2kt-hmz5-yuhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:25.353045+00:00 Debian Importer Fixing VCID-gyhz-a9pm-zqav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:10.639343+00:00 Debian Importer Fixing VCID-c2me-ar1y-y7dw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:04:20.564487+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:04:05.498480+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:56.743439+00:00 Debian Importer Fixing VCID-mkjm-756w-5ygt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:46.502685+00:00 Debian Importer Fixing VCID-ptyj-1y6d-dud1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:40.127759+00:00 Debian Importer Fixing VCID-6wrr-yr71-xuhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:20.244572+00:00 Debian Importer Fixing VCID-cwd1-xgzd-xyb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:17.164915+00:00 Debian Importer Fixing VCID-tt18-fh9r-57c9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:16.145033+00:00 Debian Importer Fixing VCID-bfjx-x5b3-53bg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:10.536520+00:00 Debian Importer Fixing VCID-ans1-wmuz-e3bw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:19.741534+00:00 Debian Importer Fixing VCID-xqpe-25bd-vygx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:17.601936+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:07.905150+00:00 Debian Importer Fixing VCID-kp79-ejb3-u3ew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:42.625321+00:00 Debian Importer Fixing VCID-nm9q-qfj8-4bb4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:38.282845+00:00 Debian Importer Fixing VCID-8a31-1mz8-17cu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:32.644939+00:00 Debian Importer Fixing VCID-6rpd-ws7d-4qeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:08.137901+00:00 Debian Importer Fixing VCID-qyxy-uh9d-fqhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:42.052944+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:24.344314+00:00 Debian Importer Fixing VCID-akq2-c6hp-tfda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:57:49.969620+00:00 Debian Importer Fixing VCID-9jgy-8b6j-ayfz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:57.012097+00:00 Debian Importer Fixing VCID-wk3t-3jvn-quf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:46.432525+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:42.991109+00:00 Debian Importer Fixing VCID-k5ww-5ut8-pfg7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:36.212903+00:00 Debian Importer Fixing VCID-7gw9-7kbs-2uh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:55:31.264031+00:00 Debian Importer Fixing VCID-n791-nrre-9qfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:55:16.250728+00:00 Debian Importer Fixing VCID-azqr-xmc7-13b5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:56.356792+00:00 Debian Importer Fixing VCID-m9u8-d7gp-37bk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:48.274499+00:00 Debian Importer Fixing VCID-a6bg-yemv-4kcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:25.324441+00:00 Debian Importer Fixing VCID-bd8g-qrbe-23hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:19.129946+00:00 Debian Importer Fixing VCID-vdnv-8h83-7kfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:13.885391+00:00 Debian Importer Fixing VCID-gtjv-ut7g-hqhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:58.666233+00:00 Debian Importer Fixing VCID-3fpy-fq8u-r3gb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:48.971093+00:00 Debian Importer Fixing VCID-yjuh-uacz-xfhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:21.857464+00:00 Debian Importer Fixing VCID-yumk-yrcg-7qet https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:19.947115+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:12.311667+00:00 Debian Importer Fixing VCID-bv67-hyh5-j7hm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:08.589324+00:00 Debian Importer Fixing VCID-a3d8-8qvy-ykdr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:07.588755+00:00 Debian Importer Fixing VCID-9tbh-mrhu-v3am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:51:16.547190+00:00 Debian Importer Fixing VCID-ub6v-vb3r-83eh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:50:18.063419+00:00 Debian Importer Fixing VCID-cjnk-7asz-zuhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:01:48.695140+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:35:29.347133+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:40:40.163653+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:36:51.052816+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.1.0