Search for packages
purl | pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3 |
Next non-vulnerable version | 1.9.16p2-2 |
Latest non-vulnerable version | 1.9.16p2-2 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1559-zqnh-aaaa
Aliases: CVE-2023-22809 |
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. |
Affected by 4 other vulnerabilities. |
VCID-32sj-ee49-aaaq
Aliases: CVE-2023-28486 |
Sudo before 1.9.13 does not escape control characters in log messages. |
Affected by 4 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-6dre-2n2j-aaaj
Aliases: CVE-2021-23239 |
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. |
Affected by 0 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-ce8c-ym9j-aaaq
Aliases: CVE-2021-3156 |
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. |
Affected by 4 other vulnerabilities. |
VCID-k8v6-njw9-aaad
Aliases: CVE-2023-42465 |
Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-kzs9-368t-aaar
Aliases: CVE-2023-28487 |
Sudo before 1.9.13 does not escape control characters in sudoreplay output. |
Affected by 4 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-snd6-5dgv-aaap
Aliases: CVE-2022-43995 |
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. |
Affected by 4 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-uzg3-q58h-aaad
Aliases: CVE-2019-18634 |
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c. |
Affected by 4 other vulnerabilities. |
VCID-vcb8-ab38-aaas
Aliases: CVE-2019-19232 |
** DISPUTED ** In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions. |
Affected by 0 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-vq8m-kxfj-aaap
Aliases: CVE-2019-14287 |
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. |
Affected by 4 other vulnerabilities. |
VCID-x5t6-c9gf-aaas
Aliases: CVE-2023-7090 |
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them. |
Affected by 4 other vulnerabilities. |
VCID-y8jn-eyp3-aaar
Aliases: CVE-2021-23240 |
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable. |
Affected by 0 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-zaa8-pa6j-aaaa
Aliases: CVE-2019-19234 |
** DISPUTED ** In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerberos, etc). Both the Linux shadow(5) and passwd(1) manuals are clear on this. Indeed it is a valid use case to have local accounts that are _only_ accessible via sudo and that cannot be logged into with a password. Sudo 1.8.30 added an optional setting to check the _shell_ of the target user (not the encrypted password!) against the contents of /etc/shells but that is not the same thing as preventing access to users with an invalid password hash. |
Affected by 0 other vulnerabilities. Affected by 4 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-ce8c-ym9j-aaaq | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. |
CVE-2021-3156
|
VCID-fkrt-pggy-aaab | Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution. |
CVE-2017-1000368
|
VCID-jupb-c4dd-aaap | Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution. |
CVE-2017-1000367
|
VCID-uzg3-q58h-aaad | In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c. |
CVE-2019-18634
|
VCID-vq8m-kxfj-aaap | In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. |
CVE-2019-14287
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-22T13:51:17.675197+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 36.1.3 |
2025-06-21T18:43:43.820370+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T18:29:50.212788+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.3 |
2025-06-21T17:54:21.867198+00:00 | Debian Oval Importer | Fixing | VCID-ce8c-ym9j-aaaq | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T15:34:09.914349+00:00 | Debian Oval Importer | Affected by | VCID-1559-zqnh-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T13:52:24.020139+00:00 | Debian Oval Importer | Fixing | VCID-uzg3-q58h-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T12:25:36.485847+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T12:03:21.526403+00:00 | Debian Oval Importer | Fixing | VCID-vq8m-kxfj-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.3 |
2025-06-21T07:13:39.587154+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T07:04:00.304188+00:00 | Debian Oval Importer | Affected by | VCID-1559-zqnh-aaaa | None | 36.1.3 |
2025-06-21T06:44:05.983234+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 36.1.3 |
2025-06-21T06:35:27.201854+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 36.1.3 |
2025-06-21T06:28:44.174358+00:00 | Debian Oval Importer | Affected by | VCID-vq8m-kxfj-aaap | None | 36.1.3 |
2025-06-21T06:19:13.264550+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 36.1.3 |
2025-06-21T04:55:12.642709+00:00 | Debian Oval Importer | Fixing | VCID-fkrt-pggy-aaab | None | 36.1.3 |
2025-06-21T04:42:34.176050+00:00 | Debian Oval Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 36.1.3 |
2025-06-21T04:18:58.694773+00:00 | Debian Oval Importer | Fixing | VCID-jupb-c4dd-aaap | None | 36.1.3 |
2025-06-21T03:15:40.354791+00:00 | Debian Oval Importer | Affected by | VCID-uzg3-q58h-aaad | None | 36.1.3 |
2025-06-21T02:54:20.684890+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T02:40:36.165274+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T02:38:48.689605+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T02:28:01.546671+00:00 | Debian Oval Importer | Affected by | VCID-ce8c-ym9j-aaaq | None | 36.1.3 |
2025-06-21T02:27:19.589976+00:00 | Debian Oval Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 36.1.3 |
2025-06-21T01:41:02.138148+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T01:40:15.555959+00:00 | Debian Oval Importer | Affected by | VCID-vcb8-ab38-aaas | None | 36.1.3 |
2025-06-21T01:14:10.397181+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 36.1.3 |
2025-06-20T23:34:23.357969+00:00 | Debian Oval Importer | Fixing | VCID-ce8c-ym9j-aaaq | None | 36.1.3 |
2025-06-20T22:55:51.508722+00:00 | Debian Oval Importer | Fixing | VCID-vq8m-kxfj-aaap | None | 36.1.3 |
2025-06-20T22:20:50.753838+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | None | 36.1.3 |
2025-06-20T22:20:40.463584+00:00 | Debian Oval Importer | Fixing | VCID-uzg3-q58h-aaad | None | 36.1.3 |
2025-06-20T21:17:39.866327+00:00 | Debian Importer | Affected by | VCID-x5t6-c9gf-aaas | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-20T21:07:34.359342+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 36.1.3 |
2025-06-20T21:05:08.013595+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 36.1.3 |
2025-06-20T20:06:03.814317+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-08T12:25:44.401256+00:00 | Debian Oval Importer | Fixing | VCID-fkrt-pggy-aaab | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-08T12:24:09.439509+00:00 | Debian Oval Importer | Affected by | VCID-uzg3-q58h-aaad | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-08T11:58:24.022373+00:00 | Debian Oval Importer | Affected by | VCID-vcb8-ab38-aaas | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-08T11:00:21.503641+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-08T10:26:10.163720+00:00 | Debian Oval Importer | Fixing | VCID-ce8c-ym9j-aaaq | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T08:28:40.259681+00:00 | Debian Oval Importer | Affected by | VCID-1559-zqnh-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T06:46:40.025614+00:00 | Debian Oval Importer | Fixing | VCID-uzg3-q58h-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T05:26:44.124508+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T05:11:50.129937+00:00 | Debian Oval Importer | Fixing | VCID-vq8m-kxfj-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.1.0 |
2025-06-08T00:43:43.172007+00:00 | Debian Oval Importer | Affected by | VCID-1559-zqnh-aaaa | None | 36.1.0 |
2025-06-08T00:07:56.538294+00:00 | Debian Oval Importer | Affected by | VCID-vq8m-kxfj-aaap | None | 36.1.0 |
2025-06-07T23:58:18.623309+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 36.1.0 |
2025-06-07T22:32:31.016561+00:00 | Debian Oval Importer | Fixing | VCID-fkrt-pggy-aaab | None | 36.1.0 |
2025-06-07T22:19:28.847204+00:00 | Debian Oval Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 36.1.0 |
2025-06-07T21:55:00.595498+00:00 | Debian Oval Importer | Fixing | VCID-jupb-c4dd-aaap | None | 36.1.0 |
2025-06-07T20:48:40.639612+00:00 | Debian Oval Importer | Affected by | VCID-uzg3-q58h-aaad | None | 36.1.0 |
2025-06-07T19:51:58.292155+00:00 | Debian Oval Importer | Affected by | VCID-ce8c-ym9j-aaaq | None | 36.1.0 |
2025-06-07T19:51:15.150138+00:00 | Debian Oval Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 36.1.0 |
2025-06-07T19:03:22.404957+00:00 | Debian Oval Importer | Affected by | VCID-vcb8-ab38-aaas | None | 36.1.0 |
2025-06-07T16:57:20.430529+00:00 | Debian Oval Importer | Fixing | VCID-ce8c-ym9j-aaaq | None | 36.1.0 |
2025-06-07T16:19:07.616684+00:00 | Debian Oval Importer | Fixing | VCID-vq8m-kxfj-aaap | None | 36.1.0 |
2025-06-07T15:44:51.406055+00:00 | Debian Oval Importer | Fixing | VCID-uzg3-q58h-aaad | None | 36.1.0 |
2025-06-05T14:07:49.883839+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 36.1.0 |
2025-04-12T22:55:30.205912+00:00 | Debian Oval Importer | Affected by | VCID-x5t6-c9gf-aaas | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-12T22:55:27.427461+00:00 | Debian Oval Importer | Affected by | VCID-kzs9-368t-aaar | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-12T22:55:26.018418+00:00 | Debian Oval Importer | Affected by | VCID-32sj-ee49-aaaq | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-12T22:28:43.198848+00:00 | Debian Oval Importer | Fixing | VCID-jupb-c4dd-aaap | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T22:10:57.012843+00:00 | Debian Oval Importer | Affected by | VCID-ce8c-ym9j-aaaq | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T21:20:59.175969+00:00 | Debian Oval Importer | Affected by | VCID-vq8m-kxfj-aaap | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T20:46:09.682737+00:00 | Debian Oval Importer | Affected by | VCID-y8jn-eyp3-aaar | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T20:28:04.988196+00:00 | Debian Oval Importer | Affected by | VCID-x5t6-c9gf-aaas | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T20:14:26.577330+00:00 | Debian Oval Importer | Affected by | VCID-zaa8-pa6j-aaaa | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T19:45:57.731201+00:00 | Debian Oval Importer | Affected by | VCID-1559-zqnh-aaaa | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T18:11:53.772573+00:00 | Debian Oval Importer | Fixing | VCID-fkrt-pggy-aaab | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T18:10:15.127538+00:00 | Debian Oval Importer | Affected by | VCID-uzg3-q58h-aaad | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T17:43:37.625833+00:00 | Debian Oval Importer | Affected by | VCID-vcb8-ab38-aaas | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T16:43:11.235352+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T16:07:18.062829+00:00 | Debian Oval Importer | Fixing | VCID-ce8c-ym9j-aaaq | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T07:00:04.396822+00:00 | Debian Oval Importer | Affected by | VCID-1559-zqnh-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T05:19:02.739548+00:00 | Debian Oval Importer | Fixing | VCID-uzg3-q58h-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T03:57:57.002174+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-08T03:42:47.253936+00:00 | Debian Oval Importer | Fixing | VCID-vq8m-kxfj-aaap | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-07T23:16:01.859028+00:00 | Debian Oval Importer | Affected by | VCID-1559-zqnh-aaaa | None | 36.0.0 |
2025-04-07T22:40:16.051171+00:00 | Debian Oval Importer | Affected by | VCID-vq8m-kxfj-aaap | None | 36.0.0 |
2025-04-07T22:30:35.516123+00:00 | Debian Oval Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 36.0.0 |
2025-04-07T21:04:09.822193+00:00 | Debian Oval Importer | Fixing | VCID-fkrt-pggy-aaab | None | 36.0.0 |
2025-04-07T20:51:00.765595+00:00 | Debian Oval Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 36.0.0 |
2025-04-07T20:25:29.699837+00:00 | Debian Oval Importer | Fixing | VCID-jupb-c4dd-aaap | None | 36.0.0 |
2025-04-07T19:19:06.272124+00:00 | Debian Oval Importer | Affected by | VCID-uzg3-q58h-aaad | None | 36.0.0 |
2025-04-07T18:29:49.705341+00:00 | Debian Oval Importer | Affected by | VCID-ce8c-ym9j-aaaq | None | 36.0.0 |
2025-04-07T18:29:05.642789+00:00 | Debian Oval Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 36.0.0 |
2025-04-07T17:41:14.281646+00:00 | Debian Oval Importer | Affected by | VCID-vcb8-ab38-aaas | None | 36.0.0 |
2025-04-07T15:30:24.537328+00:00 | Debian Oval Importer | Fixing | VCID-ce8c-ym9j-aaaq | None | 36.0.0 |
2025-04-07T14:50:46.921784+00:00 | Debian Oval Importer | Fixing | VCID-vq8m-kxfj-aaap | None | 36.0.0 |
2025-04-07T14:15:35.921751+00:00 | Debian Oval Importer | Fixing | VCID-uzg3-q58h-aaad | None | 36.0.0 |
2025-04-06T07:13:27.458217+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 36.0.0 |
2025-04-05T14:52:45.413926+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-05T04:29:53.774110+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-05T03:59:46.121982+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 36.0.0 |
2025-04-05T03:50:52.729867+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 36.0.0 |
2025-04-04T05:41:20.817114+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-04T05:27:00.262115+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-04T05:25:07.212266+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-04T04:25:45.978645+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-04T03:58:04.701374+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 36.0.0 |
2025-04-04T00:59:25.155446+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | None | 36.0.0 |
2025-04-03T23:55:50.445312+00:00 | Debian Importer | Affected by | VCID-x5t6-c9gf-aaas | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-03T23:47:05.612891+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 36.0.0 |
2025-04-03T23:45:11.656895+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 36.0.0 |
2025-04-03T23:06:57.386996+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-02-21T17:39:51.984493+00:00 | Debian Importer | Affected by | VCID-x5t6-c9gf-aaas | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-21T13:39:51.586825+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-21T10:31:22.354188+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 35.1.0 |
2025-02-21T10:31:21.672630+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-21T10:31:13.422150+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-21T10:31:06.952643+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 35.1.0 |
2025-02-21T04:18:14.980531+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 35.1.0 |
2025-02-21T04:18:12.174544+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-19T20:47:18.786948+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-19T20:47:15.726582+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 35.1.0 |
2025-02-19T20:47:11.342372+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 35.1.0 |
2025-02-19T08:24:35.392402+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 35.1.0 |
2025-02-19T08:24:34.703336+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-19T08:24:20.068538+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-19T08:24:17.308724+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | None | 35.1.0 |
2024-11-24T06:18:12.037983+00:00 | Debian Importer | Affected by | VCID-x5t6-c9gf-aaas | https://security-tracker.debian.org/tracker/data/json | 35.0.0 |
2024-11-24T02:41:31.341299+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 35.0.0 |
2024-11-23T23:58:39.464908+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 35.0.0 |
2024-11-23T23:58:38.782389+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 35.0.0 |
2024-11-23T23:58:30.459049+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 35.0.0 |
2024-11-23T23:58:24.286713+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 35.0.0 |
2024-11-23T18:38:11.103476+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 35.0.0 |
2024-11-23T18:38:08.875017+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 35.0.0 |
2024-11-22T17:04:36.329424+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 35.0.0 |
2024-11-22T17:04:33.476617+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 35.0.0 |
2024-11-22T17:04:29.535004+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 35.0.0 |
2024-10-11T03:14:47.059335+00:00 | Debian Importer | Affected by | VCID-x5t6-c9gf-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.2 |
2024-10-11T00:17:08.240603+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 34.0.2 |
2024-10-10T21:44:44.030515+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 34.0.2 |
2024-10-10T21:44:43.313311+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.2 |
2024-10-10T21:44:36.275061+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 34.0.2 |
2024-10-10T21:44:31.346950+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 34.0.2 |
2024-10-10T16:38:54.012332+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 34.0.2 |
2024-10-10T16:38:52.553252+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 34.0.2 |
2024-10-09T16:09:21.791367+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.2 |
2024-10-09T16:09:19.007924+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 34.0.2 |
2024-10-09T16:09:14.814519+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 34.0.2 |
2024-09-20T07:27:05.264071+00:00 | Debian Importer | Affected by | VCID-x5t6-c9gf-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.1 |
2024-09-20T04:50:51.669150+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 34.0.1 |
2024-09-20T02:39:52.521528+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 34.0.1 |
2024-09-20T02:39:51.829602+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.1 |
2024-09-20T02:39:44.947864+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 34.0.1 |
2024-09-20T02:39:39.856512+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 34.0.1 |
2024-09-19T22:14:29.474177+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 34.0.1 |
2024-09-19T22:14:28.080017+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 34.0.1 |
2024-09-19T00:47:36.206485+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.1 |
2024-09-19T00:47:33.409642+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 34.0.1 |
2024-09-19T00:47:29.442963+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 34.0.1 |
2024-05-20T15:51:55.094040+00:00 | Debian Importer | Affected by | VCID-x5t6-c9gf-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T04:58:26.279550+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T02:39:18.405325+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 34.0.0rc4 |
2024-04-26T02:39:17.614680+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T02:39:09.251488+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T02:39:04.126075+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 34.0.0rc4 |
2024-04-25T21:30:50.618534+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 34.0.0rc4 |
2024-04-25T21:30:48.942277+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T21:45:45.572143+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T21:45:42.020622+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 34.0.0rc4 |
2024-04-24T21:45:37.598898+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 34.0.0rc4 |
2024-04-24T15:21:48.683105+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 34.0.0rc4 |
2024-04-24T15:21:44.769375+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T15:21:26.118856+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T15:21:22.864853+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | None | 34.0.0rc4 |
2024-01-12T12:41:23.138746+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-12T12:40:56.177810+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 34.0.0rc2 |
2024-01-12T12:40:50.322679+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-12T12:40:43.501515+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 34.0.0rc2 |
2024-01-12T07:21:23.630664+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 34.0.0rc2 |
2024-01-12T07:21:21.876500+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-10T22:39:51.313906+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-10T22:39:47.893992+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 34.0.0rc2 |
2024-01-10T22:39:43.390735+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 34.0.0rc2 |
2024-01-10T17:52:16.642483+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-10T17:52:14.934845+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 34.0.0rc2 |
2024-01-10T17:52:02.806521+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-10T17:51:56.856321+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | None | 34.0.0rc2 |
2024-01-05T09:41:41.586187+00:00 | Debian Importer | Affected by | VCID-k8v6-njw9-aaad | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-05T08:26:03.524639+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-05T08:26:02.648754+00:00 | Debian Importer | Affected by | VCID-kzs9-368t-aaar | None | 34.0.0rc1 |
2024-01-05T08:25:58.383711+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-05T08:25:53.446878+00:00 | Debian Importer | Affected by | VCID-32sj-ee49-aaaq | None | 34.0.0rc1 |
2024-01-05T05:40:55.919870+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | None | 34.0.0rc1 |
2024-01-05T05:40:55.116382+00:00 | Debian Importer | Affected by | VCID-snd6-5dgv-aaap | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-04T11:50:25.712176+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-04T11:50:22.300769+00:00 | Debian Importer | Affected by | VCID-y8jn-eyp3-aaar | None | 34.0.0rc1 |
2024-01-04T11:50:17.846757+00:00 | Debian Importer | Affected by | VCID-6dre-2n2j-aaaj | None | 34.0.0rc1 |
2024-01-04T07:26:12.587640+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-04T07:26:06.839291+00:00 | Debian Importer | Affected by | VCID-zaa8-pa6j-aaaa | None | 34.0.0rc1 |
2024-01-04T07:25:55.905025+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-04T07:25:49.923040+00:00 | Debian Importer | Affected by | VCID-vcb8-ab38-aaas | None | 34.0.0rc1 |