Search for packages
Package details: pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
purl pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
Next non-vulnerable version 1.9.16p2-2
Latest non-vulnerable version 1.9.16p2-2
Risk 10.0
Vulnerabilities affecting this package (13)
Vulnerability Summary Fixed by
VCID-1559-zqnh-aaaa
Aliases:
CVE-2023-22809
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-32sj-ee49-aaaq
Aliases:
CVE-2023-28486
Sudo before 1.9.13 does not escape control characters in log messages.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
1.9.13p3-1+deb12u1
Affected by 1 other vulnerability.
VCID-6dre-2n2j-aaaj
Aliases:
CVE-2021-23239
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
1.9.5p2-3
Affected by 0 other vulnerabilities.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-ce8c-ym9j-aaaq
Aliases:
CVE-2021-3156
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-k8v6-njw9-aaad
Aliases:
CVE-2023-42465
Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
1.9.15p4-2
Affected by 0 other vulnerabilities.
1.9.15p5-3
Affected by 0 other vulnerabilities.
1.9.16p1-1
Affected by 0 other vulnerabilities.
1.9.16p2-1
Affected by 0 other vulnerabilities.
1.9.16p2-2
Affected by 0 other vulnerabilities.
VCID-kzs9-368t-aaar
Aliases:
CVE-2023-28487
Sudo before 1.9.13 does not escape control characters in sudoreplay output.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
1.9.13p3-1+deb12u1
Affected by 1 other vulnerability.
VCID-snd6-5dgv-aaap
Aliases:
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
1.9.13p3-1+deb12u1
Affected by 1 other vulnerability.
VCID-uzg3-q58h-aaad
Aliases:
CVE-2019-18634
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-vcb8-ab38-aaas
Aliases:
CVE-2019-19232
** DISPUTED ** In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions.
1.9.5p2-3
Affected by 0 other vulnerabilities.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-vq8m-kxfj-aaap
Aliases:
CVE-2019-14287
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-x5t6-c9gf-aaas
Aliases:
CVE-2023-7090
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-y8jn-eyp3-aaar
Aliases:
CVE-2021-23240
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
1.9.5p2-3
Affected by 0 other vulnerabilities.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
VCID-zaa8-pa6j-aaaa
Aliases:
CVE-2019-19234
** DISPUTED ** In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerberos, etc). Both the Linux shadow(5) and passwd(1) manuals are clear on this. Indeed it is a valid use case to have local accounts that are _only_ accessible via sudo and that cannot be logged into with a password. Sudo 1.8.30 added an optional setting to check the _shell_ of the target user (not the encrypted password!) against the contents of /etc/shells but that is not the same thing as preventing access to users with an invalid password hash.
1.9.5p2-3
Affected by 0 other vulnerabilities.
1.9.5p2-3+deb11u1
Affected by 4 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-ce8c-ym9j-aaaq Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. CVE-2021-3156
VCID-fkrt-pggy-aaab Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution. CVE-2017-1000368
VCID-jupb-c4dd-aaap Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution. CVE-2017-1000367
VCID-uzg3-q58h-aaad In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c. CVE-2019-18634
VCID-vq8m-kxfj-aaap In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. CVE-2019-14287

Date Actor Action Vulnerability Source VulnerableCode Version
2025-06-22T13:51:17.675197+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 36.1.3
2025-06-21T18:43:43.820370+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T18:29:50.212788+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-06-21T17:54:21.867198+00:00 Debian Oval Importer Fixing VCID-ce8c-ym9j-aaaq https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.3
2025-06-21T15:34:09.914349+00:00 Debian Oval Importer Affected by VCID-1559-zqnh-aaaa https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.3
2025-06-21T13:52:24.020139+00:00 Debian Oval Importer Fixing VCID-uzg3-q58h-aaad https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.3
2025-06-21T12:25:36.485847+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.3
2025-06-21T12:03:21.526403+00:00 Debian Oval Importer Fixing VCID-vq8m-kxfj-aaap https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.3
2025-06-21T07:13:39.587154+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T07:04:00.304188+00:00 Debian Oval Importer Affected by VCID-1559-zqnh-aaaa None 36.1.3
2025-06-21T06:44:05.983234+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 36.1.3
2025-06-21T06:35:27.201854+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 36.1.3
2025-06-21T06:28:44.174358+00:00 Debian Oval Importer Affected by VCID-vq8m-kxfj-aaap None 36.1.3
2025-06-21T06:19:13.264550+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj None 36.1.3
2025-06-21T04:55:12.642709+00:00 Debian Oval Importer Fixing VCID-fkrt-pggy-aaab None 36.1.3
2025-06-21T04:42:34.176050+00:00 Debian Oval Importer Affected by VCID-y8jn-eyp3-aaar None 36.1.3
2025-06-21T04:18:58.694773+00:00 Debian Oval Importer Fixing VCID-jupb-c4dd-aaap None 36.1.3
2025-06-21T03:15:40.354791+00:00 Debian Oval Importer Affected by VCID-uzg3-q58h-aaad None 36.1.3
2025-06-21T02:54:20.684890+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T02:40:36.165274+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T02:38:48.689605+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T02:28:01.546671+00:00 Debian Oval Importer Affected by VCID-ce8c-ym9j-aaaq None 36.1.3
2025-06-21T02:27:19.589976+00:00 Debian Oval Importer Affected by VCID-zaa8-pa6j-aaaa None 36.1.3
2025-06-21T01:41:02.138148+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T01:40:15.555959+00:00 Debian Oval Importer Affected by VCID-vcb8-ab38-aaas None 36.1.3
2025-06-21T01:14:10.397181+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa None 36.1.3
2025-06-20T23:34:23.357969+00:00 Debian Oval Importer Fixing VCID-ce8c-ym9j-aaaq None 36.1.3
2025-06-20T22:55:51.508722+00:00 Debian Oval Importer Fixing VCID-vq8m-kxfj-aaap None 36.1.3
2025-06-20T22:20:50.753838+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas None 36.1.3
2025-06-20T22:20:40.463584+00:00 Debian Oval Importer Fixing VCID-uzg3-q58h-aaad None 36.1.3
2025-06-20T21:17:39.866327+00:00 Debian Importer Affected by VCID-x5t6-c9gf-aaas https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-20T21:07:34.359342+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 36.1.3
2025-06-20T21:05:08.013595+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 36.1.3
2025-06-20T20:06:03.814317+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-08T12:25:44.401256+00:00 Debian Oval Importer Fixing VCID-fkrt-pggy-aaab https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.0
2025-06-08T12:24:09.439509+00:00 Debian Oval Importer Affected by VCID-uzg3-q58h-aaad https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.0
2025-06-08T11:58:24.022373+00:00 Debian Oval Importer Affected by VCID-vcb8-ab38-aaas https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.0
2025-06-08T11:00:21.503641+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.0
2025-06-08T10:26:10.163720+00:00 Debian Oval Importer Fixing VCID-ce8c-ym9j-aaaq https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.0
2025-06-08T08:28:40.259681+00:00 Debian Oval Importer Affected by VCID-1559-zqnh-aaaa https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.0
2025-06-08T06:46:40.025614+00:00 Debian Oval Importer Fixing VCID-uzg3-q58h-aaad https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.0
2025-06-08T05:26:44.124508+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.0
2025-06-08T05:11:50.129937+00:00 Debian Oval Importer Fixing VCID-vq8m-kxfj-aaap https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.1.0
2025-06-08T00:43:43.172007+00:00 Debian Oval Importer Affected by VCID-1559-zqnh-aaaa None 36.1.0
2025-06-08T00:07:56.538294+00:00 Debian Oval Importer Affected by VCID-vq8m-kxfj-aaap None 36.1.0
2025-06-07T23:58:18.623309+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj None 36.1.0
2025-06-07T22:32:31.016561+00:00 Debian Oval Importer Fixing VCID-fkrt-pggy-aaab None 36.1.0
2025-06-07T22:19:28.847204+00:00 Debian Oval Importer Affected by VCID-y8jn-eyp3-aaar None 36.1.0
2025-06-07T21:55:00.595498+00:00 Debian Oval Importer Fixing VCID-jupb-c4dd-aaap None 36.1.0
2025-06-07T20:48:40.639612+00:00 Debian Oval Importer Affected by VCID-uzg3-q58h-aaad None 36.1.0
2025-06-07T19:51:58.292155+00:00 Debian Oval Importer Affected by VCID-ce8c-ym9j-aaaq None 36.1.0
2025-06-07T19:51:15.150138+00:00 Debian Oval Importer Affected by VCID-zaa8-pa6j-aaaa None 36.1.0
2025-06-07T19:03:22.404957+00:00 Debian Oval Importer Affected by VCID-vcb8-ab38-aaas None 36.1.0
2025-06-07T16:57:20.430529+00:00 Debian Oval Importer Fixing VCID-ce8c-ym9j-aaaq None 36.1.0
2025-06-07T16:19:07.616684+00:00 Debian Oval Importer Fixing VCID-vq8m-kxfj-aaap None 36.1.0
2025-06-07T15:44:51.406055+00:00 Debian Oval Importer Fixing VCID-uzg3-q58h-aaad None 36.1.0
2025-06-05T14:07:49.883839+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 36.1.0
2025-04-12T22:55:30.205912+00:00 Debian Oval Importer Affected by VCID-x5t6-c9gf-aaas https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-12T22:55:27.427461+00:00 Debian Oval Importer Affected by VCID-kzs9-368t-aaar https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-12T22:55:26.018418+00:00 Debian Oval Importer Affected by VCID-32sj-ee49-aaaq https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-12T22:28:43.198848+00:00 Debian Oval Importer Fixing VCID-jupb-c4dd-aaap https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T22:10:57.012843+00:00 Debian Oval Importer Affected by VCID-ce8c-ym9j-aaaq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T21:20:59.175969+00:00 Debian Oval Importer Affected by VCID-vq8m-kxfj-aaap https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T20:46:09.682737+00:00 Debian Oval Importer Affected by VCID-y8jn-eyp3-aaar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T20:28:04.988196+00:00 Debian Oval Importer Affected by VCID-x5t6-c9gf-aaas https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T20:14:26.577330+00:00 Debian Oval Importer Affected by VCID-zaa8-pa6j-aaaa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T19:45:57.731201+00:00 Debian Oval Importer Affected by VCID-1559-zqnh-aaaa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T18:11:53.772573+00:00 Debian Oval Importer Fixing VCID-fkrt-pggy-aaab https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T18:10:15.127538+00:00 Debian Oval Importer Affected by VCID-uzg3-q58h-aaad https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T17:43:37.625833+00:00 Debian Oval Importer Affected by VCID-vcb8-ab38-aaas https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T16:43:11.235352+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T16:07:18.062829+00:00 Debian Oval Importer Fixing VCID-ce8c-ym9j-aaaq https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-08T07:00:04.396822+00:00 Debian Oval Importer Affected by VCID-1559-zqnh-aaaa https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-08T05:19:02.739548+00:00 Debian Oval Importer Fixing VCID-uzg3-q58h-aaad https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-08T03:57:57.002174+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-08T03:42:47.253936+00:00 Debian Oval Importer Fixing VCID-vq8m-kxfj-aaap https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 36.0.0
2025-04-07T23:16:01.859028+00:00 Debian Oval Importer Affected by VCID-1559-zqnh-aaaa None 36.0.0
2025-04-07T22:40:16.051171+00:00 Debian Oval Importer Affected by VCID-vq8m-kxfj-aaap None 36.0.0
2025-04-07T22:30:35.516123+00:00 Debian Oval Importer Affected by VCID-6dre-2n2j-aaaj None 36.0.0
2025-04-07T21:04:09.822193+00:00 Debian Oval Importer Fixing VCID-fkrt-pggy-aaab None 36.0.0
2025-04-07T20:51:00.765595+00:00 Debian Oval Importer Affected by VCID-y8jn-eyp3-aaar None 36.0.0
2025-04-07T20:25:29.699837+00:00 Debian Oval Importer Fixing VCID-jupb-c4dd-aaap None 36.0.0
2025-04-07T19:19:06.272124+00:00 Debian Oval Importer Affected by VCID-uzg3-q58h-aaad None 36.0.0
2025-04-07T18:29:49.705341+00:00 Debian Oval Importer Affected by VCID-ce8c-ym9j-aaaq None 36.0.0
2025-04-07T18:29:05.642789+00:00 Debian Oval Importer Affected by VCID-zaa8-pa6j-aaaa None 36.0.0
2025-04-07T17:41:14.281646+00:00 Debian Oval Importer Affected by VCID-vcb8-ab38-aaas None 36.0.0
2025-04-07T15:30:24.537328+00:00 Debian Oval Importer Fixing VCID-ce8c-ym9j-aaaq None 36.0.0
2025-04-07T14:50:46.921784+00:00 Debian Oval Importer Fixing VCID-vq8m-kxfj-aaap None 36.0.0
2025-04-07T14:15:35.921751+00:00 Debian Oval Importer Fixing VCID-uzg3-q58h-aaad None 36.0.0
2025-04-06T07:13:27.458217+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 36.0.0
2025-04-05T14:52:45.413926+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-05T04:29:53.774110+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-05T03:59:46.121982+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 36.0.0
2025-04-05T03:50:52.729867+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 36.0.0
2025-04-04T05:41:20.817114+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-04T05:27:00.262115+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-04T05:25:07.212266+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-04T04:25:45.978645+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-04T03:58:04.701374+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa None 36.0.0
2025-04-04T00:59:25.155446+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas None 36.0.0
2025-04-03T23:55:50.445312+00:00 Debian Importer Affected by VCID-x5t6-c9gf-aaas https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-03T23:47:05.612891+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 36.0.0
2025-04-03T23:45:11.656895+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 36.0.0
2025-04-03T23:06:57.386996+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-02-21T17:39:51.984493+00:00 Debian Importer Affected by VCID-x5t6-c9gf-aaas https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-21T13:39:51.586825+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-21T10:31:22.354188+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 35.1.0
2025-02-21T10:31:21.672630+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-21T10:31:13.422150+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-21T10:31:06.952643+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 35.1.0
2025-02-21T04:18:14.980531+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 35.1.0
2025-02-21T04:18:12.174544+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-19T20:47:18.786948+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-19T20:47:15.726582+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 35.1.0
2025-02-19T20:47:11.342372+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 35.1.0
2025-02-19T08:24:35.392402+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa None 35.1.0
2025-02-19T08:24:34.703336+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-19T08:24:20.068538+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-19T08:24:17.308724+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas None 35.1.0
2024-11-24T06:18:12.037983+00:00 Debian Importer Affected by VCID-x5t6-c9gf-aaas https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-24T02:41:31.341299+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-23T23:58:39.464908+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 35.0.0
2024-11-23T23:58:38.782389+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-23T23:58:30.459049+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-23T23:58:24.286713+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 35.0.0
2024-11-23T18:38:11.103476+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 35.0.0
2024-11-23T18:38:08.875017+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-22T17:04:36.329424+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-22T17:04:33.476617+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 35.0.0
2024-11-22T17:04:29.535004+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 35.0.0
2024-10-11T03:14:47.059335+00:00 Debian Importer Affected by VCID-x5t6-c9gf-aaas https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-11T00:17:08.240603+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-10T21:44:44.030515+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 34.0.2
2024-10-10T21:44:43.313311+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-10T21:44:36.275061+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-10T21:44:31.346950+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 34.0.2
2024-10-10T16:38:54.012332+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 34.0.2
2024-10-10T16:38:52.553252+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-09T16:09:21.791367+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-09T16:09:19.007924+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 34.0.2
2024-10-09T16:09:14.814519+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 34.0.2
2024-09-20T07:27:05.264071+00:00 Debian Importer Affected by VCID-x5t6-c9gf-aaas https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-20T04:50:51.669150+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-20T02:39:52.521528+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 34.0.1
2024-09-20T02:39:51.829602+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-20T02:39:44.947864+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-20T02:39:39.856512+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 34.0.1
2024-09-19T22:14:29.474177+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 34.0.1
2024-09-19T22:14:28.080017+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-19T00:47:36.206485+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-19T00:47:33.409642+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 34.0.1
2024-09-19T00:47:29.442963+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 34.0.1
2024-05-20T15:51:55.094040+00:00 Debian Importer Affected by VCID-x5t6-c9gf-aaas https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-26T04:58:26.279550+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-26T02:39:18.405325+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 34.0.0rc4
2024-04-26T02:39:17.614680+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-26T02:39:09.251488+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-26T02:39:04.126075+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 34.0.0rc4
2024-04-25T21:30:50.618534+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 34.0.0rc4
2024-04-25T21:30:48.942277+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-24T21:45:45.572143+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-24T21:45:42.020622+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 34.0.0rc4
2024-04-24T21:45:37.598898+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 34.0.0rc4
2024-04-24T15:21:48.683105+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa None 34.0.0rc4
2024-04-24T15:21:44.769375+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-24T15:21:26.118856+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-24T15:21:22.864853+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas None 34.0.0rc4
2024-01-12T12:41:23.138746+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-12T12:40:56.177810+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 34.0.0rc2
2024-01-12T12:40:50.322679+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-12T12:40:43.501515+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 34.0.0rc2
2024-01-12T07:21:23.630664+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 34.0.0rc2
2024-01-12T07:21:21.876500+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-10T22:39:51.313906+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-10T22:39:47.893992+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 34.0.0rc2
2024-01-10T22:39:43.390735+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 34.0.0rc2
2024-01-10T17:52:16.642483+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-10T17:52:14.934845+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa None 34.0.0rc2
2024-01-10T17:52:02.806521+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-10T17:51:56.856321+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas None 34.0.0rc2
2024-01-05T09:41:41.586187+00:00 Debian Importer Affected by VCID-k8v6-njw9-aaad https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-05T08:26:03.524639+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-05T08:26:02.648754+00:00 Debian Importer Affected by VCID-kzs9-368t-aaar None 34.0.0rc1
2024-01-05T08:25:58.383711+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-05T08:25:53.446878+00:00 Debian Importer Affected by VCID-32sj-ee49-aaaq None 34.0.0rc1
2024-01-05T05:40:55.919870+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap None 34.0.0rc1
2024-01-05T05:40:55.116382+00:00 Debian Importer Affected by VCID-snd6-5dgv-aaap https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-04T11:50:25.712176+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-04T11:50:22.300769+00:00 Debian Importer Affected by VCID-y8jn-eyp3-aaar None 34.0.0rc1
2024-01-04T11:50:17.846757+00:00 Debian Importer Affected by VCID-6dre-2n2j-aaaj None 34.0.0rc1
2024-01-04T07:26:12.587640+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-04T07:26:06.839291+00:00 Debian Importer Affected by VCID-zaa8-pa6j-aaaa None 34.0.0rc1
2024-01-04T07:25:55.905025+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-04T07:25:49.923040+00:00 Debian Importer Affected by VCID-vcb8-ab38-aaas None 34.0.0rc1