Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/linux@6.1.162-1
purl pkg:deb/debian/linux@6.1.162-1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (958)
Vulnerability Summary Aliases
VCID-11nd-2f5c-ybe1 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB reads parsing symlink error response When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leaving the symlink parsers as the only defense against an untrusted server. symlink_data() walks SMB 3.1.1 error contexts with the loop test "p < end", but reads p->ErrorId at offset 4 and p->ErrorDataLength at offset 0. When the server-controlled ErrorDataLength advances p to within 1-7 bytes of end, the next iteration will read past it. When the matching context is found, sym->SymLinkErrorTag is read at offset 4 from p->ErrorContextData with no check that the symlink header itself fits. smb2_parse_symlink_response() then bounds-checks the substitute name using SMB2_SYMLINK_STRUCT_SIZE as the offset of PathBuffer from iov_base. That value is computed as sizeof(smb2_err_rsp) + sizeof(smb2_symlink_err_rsp), which is correct only when ErrorContextCount == 0. With at least one error context the symlink data sits 8 bytes deeper, and each skipped non-matching context shifts it further by 8 + ALIGN(ErrorDataLength, 8). The check is too short, allowing the substitute name read to run past iov_len. The out-of-bound heap bytes are UTF-16-decoded into the symlink target and returned to userspace via readlink(2). Fix this all up by making the loops test require the full context header to fit, rejecting sym if its header runs past end, and bound the substitute name against the actual position of sym->PathBuffer rather than a fixed offset. Because sub_offs and sub_len are 16bits, the pointer math will not overflow here with the new greater-than. CVE-2026-31613
VCID-142k-7wgv-pfh6 In the Linux kernel, the following vulnerability has been resolved: wifi: radiotap: reject radiotap with unknown bits The radiotap parser is currently only used with the radiotap namespace (not with vendor namespaces), but if the undefined field 18 is used, the alignment/size is unknown as well. In this case, iterator->_next_ns_data isn't initialized (it's only set for skipping vendor namespaces), and syzbot points out that we later compare against this uninitialized value. Fix this by moving the rejection of unknown radiotap fields down to after the in-namespace lookup, so it will really use iterator->_next_ns_data only for vendor namespaces, even in case undefined fields are present. CVE-2026-23367
VCID-14ey-bdy6-5qe9 In the Linux kernel, the following vulnerability has been resolved: ext4: validate p_idx bounds in ext4_ext_correct_indexes ext4_ext_correct_indexes() walks up the extent tree correcting index entries when the first extent in a leaf is modified. Before accessing path[k].p_idx->ei_block, there is no validation that p_idx falls within the valid range of index entries for that level. If the on-disk extent header contains a corrupted or crafted eh_entries value, p_idx can point past the end of the allocated buffer, causing a slab-out-of-bounds read. Fix this by validating path[k].p_idx against EXT_LAST_INDEX() at both access sites: before the while loop and inside it. Return -EFSCORRUPTED if the index pointer is out of range, consistent with how other bounds violations are handled in the ext4 extent tree code. CVE-2026-31449
VCID-14u5-h6vv-p7c3 CVE-2026-31674
VCID-16bv-9gad-pkat kernel: wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work CVE-2025-39863
VCID-16es-2z99-a3hu CVE-2026-31405
VCID-179u-b611-z7hc In the Linux kernel, the following vulnerability has been resolved: net: macb: use the current queue number for stats There's a potential mismatch between the memory reserved for statistics and the amount of memory written. gem_get_sset_count() correctly computes the number of stats based on the active queues, whereas gem_get_ethtool_stats() indiscriminately copies data using the maximum number of queues, and in the case the number of active queues is less than MACB_MAX_QUEUES, this results in a OOB write as observed in the KASAN splat. ================================================================== BUG: KASAN: vmalloc-out-of-bounds in gem_get_ethtool_stats+0x54/0x78 [macb] Write of size 760 at addr ffff80008080b000 by task ethtool/1027 CPU: [...] Tainted: [E]=UNSIGNED_MODULE Hardware name: raspberrypi rpi/rpi, BIOS 2025.10 10/01/2025 Call trace: show_stack+0x20/0x38 (C) dump_stack_lvl+0x80/0xf8 print_report+0x384/0x5e0 kasan_report+0xa0/0xf0 kasan_check_range+0xe8/0x190 __asan_memcpy+0x54/0x98 gem_get_ethtool_stats+0x54/0x78 [macb 926c13f3af83b0c6fe64badb21ec87d5e93fcf65] dev_ethtool+0x1220/0x38c0 dev_ioctl+0x4ac/0xca8 sock_do_ioctl+0x170/0x1d8 sock_ioctl+0x484/0x5d8 __arm64_sys_ioctl+0x12c/0x1b8 invoke_syscall+0xd4/0x258 el0_svc_common.constprop.0+0xb4/0x240 do_el0_svc+0x48/0x68 el0_svc+0x40/0xf8 el0t_64_sync_handler+0xa0/0xe8 el0t_64_sync+0x1b0/0x1b8 The buggy address belongs to a 1-page vmalloc region starting at 0xffff80008080b000 allocated at dev_ethtool+0x11f0/0x38c0 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff00000a333000 pfn:0xa333 flags: 0x7fffc000000000(node=0|zone=0|lastcpupid=0x1ffff) raw: 007fffc000000000 0000000000000000 dead000000000122 0000000000000000 raw: ffff00000a333000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff80008080b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff80008080b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff80008080b180: 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffff80008080b200: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffff80008080b280: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ================================================================== Fix it by making sure the copied size only considers the active number of queues. CVE-2026-31494
VCID-17tu-a4wu-b3hv kernel: blktrace: fix __this_cpu_read/write in preemptible context CVE-2026-23374
VCID-188w-9sxd-5khx In the Linux kernel, the following vulnerability has been resolved: iavf: fix out-of-bounds writes in iavf_get_ethtool_stats() iavf incorrectly uses real_num_tx_queues for ETH_SS_STATS. Since the value could change in runtime, we should use num_tx_queues instead. Moreover iavf_get_ethtool_stats() uses num_active_queues while iavf_get_sset_count() and iavf_get_stat_strings() use real_num_tx_queues, which triggers out-of-bounds writes when we do "ethtool -L" and "ethtool -S" simultaneously [1]. For example when we change channels from 1 to 8, Thread 3 could be scheduled before Thread 2, and out-of-bounds writes could be triggered in Thread 3: Thread 1 (ethtool -L) Thread 2 (work) Thread 3 (ethtool -S) iavf_set_channels() ... iavf_alloc_queues() -> num_active_queues = 8 iavf_schedule_finish_config() iavf_get_sset_count() real_num_tx_queues: 1 -> buffer for 1 queue iavf_get_ethtool_stats() num_active_queues: 8 -> out-of-bounds! iavf_finish_config() -> real_num_tx_queues = 8 Use immutable num_tx_queues in all related functions to avoid the issue. [1] BUG: KASAN: vmalloc-out-of-bounds in iavf_add_one_ethtool_stat+0x200/0x270 Write of size 8 at addr ffffc900031c9080 by task ethtool/5800 CPU: 1 UID: 0 PID: 5800 Comm: ethtool Not tainted 6.19.0-enjuk-08403-g8137e3db7f1c #241 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x6f/0xb0 print_report+0x170/0x4f3 kasan_report+0xe1/0x180 iavf_add_one_ethtool_stat+0x200/0x270 iavf_get_ethtool_stats+0x14c/0x2e0 __dev_ethtool+0x3d0c/0x5830 dev_ethtool+0x12d/0x270 dev_ioctl+0x53c/0xe30 sock_do_ioctl+0x1a9/0x270 sock_ioctl+0x3d4/0x5e0 __x64_sys_ioctl+0x137/0x1c0 do_syscall_64+0xf3/0x690 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7da0e6e36d ... </TASK> The buggy address belongs to a 1-page vmalloc region starting at 0xffffc900031c9000 allocated at __dev_ethtool+0x3cc9/0x5830 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88813a013de0 pfn:0x13a013 flags: 0x200000000000000(node=0|zone=2) raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 raw: ffff88813a013de0 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffffc900031c8f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900031c9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc900031c9080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc900031c9100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900031c9180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 CVE-2026-31505
VCID-1ajk-6gxr-efgp kernel: gfs2: No more self recovery CVE-2025-38659
VCID-1cac-quc3-2bcf kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() CVE-2025-40139
VCID-1dxt-yy4z-y7cs kernel: can: ucan: Fix infinite loop from zero-length messages CVE-2026-23298
VCID-1fca-q7wb-u3cx kernel: bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT CVE-2025-21825
VCID-1g53-791b-8fd7 kernel: drm/amd/display: Validate function returns CVE-2024-46775
VCID-1g77-qwuy-nkg8 CVE-2026-31416
VCID-1hvg-tmga-nfhm kernel: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() CVE-2024-53068
VCID-1k5n-pxpr-4bc4 In the Linux kernel, the following vulnerability has been resolved: batman-adv: hold claim backbone gateways by reference batadv_bla_add_claim() can replace claim->backbone_gw and drop the old gateway's last reference while readers still follow the pointer. The netlink claim dump path dereferences claim->backbone_gw->orig and takes claim->backbone_gw->crc_lock without pinning the underlying backbone gateway. batadv_bla_check_claim() still has the same naked pointer access pattern. Reuse batadv_bla_claim_get_backbone_gw() in both readers so they operate on a stable gateway reference until the read-side work is complete. This keeps the dump and claim-check paths aligned with the lifetime rules introduced for the other BLA claim readers. CVE-2026-31657
VCID-1kgs-19ue-wbe1 In the Linux kernel, the following vulnerability has been resolved: mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations ieee80211_chan_bw_change() iterates all stations and accesses link->reserved.oper via sta->sdata->link[link_id]. For stations on AP_VLAN interfaces (e.g. 4addr WDS clients), sta->sdata points to the VLAN sdata, whose link never participates in chanctx reservations. This leaves link->reserved.oper zero-initialized with chan == NULL, causing a NULL pointer dereference in __ieee80211_sta_cap_rx_bw() when accessing chandef->chan->band during CSA. Resolve the VLAN sdata to its parent AP sdata using get_bss_sdata() before accessing link data. [also change sta->sdata in ARRAY_SIZE even if it doesn't matter] CVE-2026-31394
VCID-1m9j-m8xz-zqav kernel: smc: Fix use-after-free in tcp_write_timer_handler() CVE-2023-53781
VCID-1n41-qg8u-r7d5 CVE-2026-31692
VCID-1n5v-auw6-wbcd CVE-2026-23420
VCID-1n7k-a7ve-8qcr kernel: smb: client: fix use-after-free of signing key CVE-2024-53179
VCID-1rd4-nsvv-6bfy kernel: btrfs: don't check PageError in __extent_writepage CVE-2023-53429
VCID-1s26-havx-dkey In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() l2cap_ecred_data_rcv() reads the SDU length field from skb->data using get_unaligned_le16() without first verifying that skb contains at least L2CAP_SDULEN_SIZE (2) bytes. When skb->len is less than 2, this reads past the valid data in the skb. The ERTM reassembly path correctly calls pskb_may_pull() before reading the SDU length (l2cap_reassemble_sdu, L2CAP_SAR_START case). Apply the same validation to the Enhanced Credit Based Flow Control data path. CVE-2026-31512
VCID-1s77-djzb-xffp CVE-2026-31417
VCID-1x2r-t2gj-akgf kernel: netfilter: nft_objref: validate objref and objrefmap expressions CVE-2025-40206
VCID-1yba-pq6x-qkh3 kernel: iio: common: st_sensors: Fix use of uninitialize device structs CVE-2025-38531
VCID-1ygk-whua-gbcq kernel: ALSA: usb-audio: Use correct version for UAC3 header validation CVE-2026-23318
VCID-1zbm-pnj5-xqb4 kernel: mptcp: pm: in-kernel: always mark signal+subflow endp as used CVE-2026-23321
VCID-1zkc-5ucw-e3et kernel: cpufreq: amd-pstate: add check for cpufreq_cpu_get&#39;s return value CVE-2024-50009
VCID-214g-9hfm-wqbk kernel: Linux kernel: Denial of Service due to memory leak in mlx5e driver CVE-2023-53999
VCID-2198-cz4u-87hu kernel: ksmbd: Compare MACs in constant time CVE-2026-23364
VCID-21fx-6crx-ske2 kernel: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer CVE-2024-49918
VCID-21jy-g45u-c7gp kernel: sched/deadline: Fix warning in migrate_enable for boosted tasks CVE-2024-56583
VCID-21z5-p9ct-p7g2 kernel: wifi: iwlwifi: fix debug actions order CVE-2025-38045
VCID-22zu-qy6y-aub1 In the Linux kernel, the following vulnerability has been resolved: media: as102: fix to not free memory after the device is registered in as102_usb_probe() In as102_usb driver, the following race condition occurs: ``` CPU0 CPU1 as102_usb_probe() kzalloc(); // alloc as102_dev_t .... usb_register_dev(); fd = sys_open("/path/to/dev"); // open as102 fd .... usb_deregister_dev(); .... kfree(); // free as102_dev_t .... sys_close(fd); as102_release() // UAF!! as102_usb_release() kfree(); // DFB!! ``` When a USB character device registered with usb_register_dev() is later unregistered (via usb_deregister_dev() or disconnect), the device node is removed so new open() calls fail. However, file descriptors that are already open do not go away immediately: they remain valid until the last reference is dropped and the driver's .release() is invoked. In as102, as102_usb_probe() calls usb_register_dev() and then, on an error path, does usb_deregister_dev() and frees as102_dev_t right away. If userspace raced a successful open() before the deregistration, that open FD will later hit as102_release() --> as102_usb_release() and access or free as102_dev_t again, occur a race to use-after-free and double-free vuln. The fix is to never kfree(as102_dev_t) directly once usb_register_dev() has succeeded. After deregistration, defer freeing memory to .release(). In other words, let release() perform the last kfree when the final open FD is closed. CVE-2026-31578
VCID-2369-8134-y3ck kernel: hisi_acc_vfio_pci: bugfix live migration function without VF device driver CVE-2025-38283
VCID-24dm-m1bk-t7fv In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: fix race condition in qman_destroy_fq When QMAN_FQ_FLAG_DYNAMIC_FQID is set, there's a race condition between fq_table[fq->idx] state and freeing/allocating from the pool and WARN_ON(fq_table[fq->idx]) in qman_create_fq() gets triggered. Indeed, we can have: Thread A Thread B qman_destroy_fq() qman_create_fq() qman_release_fqid() qman_shutdown_fq() gen_pool_free() -- At this point, the fqid is available again -- qman_alloc_fqid() -- so, we can get the just-freed fqid in thread B -- fq->fqid = fqid; fq->idx = fqid * 2; WARN_ON(fq_table[fq->idx]); fq_table[fq->idx] = fq; fq_table[fq->idx] = NULL; And adding some logs between qman_release_fqid() and fq_table[fq->idx] = NULL makes the WARN_ON() trigger a lot more. To prevent that, ensure that fq_table[fq->idx] is set to NULL before gen_pool_free() is called by using smp_wmb(). CVE-2026-23463
VCID-24gw-73zd-3khc kernel: ipv6: mcast: extend RCU protection in igmp6_send() CVE-2025-21759
VCID-25at-2je8-2ufj In the Linux kernel, the following vulnerability has been resolved: wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit wg_netns_pre_exit() manually acquires rtnl_lock() inside the pernet .pre_exit callback. This causes a hung task when another thread holds rtnl_mutex - the cleanup_net workqueue (or the setup_net failure rollback path) blocks indefinitely in wg_netns_pre_exit() waiting to acquire the lock. Convert to .exit_rtnl, introduced in commit 7a60d91c690b ("net: Add ->exit_rtnl() hook to struct pernet_operations."), where the framework already holds RTNL and batches all callbacks under a single rtnl_lock()/rtnl_unlock() pair, eliminating the contention window. The rcu_assign_pointer(wg->creating_net, NULL) is safe to move from .pre_exit to .exit_rtnl (which runs after synchronize_rcu()) because all RCU readers of creating_net either use maybe_get_net() - which returns NULL for a dying namespace with zero refcount - or access net->user_ns which remains valid throughout the entire ops_undo_list sequence. [ Jason: added __net_exit and __read_mostly annotations that were missing. ] CVE-2026-31579
VCID-25ja-vd4z-3ffc kernel: wifi: ath10k: shutdown driver when hardware is unreliable CVE-2025-39746
VCID-25nt-fa4m-97fm kernel: binfmt_misc: restore write access before closing files opened by open_exec() CVE-2025-68239
VCID-2bay-kzph-yya3 kernel: RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES CVE-2024-53094
VCID-2bbj-94mj-rfa7 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Do not skip unrelated mode changes in DSC validation Starting with commit 17ce8a6907f7 ("drm/amd/display: Add dsc pre-validation in atomic check"), amdgpu resets the CRTC state mode_changed flag to false when recomputing the DSC configuration results in no timing change for a particular stream. However, this is incorrect in scenarios where a change in MST/DSC configuration happens in the same KMS commit as another (unrelated) mode change. For example, the integrated panel of a laptop may be configured differently (e.g., HDR enabled/disabled) depending on whether external screens are attached. In this case, plugging in external DP-MST screens may result in the mode_changed flag being dropped incorrectly for the integrated panel if its DSC configuration did not change during precomputation in pre_validate_dsc(). At this point, however, dm_update_crtc_state() has already created new streams for CRTCs with DSC-independent mode changes. In turn, amdgpu_dm_commit_streams() will never release the old stream, resulting in a memory leak. amdgpu_dm_atomic_commit_tail() will never acquire a reference to the new stream either, which manifests as a use-after-free when the stream gets disabled later on: BUG: KASAN: use-after-free in dc_stream_release+0x25/0x90 [amdgpu] Write of size 4 at addr ffff88813d836524 by task kworker/9:9/29977 Workqueue: events drm_mode_rmfb_work_fn Call Trace: <TASK> dump_stack_lvl+0x6e/0xa0 print_address_description.constprop.0+0x88/0x320 ? dc_stream_release+0x25/0x90 [amdgpu] print_report+0xfc/0x1ff ? srso_alias_return_thunk+0x5/0xfbef5 ? __virt_addr_valid+0x225/0x4e0 ? dc_stream_release+0x25/0x90 [amdgpu] kasan_report+0xe1/0x180 ? dc_stream_release+0x25/0x90 [amdgpu] kasan_check_range+0x125/0x200 dc_stream_release+0x25/0x90 [amdgpu] dc_state_destruct+0x14d/0x5c0 [amdgpu] dc_state_release.part.0+0x4e/0x130 [amdgpu] dm_atomic_destroy_state+0x3f/0x70 [amdgpu] drm_atomic_state_default_clear+0x8ee/0xf30 ? drm_mode_object_put.part.0+0xb1/0x130 __drm_atomic_state_free+0x15c/0x2d0 atomic_remove_fb+0x67e/0x980 Since there is no reliable way of figuring out whether a CRTC has unrelated mode changes pending at the time of DSC validation, remember the value of the mode_changed flag from before the point where a CRTC was marked as potentially affected by a change in DSC configuration. Reset the mode_changed flag to this earlier value instead in pre_validate_dsc(). (cherry picked from commit cc7c7121ae082b7b82891baa7280f1ff2608f22b) CVE-2026-31488
VCID-2cky-e16g-yqgf In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Limit PTP to a single page Commit 391e69143d0a increased CT_PTP_NUM from 1 to 4 to support 256 playback streams, but the additional pages are not used by the card correctly. The CT20K2 hardware already has multiple VMEM_PTPAL registers, but using them separately would require refactoring the entire virtual memory allocation logic. ct_vm_map() always uses PTEs in vm->ptp[0].area regardless of CT_PTP_NUM. On AMD64 systems, a single PTP covers 512 PTEs (2M). When aggregate memory allocations exceed this limit, ct_vm_map() tries to access beyond the allocated space and causes a page fault: BUG: unable to handle page fault for address: ffffd4ae8a10a000 Oops: Oops: 0002 [#1] SMP PTI RIP: 0010:ct_vm_map+0x17c/0x280 [snd_ctxfi] Call Trace: atc_pcm_playback_prepare+0x225/0x3b0 ct_pcm_playback_prepare+0x38/0x60 snd_pcm_do_prepare+0x2f/0x50 snd_pcm_action_single+0x36/0x90 snd_pcm_action_nonatomic+0xbf/0xd0 snd_pcm_ioctl+0x28/0x40 __x64_sys_ioctl+0x97/0xe0 do_syscall_64+0x81/0x610 entry_SYSCALL_64_after_hwframe+0x76/0x7e Revert CT_PTP_NUM to 1. The 256 SRC_RESOURCE_NUM and playback_count remain unchanged. CVE-2026-31602
VCID-2cux-cw1j-43hw kernel: LoongArch: BPF: Fix off-by-one error in build_prologue() CVE-2025-37893
VCID-2cxv-ay17-4kh2 kernel: Linux kernel: Denial of Service due to sleepable page allocation in KASAN CVE-2025-38029
VCID-2dp8-mmkf-w7dx In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate EaNameLength in smb2_get_ea() smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length without verifying that the length of the name really is the size of the input buffer received. Fix this up by properly checking the size of the name based on the value received and the overall size of the request, to prevent a later strncmp() call to use the length as a "trusted" size of the buffer. Without this check, uninitialized heap values might be slowly leaked to the client. CVE-2026-31612
VCID-2e99-ge3p-13eq kernel: dm-raid: really frozen sync_thread during suspend CVE-2024-35794
VCID-2fsz-wcjz-9yer kernel: ice: Don't process extts if PTP is disabled CVE-2024-42107
VCID-2k4e-em5c-m3bv kernel: sysfs: check visibility before changing group attribute ownership CVE-2025-40355
VCID-2kan-b4em-f3fg kernel: drm/amdgpu: remove two invalid BUG_ON()s CVE-2025-68201
VCID-2kk2-cj4m-6ucm kernel: md: Don't ignore suspended array in md_check_recovery() CVE-2024-26758
VCID-2nz8-mxwk-dyfk kernel: platform/x86: x86-android-tablets: Unregister devices in reverse order CVE-2024-40975
VCID-2s7e-4bym-cbe1 kernel: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() CVE-2025-40261
VCID-2vqp-wpcw-pfbm kernel: bpf: Prevent tailcall infinite loop caused by freplace CVE-2024-47794
VCID-2wmk-4bjz-bbhh kernel: ksmbd: fix use-after-free in ksmbd_free_work_struct CVE-2025-21967
VCID-2xhv-1gcg-y3cs kernel: bpf: consider that tail calls invalidate packet pointers CVE-2024-58237
VCID-31cj-5nhu-4qa9 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIndex without any sort of validation. Fix this up by validating the number of endpoints actually match up with the number the device has before attempting to dereference a pointer based on this math. This is just like what was done in commit ee0d382feb44 ("usb: gadget: aspeed_udc: validate endpoint index for ast udc") for the aspeed driver. CVE-2026-31615
VCID-31hs-1pwx-7uak kernel: drm/amdkfd: debugfs hang_hws skip GPU with MES CVE-2025-37853
VCID-33re-7rh6-2bg4 kernel: net: add proper RCU protection to /proc/net/ptype CVE-2026-23255
VCID-341t-wy9a-p7fz kernel: btrfs: do not free data reservation in fallback from inline due to -ENOSPC CVE-2025-71269
VCID-348f-73cd-37h6 kernel: mm/huge_memory: avoid PMD-size page cache if needed CVE-2024-42317
VCID-34nt-cv4x-qbg4 In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto_skcipher_decrypt() succeeded. A malformed RESPONSE can therefore use a non-block-aligned ticket length, make the decrypt operation fail, and still drive the ticket parser with attacker-controlled bytes. Check the decrypt result and abort the connection with RXKADBADTICKET when ticket decryption fails. CVE-2026-31637
VCID-366p-rhcz-8kb6 kernel: Bluetooth: eir: Fix possible crashes on eir_create_adv_data CVE-2025-38303
VCID-37t1-1qg2-hqc4 CVE-2026-23414
VCID-38ja-dsj5-qyfc kernel: eBPF: insufficient stack type checks in dynptr CVE-2023-39191
VCID-3a8a-ns8q-wbgy kernel: drm/amd/display: Check null pointers before using them CVE-2024-49922
VCID-3aa5-4rp5-g7h3 kernel: Linux kernel: Memory Corruption and Kernel Crashes via IOMMU SVA coherency issue CVE-2025-71202
VCID-3ans-72mm-sfh1 In the Linux kernel, the following vulnerability has been resolved: spi: meson-spicc: Fix double-put in remove path meson_spicc_probe() registers the controller with devm_spi_register_controller(), so teardown already drops the controller reference via devm cleanup. Calling spi_controller_put() again in meson_spicc_remove() causes a double-put. CVE-2026-31489
VCID-3ay8-sdv3-3ydv In the Linux kernel, the following vulnerability has been resolved: tracing: Fix potential deadlock in cpu hotplug with osnoise The following sequence may leads deadlock in cpu hotplug: task1 task2 task3 ----- ----- ----- mutex_lock(&interface_lock) [CPU GOING OFFLINE] cpus_write_lock(); osnoise_cpu_die(); kthread_stop(task3); wait_for_completion(); osnoise_sleep(); mutex_lock(&interface_lock); cpus_read_lock(); [DEAD LOCK] Fix by swap the order of cpus_read_lock() and mutex_lock(&interface_lock). CVE-2026-31480
VCID-3bwh-381p-6qbh kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()' CVE-2024-26662
VCID-3ccs-8xaf-wfgw kernel: mm/filemap: skip to create PMD-sized page cache if needed CVE-2024-41031
VCID-3d8r-1n1k-skff kernel: io_uring: check for overflows in io_pin_pages CVE-2024-53187
VCID-3eb4-ca4c-5qf7 kernel: bpf: Fix kmemleak warning for percpu hashmap CVE-2025-37807
VCID-3fpy-fq8u-r3gb kernel: jfs: add check read-only before txBeginAnon() call CVE-2024-58095
VCID-3jmx-jfhk-yqh5 kernel: usb: gadget: f_ncm: align net_device lifecycle with bind/unbind CVE-2026-23320
VCID-3kg4-jbwg-zffk kernel: spi: fix statistics allocation CVE-2026-23475
VCID-3km6-xsxg-4bcr CVE-2026-31426
VCID-3ktq-cbhp-8fhb kernel: Linux kernel: Denial of Service in NVMe driver due to use-after-free vulnerability CVE-2025-68265
VCID-3mhu-519z-pbck CVE-2026-31685
VCID-3ng4-wb1y-wyem CVE-2026-23422
VCID-3p2d-np1n-p3gv kernel: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads CVE-2025-37833
VCID-3pv5-s5r1-vkdg Linux kernel: nfnetlink_osf: Linux kernel: Denial of Service in nfnetlink_osf via crafted network packets CVE-2026-23397
VCID-3qmn-b1w4-jkg4 In the Linux kernel, the following vulnerability has been resolved: fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO Much like commit 19f953e74356 ("fbdev: fb_pm2fb: Avoid potential divide by zero error"), we also need to prevent that same crash from happening in the udlfb driver as it uses pixclock directly when dividing, which will crash. CVE-2026-31605
VCID-3r34-452w-skc2 In the Linux kernel, the following vulnerability has been resolved: KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish Lock all vCPUs when synchronizing and encrypting VMSAs for SNP guests, as allowing userspace to manipulate and/or run a vCPU while its state is being synchronized would at best corrupt vCPU state, and at worst crash the host kernel. Opportunistically assert that vcpu->mutex is held when synchronizing its VMSA (the SEV-ES path already locks vCPUs). CVE-2026-31591
VCID-3tns-khmb-aqbn In the Linux kernel, the following vulnerability has been resolved: xfs: avoid dereferencing log items after push callbacks After xfsaild_push_item() calls iop_push(), the log item may have been freed if the AIL lock was dropped during the push. Background inode reclaim or the dquot shrinker can free the log item while the AIL lock is not held, and the tracepoints in the switch statement dereference the log item after iop_push() returns. Fix this by capturing the log item type, flags, and LSN before calling xfsaild_push_item(), and introducing a new xfs_ail_push_class trace event class that takes these pre-captured values and the ailp pointer instead of the log item pointer. CVE-2026-31453
VCID-3vk2-4sx1-aybu kernel: video/aperture: optionally match the device in sysfb_disable() CVE-2024-46698
VCID-3yg6-7zfv-gkaq kernel: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket CVE-2024-53168
VCID-3yzs-sjd2-53d7 kernel: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them CVE-2026-23382
VCID-3z2m-anud-zubb In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix NULL-deref on disconnect Make sure to deregister the controller before dropping the reference to the driver data on disconnect to avoid NULL-pointer dereferences or use-after-free. CVE-2026-31651
VCID-4399-j8sn-t3b1 kernel: bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded CVE-2026-23310
VCID-45qm-naju-pycn kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE CVE-2024-38564
VCID-46pr-2cfb-mbhn In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: add missing return after LLCP_CLOSED checks In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket state is LLCP_CLOSED, the code correctly calls release_sock() and nfc_llcp_sock_put() but fails to return. Execution falls through to the remainder of the function, which calls release_sock() and nfc_llcp_sock_put() again. This results in a double release_sock() and a refcount underflow via double nfc_llcp_sock_put(), leading to a use-after-free. Add the missing return statements after the LLCP_CLOSED branches in both functions to prevent the fall-through. CVE-2026-31629
VCID-47k1-5vw2-97hy kernel: drm/msm/dpu: Add callback function pointer check before its call CVE-2024-38622
VCID-4bsb-hypz-5bav kernel: drm/amd/display: fix NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini() CVE-2024-27041
VCID-4e1f-qvnx-87fc In the Linux kernel, the following vulnerability has been resolved: KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock Take and hold kvm->lock for before checking sev_guest() in sev_mem_enc_register_region(), as sev_guest() isn't stable unless kvm->lock is held (or KVM can guarantee KVM_SEV_INIT{2} has completed and can't rollack state). If KVM_SEV_INIT{2} fails, KVM can end up trying to add to a not-yet-initialized sev->regions_list, e.g. triggering a #GP Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 110 UID: 0 PID: 72717 Comm: syz.15.11462 Tainted: G U W O 6.16.0-smp-DEV #1 NONE Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 12.52.0-0 10/28/2024 RIP: 0010:sev_mem_enc_register_region+0x3f0/0x4f0 ../include/linux/list.h:83 Code: <41> 80 3c 04 00 74 08 4c 89 ff e8 f1 c7 a2 00 49 39 ed 0f 84 c6 00 RSP: 0018:ffff88838647fbb8 EFLAGS: 00010256 RAX: dffffc0000000000 RBX: 1ffff92015cf1e0b RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000001000 RDI: ffff888367870000 RBP: ffffc900ae78f050 R08: ffffea000d9e0007 R09: 1ffffd4001b3c000 R10: dffffc0000000000 R11: fffff94001b3c001 R12: 0000000000000000 R13: ffff8982ab0bde00 R14: ffffc900ae78f058 R15: 0000000000000000 FS: 00007f34e9dc66c0(0000) GS:ffff89ee64d33000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe180adef98 CR3: 000000047210e000 CR4: 0000000000350ef0 Call Trace: <TASK> kvm_arch_vm_ioctl+0xa72/0x1240 ../arch/x86/kvm/x86.c:7371 kvm_vm_ioctl+0x649/0x990 ../virt/kvm/kvm_main.c:5363 __se_sys_ioctl+0x101/0x170 ../fs/ioctl.c:51 do_syscall_x64 ../arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x6f/0x1f0 ../arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f34e9f7e9a9 Code: <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f34e9dc6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f34ea1a6080 RCX: 00007f34e9f7e9a9 RDX: 0000200000000280 RSI: 000000008010aebb RDI: 0000000000000007 RBP: 00007f34ea000d69 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f34ea1a6080 R15: 00007ffce77197a8 </TASK> with a syzlang reproducer that looks like: syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000040)={0x0, &(0x7f0000000180)=ANY=[], 0x70}) (async) syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="..."], 0x4f}) (async) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r3, 0xc008aeba, &(0x7f0000000040)={0x1, 0x8, 0x0, 0x5625e9b0}) (async) ioctl$KVM_SET_PIT2(r3, 0x8010aebb, &(0x7f0000000280)={[...], 0x5}) (async) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, 0x0) (async) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) (async) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) close(r0) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) (async) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f0000000300)={0x4376ea830d46549b, 0x0, [0x46, 0x0, 0x0, 0x0, 0x0, 0x1000]}) (async) ioctl$KVM_RUN(r5, 0xae80, 0x0) Opportunistically use guard() to avoid having to define a new error label and goto usage. CVE-2026-31592
VCID-4ebq-x7rk-4ya3 kernel: wifi: wilc1000: avoid buffer overflow in WID string configuration CVE-2025-39952
VCID-4eg9-yh2g-a7gc kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray CVE-2024-42243
VCID-4fhj-v5ut-eubv kernel: mm/hugetlb: fix hugetlb_pmd_shared() CVE-2026-23100
VCID-4g8h-bz4a-uydk In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial OOB in get_file_all_info() for compound requests When a compound request consists of QUERY_DIRECTORY + QUERY_INFO (FILE_ALL_INFORMATION) and the first command consumes nearly the entire max_trans_size, get_file_all_info() would blindly call smbConvertToUTF16() with PATH_MAX, causing out-of-bounds write beyond the response buffer. In get_file_all_info(), there was a missing validation check for the client-provided OutputBufferLength before copying the filename into FileName field of the smb2_file_all_info structure. If the filename length exceeds the available buffer space, it could lead to potential buffer overflows or memory corruption during smbConvertToUTF16 conversion. This calculating the actual free buffer size using smb2_calc_max_out_buf_len() and returning -EINVAL if the buffer is insufficient and updating smbConvertToUTF16 to use the actual filename length (clamped by PATH_MAX) to ensure a safe copy operation. CVE-2026-31433
VCID-4ghv-w1sg-77hu kernel: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using CVE-2025-38369
VCID-4gup-x2rj-w3bq In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix deadlock during netdev reset with active connections Resolve deadlock that occurs when user executes netdev reset while RDMA applications (e.g., rping) are active. The netdev reset causes ice driver to remove irdma auxiliary driver, triggering device_delete and subsequent client removal. During client removal, uverbs_client waits for QP reference count to reach zero while cma_client holds the final reference, creating circular dependency and indefinite wait in iWARP mode. Skip QP reference count wait during device reset to prevent deadlock. CVE-2026-31565
VCID-4jvb-unxd-3qg3 CVE-2026-31423
VCID-4kbk-38g4-6kb7 kernel: bpf, lsm: Add check for BPF LSM return value CVE-2024-47703
VCID-4mqx-42ea-53c3 kernel: f2fs: fix to bail out in get_new_segment() CVE-2025-38333
VCID-4n9m-77qv-fuaa kernel: iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection CVE-2025-71198
VCID-4nrq-2zch-8uct kernel: riscv: stacktrace: Disable KASAN checks for non-current tasks CVE-2025-40358
VCID-4qwu-fw8y-t7et kernel: jfs: Fix null-ptr-deref in jfs_ioc_trim CVE-2025-38203
VCID-4qx6-ysye-efhu kernel: accel/habanalabs: postpone mem_mgr IDR destruction to hpriv_release() CVE-2023-53353
VCID-4s4m-bf1u-tyht kernel: nvme-pci: fix race condition between reset and nvme_dev_disable() CVE-2024-50135
VCID-4spt-a3n7-z7fu kernel: Linux kernel: Denial of Service due to missing power management handler for AMD Van Gogh SoC CVE-2025-68334
VCID-4t4h-a2xy-h7bg kernel: drm/amd/display: Add a dc_state NULL check in dc_state_release CVE-2024-26948
VCID-4uvy-ga5j-a7g3 kernel: spi: lpspi: Avoid potential use-after-free in probe() CVE-2024-26866
VCID-4v3t-8s2w-rfbg In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Use scratch field in MMIO fragment to hold small write values When exiting to userspace to service an emulated MMIO write, copy the to-be-written value to a scratch field in the MMIO fragment if the size of the data payload is 8 bytes or less, i.e. can fit in a single chunk, instead of pointing the fragment directly at the source value. This fixes a class of use-after-free bugs that occur when the emulator initiates a write using an on-stack, local variable as the source, the write splits a page boundary, *and* both pages are MMIO pages. Because KVM's ABI only allows for physically contiguous MMIO requests, accesses that split MMIO pages are separated into two fragments, and are sent to userspace one at a time. When KVM attempts to complete userspace MMIO in response to KVM_RUN after the first fragment, KVM will detect the second fragment and generate a second userspace exit, and reference the on-stack variable. The issue is most visible if the second KVM_RUN is performed by a separate task, in which case the stack of the initiating task can show up as truly freed data. ================================================================== BUG: KASAN: use-after-free in complete_emulated_mmio+0x305/0x420 Read of size 1 at addr ffff888009c378d1 by task syz-executor417/984 CPU: 1 PID: 984 Comm: syz-executor417 Not tainted 5.10.0-182.0.0.95.h2627.eulerosv2r13.x86_64 #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack+0xbe/0xfd print_address_description.constprop.0+0x19/0x170 __kasan_report.cold+0x6c/0x84 kasan_report+0x3a/0x50 check_memory_region+0xfd/0x1f0 memcpy+0x20/0x60 complete_emulated_mmio+0x305/0x420 kvm_arch_vcpu_ioctl_run+0x63f/0x6d0 kvm_vcpu_ioctl+0x413/0xb20 __se_sys_ioctl+0x111/0x160 do_syscall_64+0x30/0x40 entry_SYSCALL_64_after_hwframe+0x67/0xd1 RIP: 0033:0x42477d Code: <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007faa8e6890e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00000000004d7338 RCX: 000000000042477d RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 RBP: 00000000004d7330 R08: 00007fff28d546df R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004d733c R13: 0000000000000000 R14: 000000000040a200 R15: 00007fff28d54720 The buggy address belongs to the page: page:0000000029f6a428 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9c37 flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) raw: 000fffffc0000000 0000000000000000 ffffea0000270dc8 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888009c37780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888009c37800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888009c37880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888009c37900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888009c37980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== The bug can also be reproduced with a targeted KVM-Unit-Test by hacking KVM to fill a large on-stack variable in complete_emulated_mmio(), i.e. by overwrite the data value with garbage. Limit the use of the scratch fields to 8-byte or smaller accesses, and to just writes, as larger accesses and reads are not affected thanks to implementation details in the emulator, but add a sanity check to ensure those details don't change in the future. Specifically, KVM never uses on-stack variables for accesses larger that 8 bytes, e.g. uses an operand in the emulator context, and *al ---truncated--- CVE-2026-31588
VCID-4vs9-vhrd-zfgn kernel: jfs: add check read-only before truncation in jfs_truncate_nolock() CVE-2024-58094
VCID-4wyy-uw7z-5be9 kernel: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work CVE-2025-40003
VCID-5agv-svfz-pqcv CVE-2026-31678
VCID-5ahq-saw1-suf1 CVE-2026-31420
VCID-5b4f-sket-kuge kernel: f2fs: quota: fix to avoid warning in dquot_writeback_dquots() CVE-2025-23132
VCID-5ehk-s7ww-vfc7 kernel: platform/x86: think-lmi: Fix password opcode ordering for workstations CVE-2024-26836
VCID-5eks-kg2z-5ye1 In the Linux kernel, the following vulnerability has been resolved: drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug When trying to do a rather aggressive test of igt's "xe_module_load --r reload" with a full desktop environment and game running I noticed a few OOPSes when dereferencing freed pointers, related to framebuffers and property blobs after the compositor exits. Solve this by guarding the freeing in drm_file with drm_dev_enter/exit, and immediately put the references from struct drm_file objects during drm_dev_unplug(). Related warnings for framebuffers on the subtest: [ 739.713076] ------------[ cut here ]------------ WARN_ON(!list_empty(&dev->mode_config.fb_list)) [ 739.713079] WARNING: drivers/gpu/drm/drm_mode_config.c:584 at drm_mode_config_cleanup+0x30b/0x320 [drm], CPU#12: xe_module_load/13145 .... [ 739.713328] Call Trace: [ 739.713330] <TASK> [ 739.713335] ? intel_pmdemand_destroy_state+0x11/0x20 [xe] [ 739.713574] ? intel_atomic_global_obj_cleanup+0xe4/0x1a0 [xe] [ 739.713794] intel_display_driver_remove_noirq+0x51/0xb0 [xe] [ 739.714041] xe_display_fini_early+0x33/0x50 [xe] [ 739.714284] devm_action_release+0xf/0x20 [ 739.714294] devres_release_all+0xad/0xf0 [ 739.714301] device_unbind_cleanup+0x12/0xa0 [ 739.714305] device_release_driver_internal+0x1b7/0x210 [ 739.714311] device_driver_detach+0x14/0x20 [ 739.714315] unbind_store+0xa6/0xb0 [ 739.714319] drv_attr_store+0x21/0x30 [ 739.714322] sysfs_kf_write+0x48/0x60 [ 739.714328] kernfs_fop_write_iter+0x16b/0x240 [ 739.714333] vfs_write+0x266/0x520 [ 739.714341] ksys_write+0x72/0xe0 [ 739.714345] __x64_sys_write+0x19/0x20 [ 739.714347] x64_sys_call+0xa15/0xa30 [ 739.714355] do_syscall_64+0xd8/0xab0 [ 739.714361] entry_SYSCALL_64_after_hwframe+0x4b/0x53 and [ 739.714459] ------------[ cut here ]------------ [ 739.714461] xe 0000:67:00.0: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 739.714464] WARNING: drivers/gpu/drm/drm_framebuffer.c:833 at drm_framebuffer_free+0x6c/0x90 [drm], CPU#12: xe_module_load/13145 [ 739.714715] RIP: 0010:drm_framebuffer_free+0x7a/0x90 [drm] ... [ 739.714869] Call Trace: [ 739.714871] <TASK> [ 739.714876] drm_mode_config_cleanup+0x26a/0x320 [drm] [ 739.714998] ? __drm_printfn_seq_file+0x20/0x20 [drm] [ 739.715115] ? drm_mode_config_cleanup+0x207/0x320 [drm] [ 739.715235] intel_display_driver_remove_noirq+0x51/0xb0 [xe] [ 739.715576] xe_display_fini_early+0x33/0x50 [xe] [ 739.715821] devm_action_release+0xf/0x20 [ 739.715828] devres_release_all+0xad/0xf0 [ 739.715843] device_unbind_cleanup+0x12/0xa0 [ 739.715850] device_release_driver_internal+0x1b7/0x210 [ 739.715856] device_driver_detach+0x14/0x20 [ 739.715860] unbind_store+0xa6/0xb0 [ 739.715865] drv_attr_store+0x21/0x30 [ 739.715868] sysfs_kf_write+0x48/0x60 [ 739.715873] kernfs_fop_write_iter+0x16b/0x240 [ 739.715878] vfs_write+0x266/0x520 [ 739.715886] ksys_write+0x72/0xe0 [ 739.715890] __x64_sys_write+0x19/0x20 [ 739.715893] x64_sys_call+0xa15/0xa30 [ 739.715900] do_syscall_64+0xd8/0xab0 [ 739.715905] entry_SYSCALL_64_after_hwframe+0x4b/0x53 and then finally file close blows up: [ 743.186530] Oops: general protection fault, probably for non-canonical address 0xdead000000000122: 0000 [#1] SMP [ 743.186535] CPU: 3 UID: 1000 PID: 3453 Comm: kwin_wayland Tainted: G W 7.0.0-rc1-valkyria+ #110 PREEMPT_{RT,(lazy)} [ 743.186537] Tainted: [W]=WARN [ 743.186538] Hardware name: Gigabyte Technology Co., Ltd. X299 AORUS Gaming 3/X299 AORUS Gaming 3-CF, BIOS F8n 12/06/2021 [ 743.186539] RIP: 0010:drm_framebuffer_cleanup+0x55/0xc0 [drm] [ 743.186588] Code: d8 72 73 0f b6 42 05 ff c3 39 c3 72 e8 49 8d bd 50 07 00 00 31 f6 e8 3a 80 d3 e1 49 8b 44 24 10 49 8d 7c 24 08 49 8b 54 24 08 <48> 3b 38 0f 85 95 7f 02 00 48 3b 7a 08 0f 85 8b 7f 02 00 48 89 42 [ 743.186589] RSP: 0018:ffffc900085e3cf8 EFLAGS: 00 ---truncated--- CVE-2026-23471
VCID-5g2a-qj5r-uub4 kernel: wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() CVE-2026-23336
VCID-5gv4-c26w-gube kernel: drm/amd/display: Fix null pointer deref in dcn20_resource.c CVE-2024-43899
VCID-5gz4-1ysh-2qf7 kernel: net: ena: Add validation for completion descriptors consistency CVE-2024-40999
VCID-5hdv-pgsr-cfbm kernel: bpf: Guard stack limits against 32bit overflow CVE-2023-52676
VCID-5hrr-xvrw-ebd9 kernel: mm/shmem: disable PMD-sized page cache if needed CVE-2024-42241
VCID-5j3a-r6pk-2kdb kernel: ALSA: hda: Fix missing pointer check in hda_component_manager_init function CVE-2025-40097
VCID-5kdh-vgcu-kkf3 In the Linux kernel, the following vulnerability has been resolved: af_key: validate families in pfkey_send_migrate() syzbot was able to trigger a crash in skb_put() [1] Issue is that pfkey_send_migrate() does not check old/new families, and that set_ipsecrequest() @family argument was truncated, thus possibly overfilling the skb. Validate families early, do not wait set_ipsecrequest(). [1] skbuff: skb_over_panic: text:ffffffff8a752120 len:392 put:16 head:ffff88802a4ad040 data:ffff88802a4ad040 tail:0x188 end:0x180 dev:<NULL> kernel BUG at net/core/skbuff.c:214 ! Call Trace: <TASK> skb_over_panic net/core/skbuff.c:219 [inline] skb_put+0x159/0x210 net/core/skbuff.c:2655 skb_put_zero include/linux/skbuff.h:2788 [inline] set_ipsecrequest net/key/af_key.c:3532 [inline] pfkey_send_migrate+0x1270/0x2e50 net/key/af_key.c:3636 km_migrate+0x155/0x260 net/xfrm/xfrm_state.c:2848 xfrm_migrate+0x2140/0x2450 net/xfrm/xfrm_policy.c:4705 xfrm_do_migrate+0x8ff/0xaa0 net/xfrm/xfrm_user.c:3150 CVE-2026-31515
VCID-5kq4-sz23-ekey In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix call removal to use RCU safe deletion Fix rxrpc call removal from the rxnet->calls list to use list_del_rcu() rather than list_del_init() to prevent stuffing up reading /proc/net/rxrpc/calls from potentially getting into an infinite loop. This, however, means that list_empty() no longer works on an entry that's been deleted from the list, making it harder to detect prior deletion. Fix this by: Firstly, make rxrpc_destroy_all_calls() only dump the first ten calls that are unexpectedly still on the list. Limiting the number of steps means there's no need to call cond_resched() or to remove calls from the list here, thereby eliminating the need for rxrpc_put_call() to check for that. rxrpc_put_call() can then be fixed to unconditionally delete the call from the list as it is the only place that the deletion occurs. CVE-2026-31642
VCID-5nsy-fndc-7ka8 kernel: tty: n_gsm: Don't block input queue by waiting MSC CVE-2025-40071
VCID-5v5u-d5mg-53bv kernel: net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup() CVE-2026-23284
VCID-5vkh-dbsm-vbgu In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix device leak on probe failure Driver core holds a reference to the USB interface and its parent USB device while the interface is bound to a driver and there is no need to take additional references unless the structures are needed after disconnect. This driver takes a reference to the USB device during probe but does not to release it on all probe errors (e.g. when descriptor parsing fails). Drop the redundant device reference to fix the leak, reduce cargo culting, make it easier to spot drivers where an extra reference is needed, and reduce the risk of further memory leaks. CVE-2026-31604
VCID-5wr6-yach-7fbf kernel: crypto: stm32/cryp - call finalize with bh disabled CVE-2024-47658
VCID-5yp2-meun-zbas kernel: ax25: fix use-after-free bugs caused by ax25_ds_del_timer CVE-2024-35887
VCID-5zuy-q1p8-hqex kernel: coresight: Fix memory leak in acpi_buffer->pointer CVE-2023-53261
VCID-61t7-s6qz-mfcf kernel: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM CVE-2025-40289
VCID-63m2-phjq-kuav kernel: RISC-V: KVM: Write hgatp register with valid mode bits CVE-2025-40065
VCID-64g2-43qf-5qg1 kernel: ksmbd: fix overflow in dacloffset bounds check CVE-2025-22039
VCID-651u-f45c-57de In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: clamp SCO altsetting table indices btusb_work() maps the number of active SCO links to USB alternate settings through a three-entry lookup table when CVSD traffic uses transparent voice settings. The lookup currently indexes alts[] with data->sco_num - 1 without first constraining sco_num to the number of available table entries. While the table only defines alternate settings for up to three SCO links, data->sco_num comes from hci_conn_num() and is used directly. Cap the lookup to the last table entry before indexing it so the driver keeps selecting the highest supported alternate setting without reading past alts[]. CVE-2026-31497
VCID-656s-tkaz-m7bj In the Linux kernel, the following vulnerability has been resolved: KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU Reject synchronizing vCPU state to its associated VMSA if the vCPU has already been launched, i.e. if the VMSA has already been encrypted. On a host with SNP enabled, accessing guest-private memory generates an RMP #PF and panics the host. BUG: unable to handle page fault for address: ff1276cbfdf36000 #PF: supervisor write access in kernel mode #PF: error_code(0x80000003) - RMP violation PGD 5a31801067 P4D 5a31802067 PUD 40ccfb5063 PMD 40e5954063 PTE 80000040fdf36163 SEV-SNP: PFN 0x40fdf36, RMP entry: [0x6010fffffffff001 - 0x000000000000001f] Oops: Oops: 0003 [#1] SMP NOPTI CPU: 33 UID: 0 PID: 996180 Comm: qemu-system-x86 Tainted: G OE Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: Dell Inc. PowerEdge R7625/0H1TJT, BIOS 1.5.8 07/21/2023 RIP: 0010:sev_es_sync_vmsa+0x54/0x4c0 [kvm_amd] Call Trace: <TASK> snp_launch_update_vmsa+0x19d/0x290 [kvm_amd] snp_launch_finish+0xb6/0x380 [kvm_amd] sev_mem_enc_ioctl+0x14e/0x720 [kvm_amd] kvm_arch_vm_ioctl+0x837/0xcf0 [kvm] kvm_vm_ioctl+0x3fd/0xcc0 [kvm] __x64_sys_ioctl+0xa3/0x100 x64_sys_call+0xfe0/0x2350 do_syscall_64+0x81/0x10f0 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7ffff673287d </TASK> Note, the KVM flaw has been present since commit ad73109ae7ec ("KVM: SVM: Provide support to launch and run an SEV-ES guest"), but has only been actively dangerous for the host since SNP support was added. With SEV-ES, KVM would "just" clobber guest state, which is totally fine from a host kernel perspective since userspace can clobber guest state any time before sev_launch_update_vmsa(). CVE-2026-31593
VCID-687u-nzmt-n7a6 kernel: ila: serialize calls to nf_register_net_hooks() CVE-2024-57900
VCID-6c3x-q991-5uh7 kernel: net: enetc: allocate vf_state during PF probes CVE-2024-50298
VCID-6cqc-um2d-1kfk kernel: wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() CVE-2026-23315
VCID-6ejs-59g2-xkgg kernel: drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities CVE-2025-39707
VCID-6hf1-vsj3-a3h5 kernel: drm/msm: Add error handling for krealloc in metadata setup CVE-2025-39747
VCID-6hur-ug1s-83am In the Linux kernel, the following vulnerability has been resolved: serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN uart_write_room() and uart_write() behave inconsistently when xmit_buf is NULL (which happens for PORT_UNKNOWN ports that were never properly initialized): - uart_write_room() returns kfifo_avail() which can be > 0 - uart_write() checks xmit_buf and returns 0 if NULL This inconsistency causes an infinite loop in drivers that rely on tty_write_room() to determine if they can write: while (tty_write_room(tty) > 0) { written = tty->ops->write(...); // written is always 0, loop never exits } For example, caif_serial's handle_tx() enters an infinite loop when used with PORT_UNKNOWN serial ports, causing system hangs. Fix by making uart_write_room() also check xmit_buf and return 0 if it's NULL, consistent with uart_write(). Reproducer: https://gist.github.com/mrpre/d9a694cc0e19828ee3bc3b37983fde13 CVE-2026-23472
VCID-6jzb-qp5p-47ex kernel: wifi: ath11k: fix RCU stall while reaping monitor destination ring CVE-2024-58097
VCID-6n32-z9u6-gfch kernel: f2fs: fix to truncate first page in error path of f2fs_truncate() CVE-2025-40137
VCID-6pmw-nqja-affb kernel: wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path CVE-2025-23129
VCID-6r1j-pnmx-mkdm kernel: Linux Kernel: Denial of Service in iwlwifi due to improper firmware error handling CVE-2025-38096
VCID-6r4x-xaaf-b7ft kernel: drm/scheduler: signal scheduled fence when kill job CVE-2025-38436
VCID-6syp-3js8-qudn kernel: spi: fsl-qspi: use devm function instead of driver remove CVE-2025-37842
VCID-6tb9-nnj3-57gv kernel: drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() CVE-2024-35951
VCID-6uka-tgq1-gfb6 In the Linux kernel, the following vulnerability has been resolved: s390/mm: Add missing secure storage access fixups for donated memory There are special cases where secure storage access exceptions happen in a kernel context for pages that don't have the PG_arch_1 bit set. That bit is set for non-exported guest secure storage (memory) but is absent on storage donated to the Ultravisor since the kernel isn't allowed to export donated pages. Prior to this patch we would try to export the page by calling arch_make_folio_accessible() which would instantly return since the arch bit is absent signifying that the page was already exported and no further action is necessary. This leads to secure storage access exception loops which can never be resolved. With this patch we unconditionally try to export and if that fails we fixup. CVE-2026-31568
VCID-6vtw-v3u5-buce CVE-2026-31677
VCID-6wrr-yr71-xuhk kernel: tcp: secure_seq: add back ports to TS offset CVE-2026-23247
VCID-6xv7-46du-f7ha In the Linux kernel, the following vulnerability has been resolved: can: gw: fix OOB heap access in cgw_csum_crc8_rel() cgw_csum_crc8_rel() correctly computes bounds-safe indices via calc_idx(): int from = calc_idx(crc8->from_idx, cf->len); int to = calc_idx(crc8->to_idx, cf->len); int res = calc_idx(crc8->result_idx, cf->len); if (from < 0 || to < 0 || res < 0) return; However, the loop and the result write then use the raw s8 fields directly instead of the computed variables: for (i = crc8->from_idx; ...) /* BUG: raw negative index */ cf->data[crc8->result_idx] = ...; /* BUG: raw negative index */ With from_idx = to_idx = result_idx = -64 on a 64-byte CAN FD frame, calc_idx(-64, 64) = 0 so the guard passes, but the loop iterates with i = -64, reading cf->data[-64], and the write goes to cf->data[-64]. This write might end up to 56 (7.0-rc) or 40 (<= 6.19) bytes before the start of the canfd_frame on the heap. The companion function cgw_csum_xor_rel() uses `from`/`to`/`res` correctly throughout; fix cgw_csum_crc8_rel() to match. Confirmed with KASAN on linux-7.0-rc2: BUG: KASAN: slab-out-of-bounds in cgw_csum_crc8_rel+0x515/0x5b0 Read of size 1 at addr ffff8880076619c8 by task poc_cgw_oob/62 To configure the can-gw crc8 checksums CAP_NET_ADMIN is needed. CVE-2026-31570
VCID-71m1-rn5c-k3hm kernel: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects CVE-2025-39850
VCID-724j-jc6b-5uba kernel: block: fix resource leak in blk_register_queue() error path CVE-2025-37980
VCID-72pd-9p33-9qhg kernel: ceph: fix race condition validating r_parent before applying state CVE-2025-39927
VCID-73mg-3qys-3ubr kernel: ice: fix Tx scheduler error handling in XDP callback CVE-2025-38127
VCID-76zh-5x51-kffx kernel: fs/ntfs3: cancle set bad inode after removing name fails CVE-2025-38615
VCID-7892-zv3s-xqhu kernel: Linux kernel: Denial of Service in netfilter due to integer overflow CVE-2025-38162
VCID-798e-hc82-7qcv kernel: udp: Deal with race between UDP socket address change and rehash CVE-2024-57974
VCID-7b27-phbd-fqbq In the Linux kernel, the following vulnerability has been resolved: spi: spi-fsl-lpspi: fix teardown order issue (UAF) There is a teardown order issue in the driver. The SPI controller is registered using devm_spi_register_controller(), which delays unregistration of the SPI controller until after the fsl_lpspi_remove() function returns. As the fsl_lpspi_remove() function synchronously tears down the DMA channels, a running SPI transfer triggers the following NULL pointer dereference due to use after free: | fsl_lpspi 42550000.spi: I/O Error in DMA RX | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [...] | Call trace: | fsl_lpspi_dma_transfer+0x260/0x340 [spi_fsl_lpspi] | fsl_lpspi_transfer_one+0x198/0x448 [spi_fsl_lpspi] | spi_transfer_one_message+0x49c/0x7c8 | __spi_pump_transfer_message+0x120/0x420 | __spi_sync+0x2c4/0x520 | spi_sync+0x34/0x60 | spidev_message+0x20c/0x378 [spidev] | spidev_ioctl+0x398/0x750 [spidev] [...] Switch from devm_spi_register_controller() to spi_register_controller() in fsl_lpspi_probe() and add the corresponding spi_unregister_controller() in fsl_lpspi_remove(). CVE-2026-31485
VCID-7dx8-ys84-zuac kernel: clk: sunxi-ng: h616: Reparent GPU clock during frequency changes CVE-2025-38041
VCID-7eh9-dqkv-j3bm kernel: dmaengine: ti: k3-udma-glue: Drop skip_fdq argument from k3_udma_glue_reset_rx_chn CVE-2025-38042
VCID-7ejt-hdra-93ez kernel: blk-mq: fix tags leak when shrink nr_hw_queues CVE-2023-54227
VCID-7ey4-wrhk-zfce kernel: coresight: holding cscfg_csdev_lock while removing cscfg from csdev CVE-2025-38132
VCID-7fcn-v6b9-yber kernel: riscv: Fix IPIs usage in kfence_protect_page() CVE-2024-53687
VCID-7fke-ahd3-e7ac kernel: Bluetooth: hci_conn: Use disable_delayed_work_sync CVE-2024-56591
VCID-7fmr-tj7p-4uap In the Linux kernel, the following vulnerability has been resolved: spi: spi-dw-dma: fix print error log when wait finish transaction If an error occurs, the device may not have a current message. In this case, the system will crash. In this case, it's better to use dev from the struct ctlr (struct spi_controller*). CVE-2026-31560
VCID-7gw9-7kbs-2uh2 kernel: landlock: Fix handling of disconnected directories CVE-2025-68736
VCID-7hpf-k162-1ubu kernel: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv CVE-2026-23035
VCID-7hxb-dbmf-nufr kernel: vfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages() CVE-2024-56742
VCID-7j8j-s3am-6bgv kernel: Linux kernel: Denial of Service via double-increment of reference count in netfilter CVE-2025-39764
VCID-7kxd-yjnx-m7f2 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb Before using sk pointer, check if it is null. Fix the following: KASAN: null-ptr-deref in range [0x0000000000000260-0x0000000000000267] CPU: 0 UID: 0 PID: 5985 Comm: kworker/0:5 Not tainted 7.0.0-rc4-00029-ga989fde763f4 #1 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-9.fc43 06/10/2025 Workqueue: events l2cap_info_timeout RIP: 0010:kasan_byte_accessible+0x12/0x30 Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cce veth0_macvtap: entered promiscuous mode RSP: 0018:ffffc90006e0f808 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffffff89746018 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff89746018 RDI: 000000000000004c RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffffff8aae3e70 R12: 0000000000000000 R13: 0000000000000260 R14: 0000000000000260 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880983c2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005582615a5008 CR3: 000000007007e000 CR4: 0000000000752ef0 PKRU: 55555554 Call Trace: <TASK> __kasan_check_byte+0x12/0x40 lock_acquire+0x79/0x2e0 lock_sock_nested+0x48/0x100 ? l2cap_sock_ready_cb+0x46/0x160 l2cap_sock_ready_cb+0x46/0x160 l2cap_conn_start+0x779/0xff0 ? __pfx_l2cap_conn_start+0x10/0x10 ? l2cap_info_timeout+0x60/0xa0 ? __pfx___mutex_lock+0x10/0x10 l2cap_info_timeout+0x68/0xa0 ? process_scheduled_works+0xa8d/0x18c0 process_scheduled_works+0xb6e/0x18c0 ? __pfx_process_scheduled_works+0x10/0x10 ? assign_work+0x3d5/0x5e0 worker_thread+0xa53/0xfc0 kthread+0x388/0x470 ? __pfx_worker_thread+0x10/0x10 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x51e/0xb90 ? __pfx_ret_from_fork+0x10/0x10 veth1_macvtap: entered promiscuous mode ? __switch_to+0xc7d/0x1450 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK> Modules linked in: ---[ end trace 0000000000000000 ]--- batman_adv: batadv0: Interface activated: batadv_slave_0 batman_adv: batadv0: Interface activated: batadv_slave_1 netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 RIP: 0010:kasan_byte_accessible+0x12/0x30 Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cce ieee80211 phy39: Selected rate control algorithm 'minstrel_ht' RSP: 0018:ffffc90006e0f808 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffffff89746018 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff89746018 RDI: 000000000000004c RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffffff8aae3e70 R12: 0000000000000000 R13: 0000000000000260 R14: 0000000000000260 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880983c2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7e16139e9c CR3: 000000000e74e000 CR4: 0000000000752ef0 PKRU: 55555554 Kernel panic - not syncing: Fatal exception CVE-2026-31510
VCID-7r8h-rr9v-7qht kernel: ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak. CVE-2025-38438
VCID-7t89-3m8t-1ydq In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix drm_edid leak in amdgpu_dm [WHAT] When a sink is connected, aconnector->drm_edid was overwritten without freeing the previous allocation, causing a memory leak on resume. [HOW] Free the previous drm_edid before updating it. (cherry picked from commit 52024a94e7111366141cfc5d888b2ef011f879e5) CVE-2026-31461
VCID-7v4n-4x85-dygx kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones CVE-2024-36881
VCID-7v66-8w2u-duf9 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: HIDP: Fix possible UAF This fixes the following trace caused by not dropping l2cap_conn reference when user->remove callback is called: [ 97.809249] l2cap_conn_free: freeing conn ffff88810a171c00 [ 97.809907] CPU: 1 UID: 0 PID: 1419 Comm: repro_standalon Not tainted 7.0.0-rc1-dirty #14 PREEMPT(lazy) [ 97.809935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-debian-1.17.0-1 04/01/2014 [ 97.809947] Call Trace: [ 97.809954] <TASK> [ 97.809961] dump_stack_lvl (lib/dump_stack.c:122) [ 97.809990] l2cap_conn_free (net/bluetooth/l2cap_core.c:1808) [ 97.810017] l2cap_conn_del (./include/linux/kref.h:66 net/bluetooth/l2cap_core.c:1821 net/bluetooth/l2cap_core.c:1798) [ 97.810055] l2cap_disconn_cfm (net/bluetooth/l2cap_core.c:7347 (discriminator 1) net/bluetooth/l2cap_core.c:7340 (discriminator 1)) [ 97.810086] ? __pfx_l2cap_disconn_cfm (net/bluetooth/l2cap_core.c:7341) [ 97.810117] hci_conn_hash_flush (./include/net/bluetooth/hci_core.h:2152 (discriminator 2) net/bluetooth/hci_conn.c:2644 (discriminator 2)) [ 97.810148] hci_dev_close_sync (net/bluetooth/hci_sync.c:5360) [ 97.810180] ? __pfx_hci_dev_close_sync (net/bluetooth/hci_sync.c:5285) [ 97.810212] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810242] ? up_write (./arch/x86/include/asm/atomic64_64.h:87 (discriminator 5) ./include/linux/atomic/atomic-arch-fallback.h:2852 (discriminator 5) ./include/linux/atomic/atomic-long.h:268 (discriminator 5) ./include/linux/atomic/atomic-instrumented.h:3391 (discriminator 5) kernel/locking/rwsem.c:1385 (discriminator 5) kernel/locking/rwsem.c:1643 (discriminator 5)) [ 97.810267] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810290] ? rcu_is_watching (./arch/x86/include/asm/atomic.h:23 ./include/linux/atomic/atomic-arch-fallback.h:457 ./include/linux/context_tracking.h:128 kernel/rcu/tree.c:752) [ 97.810320] hci_unregister_dev (net/bluetooth/hci_core.c:504 net/bluetooth/hci_core.c:2716) [ 97.810346] vhci_release (drivers/bluetooth/hci_vhci.c:691) [ 97.810375] ? __pfx_vhci_release (drivers/bluetooth/hci_vhci.c:678) [ 97.810404] __fput (fs/file_table.c:470) [ 97.810430] task_work_run (kernel/task_work.c:235) [ 97.810451] ? __pfx_task_work_run (kernel/task_work.c:201) [ 97.810472] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810495] ? do_raw_spin_unlock (./include/asm-generic/qspinlock.h:128 (discriminator 5) kernel/locking/spinlock_debug.c:142 (discriminator 5)) [ 97.810527] do_exit (kernel/exit.c:972) [ 97.810547] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810574] ? __pfx_do_exit (kernel/exit.c:897) [ 97.810594] ? lock_acquire (kernel/locking/lockdep.c:470 (discriminator 6) kernel/locking/lockdep.c:5870 (discriminator 6) kernel/locking/lockdep.c:5825 (discriminator 6)) [ 97.810616] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810639] ? do_raw_spin_lock (kernel/locking/spinlock_debug.c:95 (discriminator 4) kernel/locking/spinlock_debug.c:118 (discriminator 4)) [ 97.810664] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810688] ? find_held_lock (kernel/locking/lockdep.c:5350 (discriminator 1)) [ 97.810721] do_group_exit (kernel/exit.c:1093) [ 97.810745] get_signal (kernel/signal.c:3007 (discriminator 1)) [ 97.810772] ? security_file_permission (./arch/x86/include/asm/jump_label.h:37 security/security.c:2366) [ 97.810803] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810826] ? vfs_read (fs/read_write.c:555) [ 97.810854] ? __pfx_get_signal (kernel/signal.c:2800) [ 97.810880] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810905] ? __pfx_vfs_read (fs/read_write.c:555) [ 97.810932] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 97.810960] arch_do_signal_or_restart (arch/ ---truncated--- CVE-2026-23462
VCID-7vdf-qwa1-ubeg kernel: smb: client: let smbd_destroy() call disable_work_sync(&#38;info->post_send_credits_work) CVE-2025-39932
VCID-82f7-2axv-jbbf kernel: rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access CVE-2025-38704
VCID-82py-ut98-qfb3 kernel: iommu/amd/pgtbl: Fix possible race while increase page table level CVE-2025-39961
VCID-868a-udb4-qfbm kernel: ALSA: aloop: Fix racy access at PCM trigger CVE-2026-23191
VCID-878n-d9ss-rugc In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet function by sending an unbounded sequence of full-page OUT transfers. pn_rx_complete() finalizes the skb only when req->actual < req->length, where req->length is set to PAGE_SIZE by the gadget. If the host always sends exactly PAGE_SIZE bytes per transfer, fp->rx.skb will never be reset and each completion will add another fragment via skb_add_rx_frag(). Once nr_frags exceeds MAX_SKB_FRAGS (default 17), subsequent frag stores overwrite memory adjacent to the shinfo on the heap. Drop the skb and account a length error when the frag limit is reached, matching the fix applied in t7xx by commit f0813bcd2d9d ("net: wwan: t7xx: fix potential skb->frags overflow in RX path"). CVE-2026-31616
VCID-87gw-ezjs-cqcs kernel: svcrdma: bound check rq_pages index in inline path CVE-2025-71068
VCID-8859-uavn-xygj kernel: xen: fix UAF in dmabuf_exp_from_pages() CVE-2025-38595
VCID-887n-3662-zfba kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params CVE-2024-58012
VCID-898p-crnv-w7cb In the Linux kernel, the following vulnerability has been resolved: HID: apple: avoid memory leak in apple_report_fixup() The apple_report_fixup() function was returning a newly kmemdup()-allocated buffer, but never freeing it. The caller of report_fixup() does not take ownership of the returned pointer, but it *is* permitted to return a sub-portion of the input rdesc, whose lifetime is managed by the caller. CVE-2026-31520
VCID-8ama-833x-xuh5 In the Linux kernel, the following vulnerability has been resolved: i2c: cp2615: fix serial string NULL-deref at probe The cp2615 driver uses the USB device serial string as the i2c adapter name but does not make sure that the string exists. Verify that the device has a serial number before accessing it to avoid triggering a NULL-pointer dereference (e.g. with malicious devices). CVE-2026-31549
VCID-8b4z-nus3-c7h8 kernel: ksmbd: fix refcount leak causing resource not released CVE-2025-39720
VCID-8bmx-4nbw-6qcn kernel: ice: Fix memory leak in ice_set_ringparam() CVE-2026-23389
VCID-8d9a-bf6e-dkga kernel: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs CVE-2024-57804
VCID-8e38-5bq1-8be9 kernel: Linux kernel: Denial of Service in SMB client due to deadlock during channel reconnection CVE-2025-38244
VCID-8edx-kmgw-jue5 kernel: can: j1939: implement NETDEV_UNREGISTER notification handler CVE-2025-39925
VCID-8q1z-p2qp-nkbf In the Linux kernel, the following vulnerability has been resolved: xfs: stop reclaim before pushing AIL during unmount The unmount sequence in xfs_unmount_flush_inodes() pushed the AIL while background reclaim and inodegc are still running. This is broken independently of any use-after-free issues - background reclaim and inodegc should not be running while the AIL is being pushed during unmount, as inodegc can dirty and insert inodes into the AIL during the flush, and background reclaim can race to abort and free dirty inodes. Reorder xfs_unmount_flush_inodes() to stop inodegc and cancel background reclaim before pushing the AIL. Stop inodegc before cancelling m_reclaim_work because the inodegc worker can re-queue m_reclaim_work via xfs_inodegc_set_reclaimable. CVE-2026-31455
VCID-8q49-pygk-33d1 kernel: drm/amd/display: Check link_index before accessing dc-&gt;links[] CVE-2024-46813
VCID-8qua-yr2x-s7fd kernel: af_unix: Give up GC if MSG_PEEK intervened CVE-2026-23394
VCID-8ssr-76q5-6kf4 kernel: iomap: adjust read range correctly for non-block-aligned positions CVE-2025-68794
VCID-8sv6-72c2-kybe kernel: f2fs: don't reset unchangable mount option in f2fs_remount() CVE-2023-53447
VCID-8ud8-f75a-jyew kernel: ice: Fix improper extts handling CVE-2024-42139
VCID-8v51-tdqe-tbcp In the Linux kernel, the following vulnerability has been resolved: mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() cgwb_release_workfn() calls css_put(wb->blkcg_css) and then later accesses wb->blkcg_css again via blkcg_unpin_online(). If css_put() drops the last reference, the blkcg can be freed asynchronously (css_free_rwork_fn -> blkcg_css_free -> kfree) before blkcg_unpin_online() dereferences the pointer to access blkcg->online_pin, resulting in a use-after-free: BUG: KASAN: slab-use-after-free in blkcg_unpin_online (./include/linux/instrumented.h:112 ./include/linux/atomic/atomic-instrumented.h:400 ./include/linux/refcount.h:389 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 block/blk-cgroup.c:1367) Write of size 4 at addr ff11000117aa6160 by task kworker/71:1/531 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> blkcg_unpin_online (./include/linux/instrumented.h:112 ./include/linux/atomic/atomic-instrumented.h:400 ./include/linux/refcount.h:389 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 block/blk-cgroup.c:1367) cgwb_release_workfn (mm/backing-dev.c:629) process_scheduled_works (kernel/workqueue.c:3278 kernel/workqueue.c:3385) Freed by task 1016: kfree (./include/linux/kasan.h:235 mm/slub.c:2689 mm/slub.c:6246 mm/slub.c:6561) css_free_rwork_fn (kernel/cgroup/cgroup.c:5542) process_scheduled_works (kernel/workqueue.c:3302 kernel/workqueue.c:3385) ** Stack based on commit 66672af7a095 ("Add linux-next specific files for 20260410") I am seeing this crash sporadically in Meta fleet across multiple kernel versions. A full reproducer is available at: https://github.com/leitao/debug/blob/main/reproducers/repro_blkcg_uaf.sh (The race window is narrow. To make it easily reproducible, inject a msleep(100) between css_put() and blkcg_unpin_online() in cgwb_release_workfn(). With that delay and a KASAN-enabled kernel, the reproducer triggers the splat reliably in less than a second.) Fix this by moving blkcg_unpin_online() before css_put(), so the cgwb's CSS reference keeps the blkcg alive while blkcg_unpin_online() accesses it. CVE-2026-31586
VCID-8xay-cepn-vfdd In the Linux kernel, the following vulnerability has been resolved: ksmbd: do not expire session on binding failure When a multichannel session binding request fails (e.g. wrong password), the error path unconditionally sets sess->state = SMB2_SESSION_EXPIRED. However, during binding, sess points to the target session looked up via ksmbd_session_lookup_slowpath() -- which belongs to another connection's user. This allows a remote attacker to invalidate any active session by simply sending a binding request with a wrong password (DoS). Fix this by skipping session expiration when the failed request was a binding attempt, since the session does not belong to the current connection. The reference taken by ksmbd_session_lookup_slowpath() is still correctly released via ksmbd_user_session_put(). CVE-2026-31476
VCID-8xdj-ys7r-rffm kernel: ksmbd: add refcnt to ksmbd_conn struct CVE-2024-49988
VCID-8zy9-cpzf-q3be kernel: KVM: arm64: Get rid of userspace_irqchip_in_use CVE-2024-53195
VCID-92j7-p476-97ca kernel: f2fs: fix to do sanity check on direct node in truncate_dnode() CVE-2023-53846
VCID-93ay-73z5-h7er kernel: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers CVE-2025-21870
VCID-93fb-qqv8-wyeb kernel: eth: bnxt: always recalculate features after XDP clearing, fix null-deref CVE-2025-21682
VCID-93h7-cr4j-sbfn In the Linux kernel, the following vulnerability has been resolved: team: fix header_ops type confusion with non-Ethernet ports Similar to commit 950803f72547 ("bonding: fix type confusion in bond_setup_by_slave()") team has the same class of header_ops type confusion. For non-Ethernet ports, team_setup_by_port() copies port_dev->header_ops directly. When the team device later calls dev_hard_header() or dev_parse_header(), these callbacks can run with the team net_device instead of the real lower device, so netdev_priv(dev) is interpreted as the wrong private type and can crash. The syzbot report shows a crash in bond_header_create(), but the root cause is in team: the topology is gre -> bond -> team, and team calls the inherited header_ops with its own net_device instead of the lower device, so bond_header_create() receives a team device and interprets netdev_priv() as bonding private data, causing a type confusion crash. Fix this by introducing team header_ops wrappers for create/parse, selecting a team port under RCU, and calling the lower device callbacks with port->dev, so each callback always sees the correct net_device context. Also pass the selected lower device to the lower parse callback, so recursion is bounded in stacked non-Ethernet topologies and parse callbacks always run with the correct device context. CVE-2026-31502
VCID-93jq-59ak-xygv kernel: spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer CVE-2024-42279
VCID-93yj-3vbb-3ub5 kernel: bpf: Check the helper function is valid in get_helper_proto CVE-2025-39990
VCID-94ha-pwzk-dbdt kernel: Linux kernel (mlx5e): Denial of Service due to NULL pointer dereference during network profile change CVE-2026-23000
VCID-94k1-ja9w-2fd2 CVE-2026-31421
VCID-94kq-ycmm-3bgn kernel: LoongArch: Update cpu_sibling_map when disabling nonboot CPUs CVE-2024-26841
VCID-95pv-sezn-6qhp In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat A use-after-free / refcount underflow is possible when the heartbeat worker and intel_engine_park_heartbeat() race to release the same engine->heartbeat.systole request. The heartbeat worker reads engine->heartbeat.systole and calls i915_request_put() on it when the request is complete, but clears the pointer in a separate, non-atomic step. Concurrently, a request retirement on another CPU can drop the engine wakeref to zero, triggering __engine_park() -> intel_engine_park_heartbeat(). If the heartbeat timer is pending at that point, cancel_delayed_work() returns true and intel_engine_park_heartbeat() reads the stale non-NULL systole pointer and calls i915_request_put() on it again, causing a refcount underflow: ``` <4> [487.221889] Workqueue: i915-unordered engine_retire [i915] <4> [487.222640] RIP: 0010:refcount_warn_saturate+0x68/0xb0 ... <4> [487.222707] Call Trace: <4> [487.222711] <TASK> <4> [487.222716] intel_engine_park_heartbeat.part.0+0x6f/0x80 [i915] <4> [487.223115] intel_engine_park_heartbeat+0x25/0x40 [i915] <4> [487.223566] __engine_park+0xb9/0x650 [i915] <4> [487.223973] ____intel_wakeref_put_last+0x2e/0xb0 [i915] <4> [487.224408] __intel_wakeref_put_last+0x72/0x90 [i915] <4> [487.224797] intel_context_exit_engine+0x7c/0x80 [i915] <4> [487.225238] intel_context_exit+0xf1/0x1b0 [i915] <4> [487.225695] i915_request_retire.part.0+0x1b9/0x530 [i915] <4> [487.226178] i915_request_retire+0x1c/0x40 [i915] <4> [487.226625] engine_retire+0x122/0x180 [i915] <4> [487.227037] process_one_work+0x239/0x760 <4> [487.227060] worker_thread+0x200/0x3f0 <4> [487.227068] ? __pfx_worker_thread+0x10/0x10 <4> [487.227075] kthread+0x10d/0x150 <4> [487.227083] ? __pfx_kthread+0x10/0x10 <4> [487.227092] ret_from_fork+0x3d4/0x480 <4> [487.227099] ? __pfx_kthread+0x10/0x10 <4> [487.227107] ret_from_fork_asm+0x1a/0x30 <4> [487.227141] </TASK> ``` Fix this by replacing the non-atomic pointer read + separate clear with xchg() in both racing paths. xchg() is a single indivisible hardware instruction that atomically reads the old pointer and writes NULL. This guarantees only one of the two concurrent callers obtains the non-NULL pointer and performs the put, the other gets NULL and skips it. (cherry picked from commit 13238dc0ee4f9ab8dafa2cca7295736191ae2f42) CVE-2026-31656
VCID-98mp-5h68-73eg kernel: Linux kernel: Denial of Service during UFS power down CVE-2025-68236
VCID-98y4-8sve-mfbz kernel: mlx5: Fix default values in create CQ CVE-2025-68209
VCID-995q-6nn5-ykgg kernel: scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove() CVE-2024-57872
VCID-99f9-ne8p-d7c5 kernel: LoongArch: BPF: Don't override subprog's return value CVE-2025-22048
VCID-9axb-sz3w-ubcx In the Linux kernel, the following vulnerability has been resolved: udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n When CONFIG_IPV6 is disabled, the udp_sock_create6() function returns 0 (success) without actually creating a socket. Callers such as fou_create() then proceed to dereference the uninitialized socket pointer, resulting in a NULL pointer dereference. The captured NULL deref crash: BUG: kernel NULL pointer dereference, address: 0000000000000018 RIP: 0010:fou_nl_add_doit (net/ipv4/fou_core.c:590 net/ipv4/fou_core.c:764) [...] Call Trace: <TASK> genl_family_rcv_msg_doit.constprop.0 (net/netlink/genetlink.c:1114) genl_rcv_msg (net/netlink/genetlink.c:1194 net/netlink/genetlink.c:1209) [...] netlink_rcv_skb (net/netlink/af_netlink.c:2550) genl_rcv (net/netlink/genetlink.c:1219) netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) netlink_sendmsg (net/netlink/af_netlink.c:1894) __sock_sendmsg (net/socket.c:727 (discriminator 1) net/socket.c:742 (discriminator 1)) __sys_sendto (./include/linux/file.h:62 (discriminator 1) ./include/linux/file.h:83 (discriminator 1) net/socket.c:2183 (discriminator 1)) __x64_sys_sendto (net/socket.c:2213 (discriminator 1) net/socket.c:2209 (discriminator 1) net/socket.c:2209 (discriminator 1)) do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1)) entry_SYSCALL_64_after_hwframe (net/arch/x86/entry/entry_64.S:130) This patch makes udp_sock_create6 return -EPFNOSUPPORT instead, so callers correctly take their error paths. There is only one caller of the vulnerable function and only privileged users can trigger it. CVE-2026-23439
VCID-9axt-c2hy-63eb kernel: net/sched: act_mirred: use the backlog for mirred ingress CVE-2024-26740
VCID-9azr-qrcs-k7by kernel: netfilter: nf_tables: fix memleak in map from abort path CVE-2024-27011
VCID-9bru-3rtm-sfey In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0 A malicious USB device with the TASCAM US-144MKII device id can have a configuration containing bInterfaceNumber=1 but no interface 0. USB configuration descriptors are not required to assign interface numbers sequentially, so usb_ifnum_to_if(dev, 0) returns will NULL, which will then be dereferenced directly. Fix this up by checking the return value properly. CVE-2026-31620
VCID-9cpj-kd98-33bz kernel: net/sched: act_gate: snapshot parameters with RCU on replace CVE-2026-23245
VCID-9cuj-t2sc-bbdj kernel: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions CVE-2026-23317
VCID-9dfd-an6h-67gp kernel: btrfs: do not strictly require dirty metadata threshold for metadata writepages CVE-2026-23157
VCID-9dms-q8x2-a3em kernel: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error CVE-2025-21732
VCID-9ej7-7tra-zqcm kernel: netfilter: nft_set_rbtree: validate open interval overlap CVE-2026-23333
VCID-9fn1-ytny-vke1 kernel: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() CVE-2024-52559
VCID-9hnv-7gae-2kc8 kernel: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv CVE-2026-22996
VCID-9jq2-6zek-rqh3 kernel: ublk: santizize the arguments from userspace when adding a device CVE-2025-38182
VCID-9kuz-7fag-4qhv kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() CVE-2026-23231
VCID-9m2t-y1zb-hfar CVE-2026-31412
VCID-9n5j-cp2p-qkhc kernel: Linux kernel:A use-after-free in bridge multicast in br_multicast_port_ctx_init CVE-2025-38248
VCID-9ns9-s6pf-d7hr kernel: Linux kernel: Denial of Service via integer overflow in dm-stripe CVE-2025-39940
VCID-9qfp-tkn1-uqa8 kernel: net: fec: handle page_pool_dev_alloc_pages error CVE-2025-21676
VCID-9qhe-6xhk-hfhf kernel: IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq() CVE-2026-23289
VCID-9rrq-d3g4-jyfy In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list. CVE-2026-31609
VCID-9sm6-shj5-cqh5 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure ieee80211_tx_prepare_skb() has three error paths, but only two of them free the skb. The first error path (ieee80211_tx_prepare() returning TX_DROP) does not free it, while invoke_tx_handlers() failure and the fragmentation check both do. Add kfree_skb() to the first error path so all three are consistent, and remove the now-redundant frees in callers (ath9k, mt76, mac80211_hwsim) to avoid double-free. Document the skb ownership guarantee in the function's kdoc. CVE-2026-23444
VCID-9sqm-1ubb-zqhr kernel: Linux kernel: Denial of Service in RDMA subsystem via repeated SRQ modification CVE-2025-68379
VCID-9t5k-1w4u-8kep kernel: RDMA/rxe: Remove the direct link to net_device CVE-2024-57795
VCID-9tb7-5mp1-pkhc kernel: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC CVE-2025-21894
VCID-9tbh-mrhu-v3am kernel: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port CVE-2025-38597
VCID-9wsp-xbm7-yfb9 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: don't call cdev_init while cdev in use When calling unbind, then bind again, cdev_init reinitialized the cdev, even though there may still be references to it. That's the case when the /dev/hidg* device is still opened. This obviously unsafe behavior like oopes. This fixes this by using cdev_alloc to put the cdev on the heap. That way, we can simply allocate a new one in hidg_bind. CVE-2026-31606
VCID-9zgh-r671-7ufw kernel: start_kernel: Add __no_stack_protector function attribute CVE-2023-53491
VCID-9zxp-tyb1-ubg8 kernel: md/dm-raid: don&#39;t call md_reap_sync_thread() directly CVE-2024-35808
VCID-a1ez-xh2w-7ba6 In the Linux kernel, the following vulnerability has been resolved: ext4: publish jinode after initialization ext4_inode_attach_jinode() publishes ei->jinode to concurrent users. It used to set ei->jinode before jbd2_journal_init_jbd_inode(), allowing a reader to observe a non-NULL jinode with i_vfs_inode still unset. The fast commit flush path can then pass this jinode to jbd2_wait_inode_data(), which dereferences i_vfs_inode->i_mapping and may crash. Below is the crash I observe: ``` BUG: unable to handle page fault for address: 000000010beb47f4 PGD 110e51067 P4D 110e51067 PUD 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 1 UID: 0 PID: 4850 Comm: fc_fsync_bench_ Not tainted 6.18.0-00764-g795a690c06a5 #1 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.17.0-2-2 04/01/2014 RIP: 0010:xas_find_marked+0x3d/0x2e0 Code: e0 03 48 83 f8 02 0f 84 f0 01 00 00 48 8b 47 08 48 89 c3 48 39 c6 0f 82 fd 01 00 00 48 85 c9 74 3d 48 83 f9 03 77 63 4c 8b 0f <49> 8b 71 08 48 c7 47 18 00 00 00 00 48 89 f1 83 e1 03 48 83 f9 02 RSP: 0018:ffffbbee806e7bf0 EFLAGS: 00010246 RAX: 000000000010beb4 RBX: 000000000010beb4 RCX: 0000000000000003 RDX: 0000000000000001 RSI: 0000002000300000 RDI: ffffbbee806e7c10 RBP: 0000000000000001 R08: 0000002000300000 R09: 000000010beb47ec R10: ffff9ea494590090 R11: 0000000000000000 R12: 0000002000300000 R13: ffffbbee806e7c90 R14: ffff9ea494513788 R15: ffffbbee806e7c88 FS: 00007fc2f9e3e6c0(0000) GS:ffff9ea6b1444000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000010beb47f4 CR3: 0000000119ac5000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: <TASK> filemap_get_folios_tag+0x87/0x2a0 __filemap_fdatawait_range+0x5f/0xd0 ? srso_alias_return_thunk+0x5/0xfbef5 ? __schedule+0x3e7/0x10c0 ? srso_alias_return_thunk+0x5/0xfbef5 ? srso_alias_return_thunk+0x5/0xfbef5 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ? srso_alias_return_thunk+0x5/0xfbef5 ? cap_safe_nice+0x37/0x70 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ? srso_alias_return_thunk+0x5/0xfbef5 filemap_fdatawait_range_keep_errors+0x12/0x40 ext4_fc_commit+0x697/0x8b0 ? ext4_file_write_iter+0x64b/0x950 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ? srso_alias_return_thunk+0x5/0xfbef5 ? vfs_write+0x356/0x480 ? srso_alias_return_thunk+0x5/0xfbef5 ? preempt_count_sub+0x5f/0x80 ext4_sync_file+0xf7/0x370 do_fsync+0x3b/0x80 ? syscall_trace_enter+0x108/0x1d0 __x64_sys_fdatasync+0x16/0x20 do_syscall_64+0x62/0x2c0 entry_SYSCALL_64_after_hwframe+0x76/0x7e ... ``` Fix this by initializing the jbd2_inode first. Use smp_wmb() and WRITE_ONCE() to publish ei->jinode after initialization. Readers use READ_ONCE() to fetch the pointer. CVE-2026-31450
VCID-a1rd-xu94-9bad kernel: amd/amdkfd: sync all devices to wait all processes being evicted CVE-2024-36949
VCID-a1xg-dyn3-skb6 kernel: Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ CVE-2026-23395
VCID-a29y-u4f3-nkfk kernel: staging: most: remove broken i2c driver CVE-2025-68755
VCID-a2jn-1xhp-9fg3 kernel: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() CVE-2025-68190
VCID-a36h-pqj3-9bhe kernel: xdp: produce a warning when calculated tailroom is negative CVE-2026-23343
VCID-a3d8-8qvy-ykdr kernel: sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting CVE-2026-23371
VCID-a3yj-v3tu-d7ga kernel: RDMA/mlx5: Move events notifier registration to be after device registration CVE-2024-53224
VCID-a454-61sh-j7ay CVE-2026-31684
VCID-a51v-ajen-u7et kernel: wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change CVE-2024-46860
VCID-a5tz-dm6g-zqch kernel: smb: client: Don't log plaintext credentials in cifs_set_cifscreds CVE-2026-23303
VCID-a6ke-6716-fker kernel: netfilter: nft_ct: add seqadj extension for natted connections CVE-2025-68206
VCID-a7fz-5z23-17ey kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() CVE-2023-4134
VCID-a89e-bca3-1qfg kernel: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() CVE-2024-50282
VCID-a8cp-9ykt-xbdx kernel: bpf: support non-r10 register spill/fill to/from stack in precision tracking CVE-2023-52920
VCID-a8ja-eegd-yqhk kernel: net/mlx5: Register devlink first under devlink lock CVE-2024-35961
VCID-a8u6-m3s1-5fdx kernel: mm/smaps: fix race between smaps_hugetlb_range and migration CVE-2025-39754
VCID-aawx-4bwq-5ubw kernel: Linux kernel Bluetooth: Denial of Service due to use-after-free in connection handling CVE-2023-53762
VCID-abcd-nfuq-2kc6 kernel: Linux kernel: Denial of Service via use-after-free in IMM SCSI host adapter CVE-2025-68324
VCID-abfm-ssmn-1fap kernel: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr() CVE-2024-52560
VCID-ah9v-pkq9-uqek kernel: spi-rockchip: Fix register out of bounds access CVE-2025-38081
VCID-ahsf-n2te-bfa2 kernel: md/raid10: wait barrier before returning discard request with REQ_NOWAIT CVE-2025-40325
VCID-ahvx-mjgn-5fa8 kernel: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop CVE-2026-23113
VCID-aj3p-9trr-87cz kernel: net/ncsi: Disable the ncsi work before freeing the associated structure CVE-2024-49945
VCID-ajfm-hpzg-uqck kernel: cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed() CVE-2026-23327
VCID-ajr2-wmhj-fbbj kernel: ksmbd: fix use-after-free of share_conf in compound request CVE-2026-23428
VCID-akq2-c6hp-tfda kernel: crypto: hisilicon/qm - request reserved interrupt for virtual function CVE-2025-40136
VCID-akv9-pdny-1yh6 kernel: fs: ntfs3: check return value of indx_find to avoid infinite loop CVE-2025-71266
VCID-an5c-5rea-u3aq kernel: dlm: prevent NPD when writing a positive value to event_done CVE-2025-23131
VCID-ans1-wmuz-e3bw kernel: memory leak in ubi driver CVE-2024-25740
VCID-apfq-mqch-jkgr In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() sip_help_tcp() parses the SIP Content-Length header with simple_strtoul(), which returns unsigned long, but stores the result in unsigned int clen. On 64-bit systems, values exceeding UINT_MAX are silently truncated before computing the SIP message boundary. For example, Content-Length 4294967328 (2^32 + 32) is truncated to 32, causing the parser to miscalculate where the current message ends. The loop then treats trailing data in the TCP segment as a second SIP message and processes it through the SDP parser. Fix this by changing clen to unsigned long to match the return type of simple_strtoul(), and reject Content-Length values that exceed the remaining TCP payload length. CVE-2026-23457
VCID-asy4-m48b-xydu kernel: netfilter: nf_tables: release flowtable after rcu grace period on error CVE-2026-23392
VCID-atux-q6hk-hfau kernel: loop: Avoid updating block size under exclusive owner CVE-2025-38709
VCID-av2k-qrby-suhg kernel: LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context CVE-2024-50111
VCID-aw15-85yp-e7b6 CVE-2026-31680
VCID-awuq-scq3-fuev kernel: drm/msm/dpu: Add missing NULL pointer check for pingpong interface CVE-2025-71138
VCID-aywj-7j4w-z3au kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state CVE-2023-52648
VCID-aze6-wgfm-3ycv kernel: ASoC: SOF: avoid a NULL dereference with unsupported widgets CVE-2023-54233
VCID-b13x-ysdt-jbc9 In the Linux kernel, the following vulnerability has been resolved: batman-adv: reject oversized global TT response buffers batadv_tt_prepare_tvlv_global_data() builds the allocation length for a global TT response in 16-bit temporaries. When a remote originator advertises a large enough global TT, the TT payload length plus the VLAN header offset can exceed 65535 and wrap before kmalloc(). The full-table response path still uses the original TT payload length when it fills tt_change, so the wrapped allocation is too small and batadv_tt_prepare_tvlv_global_data() writes past the end of the heap object before the later packet-size check runs. Fix this by rejecting TT responses whose TVLV value length cannot fit in the 16-bit TVLV payload length field. CVE-2026-31659
VCID-b1an-t4b8-4bd1 kernel: net: usb: pegasus: validate USB endpoints CVE-2026-23290
VCID-b2kt-hmz5-yuhb kernel: mm: fix uprobe pte be overwritten when expanding vma CVE-2025-38207
VCID-b4ct-fnbp-43a3 kernel: cxgb4: use-after-free in ch_flower_stats_cb() CVE-2023-4133
VCID-b51x-3ss2-67ex kernel: RDMA/siw: Fix potential NULL pointer dereference in header processing CVE-2026-23242
VCID-b9uq-ggy1-eyan kernel: Linux kernel: Denial of Service in qla2xxx SCSI driver due to improper command handling after chip reset CVE-2025-68745
VCID-ba6k-mvxj-8udm hw: amd: Instruction raise #VC exception at exit CVE-2024-25742
VCID-bcd9-e6dd-r3cf kernel: btrfs: harden block_group::bg_list against list_del() races CVE-2025-37856
VCID-beg3-c4a1-cfay In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix memory leaks and NULL deref in smb2_lock() smb2_lock() has three error handling issues after list_del() detaches smb_lock from lock_list at no_check_cl: 1) If vfs_lock_file() returns an unexpected error in the non-UNLOCK path, goto out leaks smb_lock and its flock because the out: handler only iterates lock_list and rollback_list, neither of which contains the detached smb_lock. 2) If vfs_lock_file() returns -ENOENT in the UNLOCK path, goto out leaks smb_lock and flock for the same reason. The error code returned to the dispatcher is also stale. 3) In the rollback path, smb_flock_init() can return NULL on allocation failure. The result is dereferenced unconditionally, causing a kernel NULL pointer dereference. Add a NULL check to prevent the crash and clean up the bookkeeping; the VFS lock itself cannot be rolled back without the allocation and will be released at file or connection teardown. Fix cases 1 and 2 by hoisting the locks_free_lock()/kfree() to before the if(!rc) check in the UNLOCK branch so all exit paths share one free site, and by freeing smb_lock and flock before goto out in the non-UNLOCK branch. Propagate the correct error code in both cases. Fix case 3 by wrapping the VFS unlock in an if(rlock) guard and adding a NULL check for locks_free_lock(rlock) in the shared cleanup. Found via call-graph analysis using sqry. CVE-2026-31477
VCID-bens-aw9k-xka2 kernel: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy CVE-2025-21635
VCID-bf5y-rqaa-afc9 kernel: f2fs: fix to truncate meta inode pages forcely CVE-2024-26869
VCID-bfjx-x5b3-53bg kernel: of: unittest: Fix memory leak in unittest_data_add() CVE-2026-23137
VCID-bg8h-jw13-8yhk In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. CVE-2023-21264
VCID-bkp8-m2yc-qub7 kernel: cxl: Fix race of nvdimm_bus object when creating nvdimm objects CVE-2026-23348
VCID-bnbm-zhck-yfex kernel: ALSA: control: Avoid WARN() for symlink errors CVE-2024-56657
VCID-bpmy-u7wr-kude kernel: can: mcp251x: fix deadlock in error path of mcp251x_open CVE-2026-23357
VCID-bq18-jcph-kkhh kernel: perf: RISCV: Fix panic on pmu overflow handler CVE-2024-26902
VCID-bq5a-jeg3-9ua7 kernel: nfc: pn533: properly drop the usb interface reference on disconnect CVE-2026-23291
VCID-brte-gqy3-r3ax In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix OOB write in QUERY_INFO for compound requests When a compound request such as READ + QUERY_INFO(Security) is received, and the first command (READ) consumes most of the response buffer, ksmbd could write beyond the allocated buffer while building a security descriptor. The root cause was that smb2_get_info_sec() checked buffer space using ppntsd_size from xattr, while build_sec_desc() often synthesized a significantly larger descriptor from POSIX ACLs. This patch introduces smb_acl_sec_desc_scratch_len() to accurately compute the final descriptor size beforehand, performs proper buffer checking with smb2_calc_max_out_buf_len(), and uses exact-sized allocation + iov pinning. CVE-2026-31432
VCID-brwq-qcbd-c3ep kernel: x86/mm: Randomize per-cpu entry area CVE-2023-0597
VCID-buyh-2d37-rqb1 kernel: bpf: bpf_sk_storage: Fix invalid wait context lockdep report CVE-2023-53857
VCID-bxaj-dwje-sbhe kernel: drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection CVE-2024-47662
VCID-c2ee-9r7y-9qfw kernel: PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() CVE-2024-58006
VCID-c2me-ar1y-y7dw kernel: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() CVE-2026-23004
VCID-c2y9-myfb-s3f6 kernel: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client CVE-2024-53114
VCID-c3wk-9gm2-fkeq kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface CVE-2023-52625
VCID-c42q-j659-e3gt kernel: Linux kernel: PCI/ASPM use-after-free during hot-unplug CVE-2024-58093
VCID-c49r-knse-6bc5 kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length CVE-2025-39933
VCID-c7xf-x7d5-87gn CVE-2026-31418
VCID-c86j-dzs8-nuem kernel: Bluetooth: MGMT: Protect mgmt_pending list with its own lock CVE-2025-38117
VCID-c8qb-kbef-8qg8 kernel: Bluetooth: HCI: Remove HCI_AMP support CVE-2024-38620
VCID-c8t3-zakp-jqe2 kernel: drm/amd/display: increase max link count and fix link->enc NULL pointer access CVE-2025-40354
VCID-c8xs-q7hr-uua8 kernel: hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur CVE-2025-21656
VCID-c9br-38nh-sfg4 kernel: ksmbd: fix null pointer dereference in alloc_preauth_hash() CVE-2025-22037
VCID-c9h3-3nm5-jqcq kernel: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings CVE-2024-42158
VCID-cayc-j15f-ekdv kernel: wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() CVE-2026-23279
VCID-cbrz-vaxe-b3dt kernel: iommu/vt-d: Fix NULL domain on device release CVE-2024-27079
VCID-cc41-mkuk-2fgu In the Linux kernel, the following vulnerability has been resolved: mm: call ->free_folio() directly in folio_unmap_invalidate() We can only call filemap_free_folio() if we have a reference to (or hold a lock on) the mapping. Otherwise, we've already removed the folio from the mapping so it no longer pins the mapping and the mapping can be removed, causing a use-after-free when accessing mapping->a_ops. Follow the same pattern as __remove_mapping() and load the free_folio function pointer before dropping the lock on the mapping. That lets us make filemap_free_folio() static as this was the only caller outside filemap.c. CVE-2026-31589
VCID-cear-n94a-jqdq kernel: KVM: arm64: Fix circular locking dependency CVE-2024-26691
VCID-cecv-w1gr-qkbp kernel: tracing: Fix crash on synthetic stacktrace field usage CVE-2026-23088
VCID-cfms-gd2h-v7gd kernel: f2fs: fix to do sanity check on node footer for non inode dnode CVE-2025-40025
VCID-cfrh-y31w-r7de CVE-2026-31679
VCID-chgp-ama8-5ycb In the Linux kernel, the following vulnerability has been resolved: esp: fix skb leak with espintcp and async crypto When the TX queue for espintcp is full, esp_output_tail_tcp will return an error and not free the skb, because with synchronous crypto, the common xfrm output code will drop the packet for us. With async crypto (esp_output_done), we need to drop the skb when esp_output_tail_tcp returns an error. CVE-2026-31518
VCID-cjnk-7asz-zuhp kernel: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing CVE-2026-23383
VCID-cn7e-8bbs-rubj kernel: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion CVE-2025-21729
VCID-cp52-z8dw-gfhf kernel: rxrpc: Fix handling of received connection abort CVE-2024-58053
VCID-cqrs-uu2s-affj kernel: scsi: pm8001: Fix use-after-free in pm8001_queue_command() CVE-2026-23306
VCID-cqye-p3y7-bfdp kernel: mm/thp: fix deferred split unqueue naming and locking CVE-2024-53079
VCID-cs7h-d7vk-73ab kernel: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend CVE-2025-71193
VCID-cv97-j139-vbfz In the Linux kernel, the following vulnerability has been resolved: ext4: convert inline data to extents when truncate exceeds inline size Add a check in ext4_setattr() to convert files from inline data storage to extent-based storage when truncate() grows the file size beyond the inline capacity. This prevents the filesystem from entering an inconsistent state where the inline data flag is set but the file size exceeds what can be stored inline. Without this fix, the following sequence causes a kernel BUG_ON(): 1. Mount filesystem with inode that has inline flag set and small size 2. truncate(file, 50MB) - grows size but inline flag remains set 3. sendfile() attempts to write data 4. ext4_write_inline_data() hits BUG_ON(write_size > inline_capacity) The crash occurs because ext4_write_inline_data() expects inline storage to accommodate the write, but the actual inline capacity (~60 bytes for i_block + ~96 bytes for xattrs) is far smaller than the file size and write request. The fix checks if the new size from setattr exceeds the inode's actual inline capacity (EXT4_I(inode)->i_inline_size) and converts the file to extent-based storage before proceeding with the size change. This addresses the root cause by ensuring the inline data flag and file size remain consistent during truncate operations. CVE-2026-31452
VCID-cvcu-khre-3bc8 kernel: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception CVE-2025-37957
VCID-cvps-1xf8-kqb5 kernel: MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits CVE-2025-71109
VCID-cvw6-a674-zfa9 kernel: drm/amd/display: Check null pointer before try to access it CVE-2024-49906
VCID-cwk5-n1mq-kkd2 In the Linux kernel, the following vulnerability has been resolved: driver core: platform: use generic driver_override infrastructure When a driver is probed through __driver_attach(), the bus' match() callback is called without the device lock held, thus accessing the driver_override field without a lock, which can cause a UAF. Fix this by using the driver-core driver_override infrastructure taking care of proper locking internally. Note that calling match() from __driver_attach() without the device lock held is intentional. [1] CVE-2026-31527
VCID-cwnm-um2n-17cw kernel: net: fix NULL pointer dereference in l3mdev_l3_rcv CVE-2025-22103
VCID-cxtx-363a-ufhd kernel: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() CVE-2024-36013
VCID-cyy8-6pff-vyf1 In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down When the nl80211 socket that originated a PMSR request is closed, cfg80211_release_pmsr() sets the request's nl_portid to zero and schedules pmsr_free_wk to process the abort asynchronously. If the interface is concurrently torn down before that work runs, cfg80211_pmsr_wdev_down() calls cfg80211_pmsr_process_abort() directly. However, the already- scheduled pmsr_free_wk work item remains pending and may run after the interface has been removed from the driver. This could cause the driver's abort_pmsr callback to operate on a torn-down interface, leading to undefined behavior and potential crashes. Cancel pmsr_free_wk synchronously in cfg80211_pmsr_wdev_down() before calling cfg80211_pmsr_process_abort(). This ensures any pending or in-progress work is drained before interface teardown proceeds, preventing the work from invoking the driver abort callback after the interface is gone. CVE-2026-31548
VCID-czue-c27z-bkgp kernel: mm/vmemmap/devdax: fix kernel crash when probing devdax devices CVE-2023-53706
VCID-d131-p16m-jqhd kernel: drm/amdgpu: fix double free err_addr pointer warnings CVE-2024-42123
VCID-d14h-dr7c-c3d9 kernel: net: ravb: Fix missing rtnl lock in suspend/resume path CVE-2025-21801
VCID-d1gu-5q4s-p7eq kernel: net/smc: fix UAF on smcsk after smc_listen_out() CVE-2025-38734
VCID-d1ke-rn87-f7ec kernel: drm/amd/display: Fix handling of plane refcount CVE-2024-56775
VCID-d2xf-68nr-rqe2 kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery CVE-2024-35931
VCID-d3x6-8uek-qkgn kernel: scsi: ufs: core: Fix handling of lrbp->cmd CVE-2023-53510
VCID-d4u6-bzuu-dubz kernel: dmaengine: lpc18xx-dmamux: fix device leak on route allocation CVE-2025-71188
VCID-d5cu-m235-x3gr kernel: fs/ntfs3: Return error for inconsistent extended attributes CVE-2023-54125
VCID-d83g-5tdr-7fd5 kernel: gve: Account for stopped queues when reading NIC stats CVE-2024-42162
VCID-d8ad-6vw9-b7f2 kernel: drm/amd/display: fix a Null pointer dereference vulnerability CVE-2025-39705
VCID-d8tr-usd8-6yca kernel: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV CVE-2025-40219
VCID-d9ty-7748-33a7 kernel: net/smc: initialize close_work early to avoid warning CVE-2024-56641
VCID-dav4-474s-33hg kernel: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability CVE-2024-53051
VCID-dcd5-4y9y-euf5 kernel: drm/amd/display: Wake DMCUB before sending a command cause deadlock CVE-2023-52485
VCID-dda8-c6rr-sqgq kernel: hfs: fix general protection fault in hfs_find_init() CVE-2025-38716
VCID-ddm7-5p27-3khg kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags CVE-2024-39508
VCID-dfj9-5xtt-qba4 kernel: smb: Initialize cfid->tcon before performing network ops CVE-2024-56729
VCID-dgr2-7fpq-4bgv In the Linux kernel, the following vulnerability has been resolved: btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create We have recently observed a number of subvolumes with broken dentries. ls-ing the parent dir looks like: drwxrwxrwt 1 root root 16 Jan 23 16:49 . drwxr-xr-x 1 root root 24 Jan 23 16:48 .. d????????? ? ? ? ? ? broken_subvol and similarly stat-ing the file fails. In this state, deleting the subvol fails with ENOENT, but attempting to create a new file or subvol over it errors out with EEXIST and even aborts the fs. Which leaves us a bit stuck. dmesg contains a single notable error message reading: "could not do orphan cleanup -2" 2 is ENOENT and the error comes from the failure handling path of btrfs_orphan_cleanup(), with the stack leading back up to btrfs_lookup(). btrfs_lookup btrfs_lookup_dentry btrfs_orphan_cleanup // prints that message and returns -ENOENT After some detailed inspection of the internal state, it became clear that: - there are no orphan items for the subvol - the subvol is otherwise healthy looking, it is not half-deleted or anything, there is no drop progress, etc. - the subvol was created a while ago and does the meaningful first btrfs_orphan_cleanup() call that sets BTRFS_ROOT_ORPHAN_CLEANUP much later. - after btrfs_orphan_cleanup() fails, btrfs_lookup_dentry() returns -ENOENT, which results in a negative dentry for the subvolume via d_splice_alias(NULL, dentry), leading to the observed behavior. The bug can be mitigated by dropping the dentry cache, at which point we can successfully delete the subvolume if we want. i.e., btrfs_lookup() btrfs_lookup_dentry() if (!sb_rdonly(inode->vfs_inode)->vfs_inode) btrfs_orphan_cleanup(sub_root) test_and_set_bit(BTRFS_ROOT_ORPHAN_CLEANUP) btrfs_search_slot() // finds orphan item for inode N ... prints "could not do orphan cleanup -2" if (inode == ERR_PTR(-ENOENT)) inode = NULL; return d_splice_alias(NULL, dentry) // NEGATIVE DENTRY for valid subvolume btrfs_orphan_cleanup() does test_and_set_bit(BTRFS_ROOT_ORPHAN_CLEANUP) on the root when it runs, so it cannot run more than once on a given root, so something else must run concurrently. However, the obvious routes to deleting an orphan when nlinks goes to 0 should not be able to run without first doing a lookup into the subvolume, which should run btrfs_orphan_cleanup() and set the bit. The final important observation is that create_subvol() calls d_instantiate_new() but does not set BTRFS_ROOT_ORPHAN_CLEANUP, so if the dentry cache gets dropped, the next lookup into the subvolume will make a real call into btrfs_orphan_cleanup() for the first time. This opens up the possibility of concurrently deleting the inode/orphan items but most typical evict() paths will be holding a reference on the parent dentry (child dentry holds parent->d_lockref.count via dget in d_alloc(), released in __dentry_kill()) and prevent the parent from being removed from the dentry cache. The one exception is delayed iputs. Ordered extent creation calls igrab() on the inode. If the file is unlinked and closed while those refs are held, iput() in __dentry_kill() decrements i_count but does not trigger eviction (i_count > 0). The child dentry is freed and the subvol dentry's d_lockref.count drops to 0, making it evictable while the inode is still alive. Since there are two races (the race between writeback and unlink and the race between lookup and delayed iputs), and there are too many moving parts, the following three diagrams show the complete picture. (Only the second and third are races) Phase 1: Create Subvol in dentry cache without BTRFS_ROOT_ORPHAN_CLEANUP set btrfs_mksubvol() lookup_one_len() __lookup_slow() d_alloc_parallel() __d_alloc() // d_lockref.count = 1 create_subvol(dentry) // doesn't touch the bit.. d_instantiate_new(dentry, inode) // dentry in cache with d_lockref.c ---truncated--- CVE-2026-31519
VCID-dktw-mrn7-kbh4 In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: Fix dma_free_coherent() size dma_alloc_consistent() may change the size to align it. The new size is saved in alloced. Change the free size to match the allocation size. CVE-2026-31661
VCID-dp4x-6duw-8yeh kernel: wifi: rtw88: delete timer and free skb queue when unloading CVE-2023-53574
VCID-dqe1-cf2v-myes kernel: ocfs2: Avoid touching renamed directory if parent does not change CVE-2023-52590
VCID-dqp6-k3du-n3ep kernel: btrfs: subpage: keep TOWRITE tag until folio is cleaned CVE-2025-39779
VCID-dqu3-2d1w-bked In the Linux kernel, the following vulnerability has been resolved: HID: core: clamp report_size in s32ton() to avoid undefined shift s32ton() shifts by n-1 where n is the field's report_size, a value that comes directly from a HID device. The HID parser bounds report_size only to <= 256, so a broken HID device can supply a report descriptor with a wide field that triggers shift exponents up to 256 on a 32-bit type when an output report is built via hid_output_field() or hid_set_field(). Commit ec61b41918587 ("HID: core: fix shift-out-of-bounds in hid_report_raw_event") added the same n > 32 clamp to the function snto32(), but s32ton() was never given the same fix as I guess syzbot hadn't figured out how to fuzz a device the same way. Fix this up by just clamping the max value of n, just like snto32() does. CVE-2026-31624
VCID-drqe-npyk-5yfa kernel: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper CVE-2025-38014
VCID-ds3w-wph8-7kam kernel: drm/gem: Acquire references on GEM handles for framebuffers CVE-2025-38449
VCID-dsrd-nv6n-5ygq kernel: scsi: core: Fix refcount leak for tagset_refcnt CVE-2026-23296
VCID-dtzb-vs94-3ygt kernel: arm64: set __exception_irq_entry with __irq_entry as a default CVE-2023-54322
VCID-dwes-ct77-juc8 Kernel: A use-after-free due to race between scr24x_open() and scr24x_remove() CVE-2022-44034
VCID-dwp4-mc1w-4bcw In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If sid_unix_NFS_mode is the prefix S-1-5-88-3 with num_subauth = 2 then compare_sids() compares only min(num_subauth, 2) sub-authorities so a client SID with num_subauth = 2 and sub_auth = {88, 3} will match. If num_subauth = 2 and the ACE is placed at the very end of the security descriptor, sub_auth[2] will be 4 bytes past end_of_acl. The out-of-band bytes will then be masked to the low 9 bits and applied as the file's POSIX mode, probably not something that is good to have happen. Fix this up by forcing the SID to actually carry a third sub-authority before reading it at all. CVE-2026-31611
VCID-dx7t-sub8-zffq In the Linux kernel, the following vulnerability has been resolved: nvmet: move async event work off nvmet-wq For target nvmet_ctrl_free() flushes ctrl->async_event_work. If nvmet_ctrl_free() runs on nvmet-wq, the flush re-enters workqueue completion for the same worker:- A. Async event work queued on nvmet-wq (prior to disconnect): nvmet_execute_async_event() queue_work(nvmet_wq, &ctrl->async_event_work) nvmet_add_async_event() queue_work(nvmet_wq, &ctrl->async_event_work) B. Full pre-work chain (RDMA CM path): nvmet_rdma_cm_handler() nvmet_rdma_queue_disconnect() __nvmet_rdma_queue_disconnect() queue_work(nvmet_wq, &queue->release_work) process_one_work() lock((wq_completion)nvmet-wq) <--------- 1st nvmet_rdma_release_queue_work() C. Recursive path (same worker): nvmet_rdma_release_queue_work() nvmet_rdma_free_queue() nvmet_sq_destroy() nvmet_ctrl_put() nvmet_ctrl_free() flush_work(&ctrl->async_event_work) __flush_work() touch_wq_lockdep_map() lock((wq_completion)nvmet-wq) <--------- 2nd Lockdep splat: ============================================ WARNING: possible recursive locking detected 6.19.0-rc3nvme+ #14 Tainted: G N -------------------------------------------- kworker/u192:42/44933 is trying to acquire lock: ffff888118a00948 ((wq_completion)nvmet-wq){+.+.}-{0:0}, at: touch_wq_lockdep_map+0x26/0x90 but task is already holding lock: ffff888118a00948 ((wq_completion)nvmet-wq){+.+.}-{0:0}, at: process_one_work+0x53e/0x660 3 locks held by kworker/u192:42/44933: #0: ffff888118a00948 ((wq_completion)nvmet-wq){+.+.}-{0:0}, at: process_one_work+0x53e/0x660 #1: ffffc9000e6cbe28 ((work_completion)(&queue->release_work)){+.+.}-{0:0}, at: process_one_work+0x1c5/0x660 #2: ffffffff82d4db60 (rcu_read_lock){....}-{1:3}, at: __flush_work+0x62/0x530 Workqueue: nvmet-wq nvmet_rdma_release_queue_work [nvmet_rdma] Call Trace: __flush_work+0x268/0x530 nvmet_ctrl_free+0x140/0x310 [nvmet] nvmet_cq_put+0x74/0x90 [nvmet] nvmet_rdma_free_queue+0x23/0xe0 [nvmet_rdma] nvmet_rdma_release_queue_work+0x19/0x50 [nvmet_rdma] process_one_work+0x206/0x660 worker_thread+0x184/0x320 kthread+0x10c/0x240 ret_from_fork+0x319/0x390 Move async event work to a dedicated nvmet-aen-wq to avoid reentrant flush on nvmet-wq. CVE-2026-31557
VCID-dy8y-by76-1ufm In the Linux kernel, the following vulnerability has been resolved: xfrm_user: fix info leak in build_report() struct xfrm_user_report is a __u8 proto field followed by a struct xfrm_selector which means there is three "empty" bytes of padding, but the padding is never zeroed before copying to userspace. Fix that up by zeroing the structure before setting individual member variables. CVE-2026-31671
VCID-dykz-252m-jkcu In the Linux kernel, the following vulnerability has been resolved: hwmon: (pmbus/core) Protect regulator operations with mutex The regulator operations pmbus_regulator_get_voltage(), pmbus_regulator_set_voltage(), and pmbus_regulator_list_voltage() access PMBus registers and shared data but were not protected by the update_lock mutex. This could lead to race conditions. However, adding mutex protection directly to these functions causes a deadlock because pmbus_regulator_notify() (which calls regulator_notifier_call_chain()) is often called with the mutex already held (e.g., from pmbus_fault_handler()). If a regulator callback then calls one of the now-protected voltage functions, it will attempt to acquire the same mutex. Rework pmbus_regulator_notify() to utilize a worker function to send notifications outside of the mutex protection. Events are stored as atomics in a per-page bitmask and processed by the worker. Initialize the worker and its associated data during regulator registration, and ensure it is cancelled on device removal using devm_add_action_or_reset(). While at it, remove the unnecessary include of linux/of.h. CVE-2026-31486
VCID-dyun-rd3c-rke6 kernel: drm/amd/display: Avoid overflow from uint32_t to uint8_t CVE-2024-47661
VCID-dzvh-zq3w-r7ah CVE-2026-31682
VCID-dzye-v1vd-gybq kernel: ksmbd: fix use-after-free in __smb2_lease_break_noti() CVE-2025-37777
VCID-e1pe-znzp-jqhx kernel: LoongArch: Optimize module load time by optimizing PLT/GOT counting CVE-2025-39767
VCID-e2vy-prvw-xkhq kernel: bnxt_en: Fix memory corruption when FW resources change during ifdown CVE-2025-39810
VCID-e2wu-3vmz-3yae kernel: drm: zynqmp_kms: Unplug DRM device before removal CVE-2024-56538
VCID-e42z-ac66-gye3 kernel: ksmbd: check outstanding simultaneous SMB operations CVE-2024-50285
VCID-e495-c57w-tkft kernel: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware CVE-2024-47664
VCID-e4jw-y3k8-r7ec kernel: net/mlx5e: Fix netif state handling CVE-2024-38608
VCID-e57d-cw7e-73an kernel: media: av7110: fix a spectre vulnerability CVE-2024-50289
VCID-e6th-hujj-6bby kernel: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags CVE-2024-49923
VCID-e7ae-83vq-auf1 kernel: btrfs: fix NULL dereference on root when tracing inode eviction CVE-2025-71184
VCID-e8ky-fyhz-dqhc In the Linux kernel, the following vulnerability has been resolved: scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() A malicious or compromised VIO server can return a num_written value in the discover targets MAD response that exceeds max_targets. This value is stored directly in vhost->num_targets without validation, and is then used as the loop bound in ibmvfc_alloc_targets() to index into disc_buf[], which is only allocated for max_targets entries. Indices at or beyond max_targets access kernel memory outside the DMA-coherent allocation. The out-of-bounds data is subsequently embedded in Implicit Logout and PLOGI MADs that are sent back to the VIO server, leaking kernel memory. Fix by clamping num_written to max_targets before storing it. CVE-2026-31464
VCID-e965-zevp-rqgd kernel: erofs: Fix detection of atomic context CVE-2023-53231
VCID-e9d9-jb9v-jufv kernel: net/mlx5: Reload only IB representors upon lag disable/enable CVE-2024-38557
VCID-ea36-7v42-fyfp kernel: usb: typec: tipd: Free IRQ only if it was requested before CVE-2024-50057
VCID-ecc5-64vs-ekgr In the Linux kernel, the following vulnerability has been resolved: crypto: atmel-sha204a - Fix OOM ->tfm_count leak If memory allocation fails, decrement ->tfm_count to avoid blocking future reads. CVE-2026-31391
VCID-ed3p-sm1w-33am kernel: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled CVE-2026-23293
VCID-edhy-ptjn-1kbx kernel: driver core: fix potential NULL pointer dereference in dev_uevent() CVE-2025-37800
VCID-edst-7exd-zud8 kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() CVE-2025-40168
VCID-eetb-e929-77bc kernel: wifi: ath11k: update channel list in reg notifier instead reg worker CVE-2025-23133
VCID-ehtx-jr8g-vbgb kernel: cifs: fix potential race when tree connecting ipc CVE-2023-54280
VCID-emdc-7k4g-67e5 kernel: net: kcm: Fix race condition in kcm_unattach() CVE-2025-38717
VCID-emnd-q69n-a3fe CVE-2026-31532
VCID-enyv-k9c5-bfe4 kernel: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() CVE-2025-68188
VCID-es8r-wvmz-gfe6 kernel: net/sched: Fix backlog accounting in qdisc_dequeue_internal CVE-2025-39677
VCID-esup-2y63-afa4 kernel: cifs: client: fix memory leak in smb3_fs_context_parse_param CVE-2025-40268
VCID-etb2-844u-jfdu kernel: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() CVE-2024-36968
VCID-ete6-ycnw-7kgg kernel: Input: alps - fix use-after-free bugs caused by dev3_register_work CVE-2025-68822
VCID-euxu-gjpw-8yhs In the Linux kernel, the following vulnerability has been resolved: hwmon: (powerz) Fix use-after-free on USB disconnect After powerz_disconnect() frees the URB and releases the mutex, a subsequent powerz_read() call can acquire the mutex and call powerz_read_data(), which dereferences the freed URB pointer. Fix by: - Setting priv->urb to NULL in powerz_disconnect() so that powerz_read_data() can detect the disconnected state. - Adding a !priv->urb check at the start of powerz_read_data() to return -ENODEV on a disconnected device. - Moving usb_set_intfdata() before hwmon registration so the disconnect handler can always find the priv pointer. CVE-2026-31582
VCID-ew57-csay-bube kernel: Bluetooth: hci_core: Fix use-after-free in vhci_flush() CVE-2025-38250
VCID-ewj3-dyq9-r7f2 kernel: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset CVE-2026-23213
VCID-ex4p-ftap-h7fe kernel: net: annotate data-races around sk->sk_{data_ready,write_space} CVE-2026-23302
VCID-ex8u-z3r8-cycq In the Linux kernel, the following vulnerability has been resolved: ipv6: add NULL checks for idev in SRv6 paths __in6_dev_get() can return NULL when the device has no IPv6 configuration (e.g. MTU < IPV6_MIN_MTU or after NETDEV_UNREGISTER). Add NULL checks for idev returned by __in6_dev_get() in both seg6_hmac_validate_skb() and ipv6_srh_rcv() to prevent potential NULL pointer dereferences. CVE-2026-23442
VCID-ex9p-euhg-aybf kernel: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue CVE-2025-37861
VCID-exhn-kypt-2fbd kernel: jfs: fix array-index-out-of-bounds read in add_missing_indices CVE-2025-38204
VCID-exkc-gh4x-p3bh kernel: drm/amd/display: Wake DMCUB before executing GPINT commands CVE-2023-52624
VCID-ey68-cc97-duhz kernel: drm/amd/display: Fix incorrect size calculation for loop CVE-2024-46729
VCID-eyg8-qhra-ukcj kernel: RDMA/mlx5: Fix implicit ODP use after free CVE-2025-21714
VCID-ezwh-qc41-pugn kernel: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object CVE-2025-39851
VCID-f1r5-rt1y-jkd4 kernel: rxrpc: Fix data-race warning and potential load/store tearing CVE-2026-23118
VCID-f2ce-pung-aqgw kernel: Linux kernel: Denial of Service in rxrpc due to prealloc collision CVE-2025-38544
VCID-f2m2-u9j3-3ba9 kernel: fs/9p: fix NULL pointer dereference on mkdir CVE-2025-22070
VCID-f2u9-7eeg-e7cg kernel: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr CVE-2025-68183
VCID-f3sv-pbfs-cqcc kernel: um: work around sched_yield not yielding in time-travel mode CVE-2025-37880
VCID-f5xb-v8j6-nye2 In the Linux kernel, the following vulnerability has been resolved: usbip: validate number_of_packets in usbip_pack_ret_submit() When a USB/IP client receives a RET_SUBMIT response, usbip_pack_ret_submit() unconditionally overwrites urb->number_of_packets from the network PDU. This value is subsequently used as the loop bound in usbip_recv_iso() and usbip_pad_iso() to iterate over urb->iso_frame_desc[], a flexible array whose size was fixed at URB allocation time based on the *original* number_of_packets from the CMD_SUBMIT. A malicious USB/IP server can set number_of_packets in the response to a value larger than what was originally submitted, causing a heap out-of-bounds write when usbip_recv_iso() writes to urb->iso_frame_desc[i] beyond the allocated region. KASAN confirmed this with kernel 7.0.0-rc5: BUG: KASAN: slab-out-of-bounds in usbip_recv_iso+0x46a/0x640 Write of size 4 at addr ffff888106351d40 by task vhci_rx/69 The buggy address is located 0 bytes to the right of allocated 320-byte region [ffff888106351c00, ffff888106351d40) The server side (stub_rx.c) and gadget side (vudc_rx.c) already validate number_of_packets in the CMD_SUBMIT path since commits c6688ef9f297 ("usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input") and b78d830f0049 ("usbip: fix vudc_rx: harden CMD_SUBMIT path to handle malicious input"). The server side validates against USBIP_MAX_ISO_PACKETS because no URB exists yet at that point. On the client side we have the original URB, so we can use the tighter bound: the response must not exceed the original number_of_packets. This mirrors the existing validation of actual_length against transfer_buffer_length in usbip_recv_xbuff(), which checks the response value against the original allocation size. Kelvin Mbogo's series ("usb: usbip: fix integer overflow in usbip_recv_iso()", v2) hardens the receive-side functions themselves; this patch complements that work by catching the bad value at its source -- in usbip_pack_ret_submit() before the overwrite -- and using the tighter per-URB allocation bound rather than the global USBIP_MAX_ISO_PACKETS limit. Fix this by checking rpdu->number_of_packets against urb->number_of_packets in usbip_pack_ret_submit() before the overwrite. On violation, clamp to zero so that usbip_recv_iso() and usbip_pad_iso() safely return early. CVE-2026-31607
VCID-f5xt-m6qt-43ep kernel: btrfs: fix deadlock with fiemap and extent locking CVE-2024-35784
VCID-f76c-qhke-3bag kernel: can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message CVE-2026-23307
VCID-f892-ybkq-kbd7 In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Initialize free_qp completion before using it In irdma_create_qp, if ib_copy_to_udata fails, it will call irdma_destroy_qp to clean up which will attempt to wait on the free_qp completion, which is not initialized yet. Fix this by initializing the completion before the ib_copy_to_udata call. CVE-2026-31492
VCID-f968-vrzv-8ke5 kernel: bpf: Defer work in bpf_timer_cancel_and_free CVE-2024-41045
VCID-fe76-s8g9-zuar kernel: smb: client: fix UAF in decryption with multichannel CVE-2025-37750
VCID-ffdb-88yu-3be1 kernel: drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() CVE-2026-23356
VCID-fhfz-6h5m-hbed In the Linux kernel, the following vulnerability has been resolved: mm/userfaultfd: fix hugetlb fault mutex hash calculation In mfill_atomic_hugetlb(), linear_page_index() is used to calculate the page index for hugetlb_fault_mutex_hash(). However, linear_page_index() returns the index in PAGE_SIZE units, while hugetlb_fault_mutex_hash() expects the index in huge page units. This mismatch means that different addresses within the same huge page can produce different hash values, leading to the use of different mutexes for the same huge page. This can cause races between faulting threads, which can corrupt the reservation map and trigger the BUG_ON in resv_map_release(). Fix this by introducing hugetlb_linear_page_index(), which returns the page index in huge page granularity, and using it in place of linear_page_index(). CVE-2026-31575
VCID-fhme-yjgr-suep kernel: habanalabs: fix UAF in export_dmabuf() CVE-2025-38722
VCID-fhxv-d8du-rbgk kernel: btrfs: do proper folio cleanup when run_delalloc_nocow() failed CVE-2024-57975
VCID-fmjc-a468-fffw kernel: f2fs: split initial and dynamic conditions for extent_cache CVE-2023-52770
VCID-fp52-xjc8-s3bw In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix reference count leak in rxrpc_server_keyring() This patch fixes a reference count leak in rxrpc_server_keyring() by checking if rx->securities is already set. CVE-2026-31634
VCID-fqzh-sckm-a3ff kernel: bpf: support deferring bpf_link dealloc to after RCU grace period CVE-2024-35860
VCID-fs2g-g159-guhj In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: fix use-after-free in timeout object destroy nft_ct_timeout_obj_destroy() frees the timeout object with kfree() immediately after nf_ct_untimeout(), without waiting for an RCU grace period. Concurrent packet processing on other CPUs may still hold RCU-protected references to the timeout object obtained via rcu_dereference() in nf_ct_timeout_data(). Add an rcu_head to struct nf_ct_timeout and use kfree_rcu() to defer freeing until after an RCU grace period, matching the approach already used in nfnetlink_cttimeout.c. KASAN report: BUG: KASAN: slab-use-after-free in nf_conntrack_tcp_packet+0x1381/0x29d0 Read of size 4 at addr ffff8881035fe19c by task exploit/80 Call Trace: nf_conntrack_tcp_packet+0x1381/0x29d0 nf_conntrack_in+0x612/0x8b0 nf_hook_slow+0x70/0x100 __ip_local_out+0x1b2/0x210 tcp_sendmsg_locked+0x722/0x1580 __sys_sendto+0x2d8/0x320 Allocated by task 75: nft_ct_timeout_obj_init+0xf6/0x290 nft_obj_init+0x107/0x1b0 nf_tables_newobj+0x680/0x9c0 nfnetlink_rcv_batch+0xc29/0xe00 Freed by task 26: nft_obj_destroy+0x3f/0xa0 nf_tables_trans_destroy_work+0x51c/0x5c0 process_one_work+0x2c4/0x5a0 CVE-2026-31665
VCID-fs73-5ucn-qke1 In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Avoid releasing netdev before teardown completes The patch cited in the Fixes tag below changed the teardown code for OVS ports to no longer unconditionally take the RTNL. After this change, the netdev_destroy() callback can proceed immediately to the call_rcu() invocation if the IFF_OVS_DATAPATH flag is already cleared on the netdev. The ovs_netdev_detach_dev() function clears the flag before completing the unregistration, and if it gets preempted after clearing the flag (as can happen on an -rt kernel), netdev_destroy() can complete and the device can be freed before the unregistration completes. This leads to a splat like: [ 998.393867] Oops: general protection fault, probably for non-canonical address 0xff00000001000239: 0000 [#1] SMP PTI [ 998.393877] CPU: 42 UID: 0 PID: 55177 Comm: ip Kdump: loaded Not tainted 6.12.0-211.1.1.el10_2.x86_64+rt #1 PREEMPT_RT [ 998.393886] Hardware name: Dell Inc. PowerEdge R740/0JMK61, BIOS 2.24.0 03/27/2025 [ 998.393889] RIP: 0010:dev_set_promiscuity+0x8d/0xa0 [ 998.393901] Code: 00 00 75 d8 48 8b 53 08 48 83 ba b0 02 00 00 00 75 ca 48 83 c4 08 5b c3 cc cc cc cc 48 83 bf 48 09 00 00 00 75 91 48 8b 47 08 <48> 83 b8 b0 02 00 00 00 74 97 eb 81 0f 1f 80 00 00 00 00 90 90 90 [ 998.393906] RSP: 0018:ffffce5864a5f6a0 EFLAGS: 00010246 [ 998.393912] RAX: ff00000000ffff89 RBX: ffff894d0adf5a05 RCX: 0000000000000000 [ 998.393917] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffff894d0adf5a05 [ 998.393921] RBP: ffff894d19252000 R08: ffff894d19252000 R09: 0000000000000000 [ 998.393924] R10: ffff894d19252000 R11: ffff894d192521b8 R12: 0000000000000006 [ 998.393927] R13: ffffce5864a5f738 R14: 00000000ffffffe2 R15: 0000000000000000 [ 998.393931] FS: 00007fad61971800(0000) GS:ffff894cc0140000(0000) knlGS:0000000000000000 [ 998.393936] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 998.393940] CR2: 000055df0a2a6e40 CR3: 000000011c7fe003 CR4: 00000000007726f0 [ 998.393944] PKRU: 55555554 [ 998.393946] Call Trace: [ 998.393949] <TASK> [ 998.393952] ? show_trace_log_lvl+0x1b0/0x2f0 [ 998.393961] ? show_trace_log_lvl+0x1b0/0x2f0 [ 998.393975] ? dp_device_event+0x41/0x80 [openvswitch] [ 998.394009] ? __die_body.cold+0x8/0x12 [ 998.394016] ? die_addr+0x3c/0x60 [ 998.394027] ? exc_general_protection+0x16d/0x390 [ 998.394042] ? asm_exc_general_protection+0x26/0x30 [ 998.394058] ? dev_set_promiscuity+0x8d/0xa0 [ 998.394066] ? ovs_netdev_detach_dev+0x3a/0x80 [openvswitch] [ 998.394092] dp_device_event+0x41/0x80 [openvswitch] [ 998.394102] notifier_call_chain+0x5a/0xd0 [ 998.394106] unregister_netdevice_many_notify+0x51b/0xa60 [ 998.394110] rtnl_dellink+0x169/0x3e0 [ 998.394121] ? rt_mutex_slowlock.constprop.0+0x95/0xd0 [ 998.394125] rtnetlink_rcv_msg+0x142/0x3f0 [ 998.394128] ? avc_has_perm_noaudit+0x69/0xf0 [ 998.394130] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 998.394132] netlink_rcv_skb+0x50/0x100 [ 998.394138] netlink_unicast+0x292/0x3f0 [ 998.394141] netlink_sendmsg+0x21b/0x470 [ 998.394145] ____sys_sendmsg+0x39d/0x3d0 [ 998.394149] ___sys_sendmsg+0x9a/0xe0 [ 998.394156] __sys_sendmsg+0x7a/0xd0 [ 998.394160] do_syscall_64+0x7f/0x170 [ 998.394162] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 998.394165] RIP: 0033:0x7fad61bf4724 [ 998.394188] Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d c5 e9 0c 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89 [ 998.394189] RSP: 002b:00007ffd7e2f7cb8 EFLAGS: 00000202 ORIG_RAX: 000000000000002e [ 998.394191] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fad61bf4724 [ 998.394193] RDX: 0000000000000000 RSI: 00007ffd7e2f7d20 RDI: 0000000000000003 [ 998.394194] RBP: 00007ffd7e2f7d90 R08: 0000000000000010 R09: 000000000000003f [ 998.394195] R10: 000055df11558010 R11: 0000000000000202 R12: 00007ffd7e2 ---truncated--- CVE-2026-31508
VCID-fsjs-fmwz-x3bd kernel: md: suspend array while updating raid_disks via sysfs CVE-2025-71225
VCID-fufn-uqtv-wkas kernel: f2fs: fix to avoid panic once fallocation fails for pinfile CVE-2025-23130
VCID-fvam-jks7-jkbt kernel: drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update CVE-2024-46727
VCID-fvhu-1xqw-fkbk kernel: netfilter: nf_tables: restore set elements when delete set fails CVE-2024-27012
VCID-fvvb-p7r7-zkbk CVE-2026-31422
VCID-fx2q-84en-qyah kernel: can: bcm: fix locking for bcm_op runtime updates CVE-2026-23362
VCID-fz9m-axm1-4kcb kernel: wifi: rtw89: fix null pointer access when abort scan CVE-2024-35946
VCID-g162-81ms-93g7 kernel: ipv6: use RCU in ip6_output() CVE-2025-40158
VCID-g2gb-t5zm-1qb1 kernel: net: mctp: Don't access ifa_index when missing CVE-2025-38006
VCID-g2yr-d1ta-93g7 In the Linux kernel, the following vulnerability has been resolved: module: Fix kernel panic when a symbol st_shndx is out of bounds The module loader doesn't check for bounds of the ELF section index in simplify_symbols(): for (i = 1; i < symsec->sh_size / sizeof(Elf_Sym); i++) { const char *name = info->strtab + sym[i].st_name; switch (sym[i].st_shndx) { case SHN_COMMON: [...] default: /* Divert to percpu allocation if a percpu var. */ if (sym[i].st_shndx == info->index.pcpu) secbase = (unsigned long)mod_percpu(mod); else /** HERE --> **/ secbase = info->sechdrs[sym[i].st_shndx].sh_addr; sym[i].st_value += secbase; break; } } A symbol with an out-of-bounds st_shndx value, for example 0xffff (known as SHN_XINDEX or SHN_HIRESERVE), may cause a kernel panic: BUG: unable to handle page fault for address: ... RIP: 0010:simplify_symbols+0x2b2/0x480 ... Kernel panic - not syncing: Fatal exception This can happen when module ELF is legitimately using SHN_XINDEX or when it is corrupted. Add a bounds check in simplify_symbols() to validate that st_shndx is within the valid range before using it. This issue was discovered due to a bug in llvm-objcopy, see relevant discussion for details [1]. [1] https://lore.kernel.org/linux-modules/20251224005752.201911-1-ihor.solodrai@linux.dev/ CVE-2026-31521
VCID-g34c-hwct-tqb1 kernel: ptp: Add a upper bound on max_vclocks CVE-2025-40057
VCID-g3ku-5npc-v7gc kernel: net: phy: register phy led_triggers during probe to avoid AB-BA deadlock CVE-2026-23368
VCID-g4qj-az94-83c6 kernel: btrfs: avoid NULL pointer dereference if no valid extent tree CVE-2025-21658
VCID-g75p-x4da-efdt kernel: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices CVE-2025-21649
VCID-g7k7-e2h7-a7f6 kernel: fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata CVE-2025-71265
VCID-g82z-3144-u3d2 In the Linux kernel, the following vulnerability has been resolved: RDMA/efa: Fix use of completion ctx after free On admin queue completion handling, if the admin command completed with error we print data from the completion context. The issue is that we already freed the completion context in polling/interrupts handler which means we print data from context in an unknown state (it might be already used again). Change the admin submission flow so alloc/dealloc of the context will be symmetric and dealloc will be called after any potential use of the context. CVE-2026-31493
VCID-g8k1-wwq1-yka2 In the Linux kernel, the following vulnerability has been resolved: xfrm: prevent policy_hthresh.work from racing with netns teardown A XFRM_MSG_NEWSPDINFO request can queue the per-net work item policy_hthresh.work onto the system workqueue. The queued callback, xfrm_hash_rebuild(), retrieves the enclosing struct net via container_of(). If the net namespace is torn down before that work runs, the associated struct net may already have been freed, and xfrm_hash_rebuild() may then dereference stale memory. xfrm_policy_fini() already flushes policy_hash_work during teardown, but it does not synchronize policy_hthresh.work. Synchronize policy_hthresh.work in xfrm_policy_fini() as well, so the queued work cannot outlive the net namespace teardown and access a freed struct net. CVE-2026-31516
VCID-g9zj-fsa9-vkca In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When block_len is smaller than opts->ndp_size, the bounds check of: ndp_index > (block_len - opts->ndp_size) will underflow producing a huge unsigned value that ndp_index can never exceed, defeating the check entirely. The same underflow occurs in the datagram index checks against block_len - opts->dpe_size. With those checks neutered, a malicious USB host can choose ndp_index and datagram offsets that point past the actual transfer, and the skb_put_data() copies adjacent kernel memory into the network skb. Fix this by rejecting block lengths that cannot hold at least the NTB header plus one NDP. This will make block_len - opts->ndp_size and block_len - opts->dpe_size both well-defined. Commit 8d2b1a1ec9f5 ("CDC-NCM: avoid overflow in sanity checking") fixed a related class of issues on the host side of NCM. CVE-2026-31617
VCID-gbkk-anun-a3ce CVE-2025-54505
XSA-488
VCID-gcqh-ytsa-f7g1 kernel: drm/amd/display: Run DC_LOG_DC after checking link-&gt;link_enc CVE-2024-46776
VCID-gekz-p7dw-cbb1 In the Linux kernel, the following vulnerability has been resolved: mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() When running stress-ng on my Arm64 machine with v7.0-rc3 kernel, I encountered some very strange crash issues showing up as "Bad page state": " [ 734.496287] BUG: Bad page state in process stress-ng-env pfn:415735fb [ 734.496427] page: refcount:0 mapcount:1 mapping:0000000000000000 index:0x4cf316 pfn:0x415735fb [ 734.496434] flags: 0x57fffe000000800(owner_2|node=1|zone=2|lastcpupid=0x3ffff) [ 734.496439] raw: 057fffe000000800 0000000000000000 dead000000000122 0000000000000000 [ 734.496440] raw: 00000000004cf316 0000000000000000 0000000000000000 0000000000000000 [ 734.496442] page dumped because: nonzero mapcount " After analyzing this page’s state, it is hard to understand why the mapcount is not 0 while the refcount is 0, since this page is not where the issue first occurred. By enabling the CONFIG_DEBUG_VM config, I can reproduce the crash as well and captured the first warning where the issue appears: " [ 734.469226] page: refcount:33 mapcount:0 mapping:00000000bef2d187 index:0x81a0 pfn:0x415735c0 [ 734.469304] head: order:5 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 734.469315] memcg:ffff000807a8ec00 [ 734.469320] aops:ext4_da_aops ino:100b6f dentry name(?):"stress-ng-mmaptorture-9397-0-2736200540" [ 734.469335] flags: 0x57fffe400000069(locked|uptodate|lru|head|node=1|zone=2|lastcpupid=0x3ffff) ...... [ 734.469364] page dumped because: VM_WARN_ON_FOLIO((_Generic((page + nr_pages - 1), const struct page *: (const struct folio *)_compound_head(page + nr_pages - 1), struct page *: (struct folio *)_compound_head(page + nr_pages - 1))) != folio) [ 734.469390] ------------[ cut here ]------------ [ 734.469393] WARNING: ./include/linux/rmap.h:351 at folio_add_file_rmap_ptes+0x3b8/0x468, CPU#90: stress-ng-mlock/9430 [ 734.469551] folio_add_file_rmap_ptes+0x3b8/0x468 (P) [ 734.469555] set_pte_range+0xd8/0x2f8 [ 734.469566] filemap_map_folio_range+0x190/0x400 [ 734.469579] filemap_map_pages+0x348/0x638 [ 734.469583] do_fault_around+0x140/0x198 ...... [ 734.469640] el0t_64_sync+0x184/0x188 " The code that triggers the warning is: "VM_WARN_ON_FOLIO(page_folio(page + nr_pages - 1) != folio, folio)", which indicates that set_pte_range() tried to map beyond the large folio’s size. By adding more debug information, I found that 'nr_pages' had overflowed in filemap_map_pages(), causing set_pte_range() to establish mappings for a range exceeding the folio size, potentially corrupting fields of pages that do not belong to this folio (e.g., page->_mapcount). After above analysis, I think the possible race is as follows: CPU 0 CPU 1 filemap_map_pages() ext4_setattr() //get and lock folio with old inode->i_size next_uptodate_folio() ....... //shrink the inode->i_size i_size_write(inode, attr->ia_size); //calculate the end_pgoff with the new inode->i_size file_end = DIV_ROUND_UP(i_size_read(mapping->host), PAGE_SIZE) - 1; end_pgoff = min(end_pgoff, file_end); ...... //nr_pages can be overflowed, cause xas.xa_index > end_pgoff end = folio_next_index(folio) - 1; nr_pages = min(end, end_pgoff) - xas.xa_index + 1; ...... //map large folio filemap_map_folio_range() ...... //truncate folios truncate_pagecache(inode, inode->i_size); To fix this issue, move the 'end_pgoff' calculation before next_uptodate_folio(), so the retrieved folio stays consistent with the file end to avoid ---truncated--- CVE-2026-31648
VCID-gkap-5jhj-tbff kernel: net/sched: act_ife: Fix metalist update behavior CVE-2026-23378
VCID-gkhm-29a6-7uc6 kernel: LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset() CVE-2025-38195
VCID-gm3e-d4pv-53aq kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' CVE-2024-26661
VCID-gmun-zz47-suap In the Linux kernel, the following vulnerability has been resolved: nvme-pci: ensure we're polling a polled queue A user can change the polled queue count at run time. There's a brief window during a reset where a hipri task may try to poll that queue before the block layer has updated the queue maps, which would race with the now interrupt driven queue and may cause double completions. CVE-2026-31523
VCID-gn82-9qs1-37hs kernel: drm/amdgpu: fix nullptr err of vm_handle_moved CVE-2025-40339
VCID-gpcp-4y8w-fka1 kernel: nfc: nci: complete pending data exchange on device close CVE-2026-23330
VCID-gqbd-ybcp-jybq kernel: drm/amd/pm: fix null pointer access CVE-2025-38705
VCID-gqr9-19jt-qfds kernel: net: use dst_dev_rcu() in sk_setup_caps() CVE-2025-40170
VCID-gr5a-eqvx-n3ha In the Linux kernel, the following vulnerability has been resolved: bcache: fix cached_dev.sb_bio use-after-free and crash In our production environment, we have received multiple crash reports regarding libceph, which have caught our attention: ``` [6888366.280350] Call Trace: [6888366.280452] blk_update_request+0x14e/0x370 [6888366.280561] blk_mq_end_request+0x1a/0x130 [6888366.280671] rbd_img_handle_request+0x1a0/0x1b0 [rbd] [6888366.280792] rbd_obj_handle_request+0x32/0x40 [rbd] [6888366.280903] __complete_request+0x22/0x70 [libceph] [6888366.281032] osd_dispatch+0x15e/0xb40 [libceph] [6888366.281164] ? inet_recvmsg+0x5b/0xd0 [6888366.281272] ? ceph_tcp_recvmsg+0x6f/0xa0 [libceph] [6888366.281405] ceph_con_process_message+0x79/0x140 [libceph] [6888366.281534] ceph_con_v1_try_read+0x5d7/0xf30 [libceph] [6888366.281661] ceph_con_workfn+0x329/0x680 [libceph] ``` After analyzing the coredump file, we found that the address of dc->sb_bio has been freed. We know that cached_dev is only freed when it is stopped. Since sb_bio is a part of struct cached_dev, rather than an alloc every time. If the device is stopped while writing to the superblock, the released address will be accessed at endio. This patch hopes to wait for sb_write to complete in cached_dev_free. It should be noted that we analyzed the cause of the problem, then tell all details to the QWEN and adopted the modifications it made. CVE-2026-31580
VCID-gr5s-rjhv-3kdw kernel: lan966x: Fix sleeping in atomic context CVE-2025-68320
VCID-gtjv-ut7g-hqhv kernel: spi: tegra210-quad: Protect curr_xfer check in IRQ handler CVE-2026-23207
VCID-gtzq-1g5y-tkh5 kernel: nfsd: release svc_expkey/svc_export with rcu_work CVE-2024-53216
VCID-gu84-p4ru-b7gj kernel: f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic CVE-2025-38627
VCID-gv7r-71cz-e3cz kernel: bus: mhi: ep: Update read pointer only after buffer is written CVE-2025-38429
VCID-gvya-5wgk-j3cv kernel: udf: refactor inode_bmap() to handle error CVE-2024-50211
VCID-gyhz-a9pm-zqav Linux privcmd driver can circumvent kernel lockdown CVE-2026-31788
VCID-gyzx-musu-83c4 kernel: btrfs: insert tree mod log move in push_node_left CVE-2023-53538
VCID-h31q-rcq3-7ud3 kernel: spi: fix use-after-free on controller registration failure CVE-2026-31389
VCID-h3e8-fux5-3fe2 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access l2cap_information_rsp() checks that cmd_len covers the fixed l2cap_info_rsp header (type + result, 4 bytes) but then reads rsp->data without verifying that the payload is present: - L2CAP_IT_FEAT_MASK calls get_unaligned_le32(rsp->data), which reads 4 bytes past the header (needs cmd_len >= 8). - L2CAP_IT_FIXED_CHAN reads rsp->data[0], 1 byte past the header (needs cmd_len >= 5). A truncated L2CAP_INFO_RSP with result == L2CAP_IR_SUCCESS triggers an out-of-bounds read of adjacent skb data. Guard each data access with the required payload length check. If the payload is too short, skip the read and let the state machine complete with safe defaults (feat_mask and remote_fixed_chan remain zero from kzalloc), so the info timer cleanup and l2cap_conn_start() still run and the connection is not stalled. CVE-2026-31393
VCID-h5ks-h7t7-rqcz kernel: fs/ntfs3: Check &#39;folio&#39; pointer for NULL CVE-2024-38625
VCID-h7pm-dyef-1fan CVE-2026-31409
VCID-h7tb-d7q2-pqcr kernel: f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC CVE-2024-44942
VCID-h8sj-qvv2-rydf kernel: incorrect check for error case in the memory_tier_init CVE-2023-23005
VCID-h9cw-fv5h-13de CVE-2026-31689
VCID-hbnp-yx9t-bbfj In the Linux kernel, the following vulnerability has been resolved: HID: alps: fix NULL pointer dereference in alps_raw_event() Commit ecfa6f34492c ("HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them") attempted to fix up the HID drivers that had missed the previous fix that was done in 2ff5baa9b527 ("HID: appleir: Fix potential NULL dereference at raw event handle"), but the alps driver was missed. Fix this up by properly checking in the hid-alps driver that it had been claimed correctly before attempting to process the raw event. CVE-2026-31625
VCID-hbzk-b7gn-9bgz kernel: riscv: save the SR_SUM status over switches CVE-2025-38261
VCID-hfq2-r9mw-p3cp kernel: btrfs: fix double accounting race when btrfs_run_delalloc_range() failed CVE-2024-58089
VCID-hh8s-8fc8-pkgq kernel: netfilter: nft_set_pipapo: split gc into unlink and reclaim phase CVE-2026-23351
VCID-hhxy-swz4-eqfy In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown epf_ntb_epc_destroy() duplicates the teardown that the caller is supposed to perform later. This leads to an oops when .allow_link fails or when .drop_link is performed. The following is an example oops of the former case: Unable to handle kernel paging request at virtual address dead000000000108 [...] [dead000000000108] address between user and kernel address ranges Internal error: Oops: 0000000096000044 [#1] SMP [...] Call trace: pci_epc_remove_epf+0x78/0xe0 (P) pci_primary_epc_epf_link+0x88/0xa8 configfs_symlink+0x1f4/0x5a0 vfs_symlink+0x134/0x1d8 do_symlinkat+0x88/0x138 __arm64_sys_symlinkat+0x74/0xe0 [...] Remove the helper, and drop pci_epc_put(). EPC device refcounting is tied to the configfs EPC group lifetime, and pci_epc_put() in the .drop_link path is sufficient. CVE-2026-31594
VCID-hjf7-23wz-1qeg kernel: net: mvpp2: guard flow control update with global_tx_fc in buffer switching CVE-2026-23438
VCID-hmmv-61tn-nkc2 kernel: mm: clear uffd-wp PTE/PMD state on mremap() CVE-2025-21696
VCID-hnt8-m1yy-3fec In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00usb: fix devres lifetime USB drivers bind to USB interfaces and any device managed resources should have their lifetime tied to the interface rather than parent USB device. This avoids issues like memory leaks when drivers are unbound without their devices being physically disconnected (e.g. on probe deferral or configuration changes). Fix the USB anchor lifetime so that it is released on driver unbind. CVE-2026-31672
VCID-hpqq-mr4h-gbcj In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false A UAF issue occurs when the virtio_net driver is configured with napi_tx=N and the device's IFF_XMIT_DST_RELEASE flag is cleared (e.g., during the configuration of tc route filter rules). When IFF_XMIT_DST_RELEASE is removed from the net_device, the network stack expects the driver to hold the reference to skb->dst until the packet is fully transmitted and freed. In virtio_net with napi_tx=N, skbs may remain in the virtio transmit ring for an extended period. If the network namespace is destroyed while these skbs are still pending, the corresponding dst_ops structure has freed. When a subsequent packet is transmitted, free_old_xmit() is triggered to clean up old skbs. It then calls dst_release() on the skb associated with the stale dst_entry. Since the dst_ops (referenced by the dst_entry) has already been freed, a UAF kernel paging request occurs. fix it by adds skb_dst_drop(skb) in start_xmit to explicitly release the dst reference before the skb is queued in virtio_net. Call Trace: Unable to handle kernel paging request at virtual address ffff80007e150000 CPU: 2 UID: 0 PID: 6236 Comm: ping Kdump: loaded Not tainted 7.0.0-rc1+ #6 PREEMPT ... percpu_counter_add_batch+0x3c/0x158 lib/percpu_counter.c:98 (P) dst_release+0xe0/0x110 net/core/dst.c:177 skb_release_head_state+0xe8/0x108 net/core/skbuff.c:1177 sk_skb_reason_drop+0x54/0x2d8 net/core/skbuff.c:1255 dev_kfree_skb_any_reason+0x64/0x78 net/core/dev.c:3469 napi_consume_skb+0x1c4/0x3a0 net/core/skbuff.c:1527 __free_old_xmit+0x164/0x230 drivers/net/virtio_net.c:611 [virtio_net] free_old_xmit drivers/net/virtio_net.c:1081 [virtio_net] start_xmit+0x7c/0x530 drivers/net/virtio_net.c:3329 [virtio_net] ... Reproduction Steps: NETDEV="enp3s0" config_qdisc_route_filter() { tc qdisc del dev $NETDEV root tc qdisc add dev $NETDEV root handle 1: prio tc filter add dev $NETDEV parent 1:0 \ protocol ip prio 100 route to 100 flowid 1:1 ip route add 192.168.1.100/32 dev $NETDEV realm 100 } test_ns() { ip netns add testns ip link set $NETDEV netns testns ip netns exec testns ifconfig $NETDEV 10.0.32.46/24 ip netns exec testns ping -c 1 10.0.32.1 ip netns del testns } config_qdisc_route_filter test_ns sleep 2 test_ns CVE-2026-31469
VCID-hq39-2qnw-v3dw In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix circular locking dependency in nci_close_device nci_close_device() flushes rx_wq and tx_wq while holding req_lock. This causes a circular locking dependency because nci_rx_work() running on rx_wq can end up taking req_lock too: nci_rx_work -> nci_rx_data_packet -> nci_data_exchange_complete -> __sk_destruct -> rawsock_destruct -> nfc_deactivate_target -> nci_deactivate_target -> nci_request -> mutex_lock(&ndev->req_lock) Move the flush of rx_wq after req_lock has been released. This should safe (I think) because NCI_UP has already been cleared and the transport is closed, so the work will see it and return -ENETDOWN. NIPA has been hitting this running the nci selftest with a debug kernel on roughly 4% of the runs. CVE-2026-31509
VCID-ht2j-bafp-eudq In the Linux kernel, the following vulnerability has been resolved: mptcp: fix slab-use-after-free in __inet_lookup_established The ehash table lookups are lockless and rely on SLAB_TYPESAFE_BY_RCU to guarantee socket memory stability during RCU read-side critical sections. Both tcp_prot and tcpv6_prot have their slab caches created with this flag via proto_register(). However, MPTCP's mptcp_subflow_init() copies tcpv6_prot into tcpv6_prot_override during inet_init() (fs_initcall, level 5), before inet6_init() (module_init/device_initcall, level 6) has called proto_register(&tcpv6_prot). At that point, tcpv6_prot.slab is still NULL, so tcpv6_prot_override.slab remains NULL permanently. This causes MPTCP v6 subflow child sockets to be allocated via kmalloc (falling into kmalloc-4k) instead of the TCPv6 slab cache. The kmalloc-4k cache lacks SLAB_TYPESAFE_BY_RCU, so when these sockets are freed without SOCK_RCU_FREE (which is cleared for child sockets by design), the memory can be immediately reused. Concurrent ehash lookups under rcu_read_lock can then access freed memory, triggering a slab-use-after-free in __inet_lookup_established. Fix this by splitting the IPv6-specific initialization out of mptcp_subflow_init() into a new mptcp_subflow_v6_init(), called from mptcp_proto_v6_init() before protocol registration. This ensures tcpv6_prot_override.slab correctly inherits the SLAB_TYPESAFE_BY_RCU slab cache. CVE-2026-31669
VCID-htyr-jnu7-e3gf kernel: drm/msm/dpu: Add mutex lock in control vblank irq CVE-2023-52586
VCID-hu4f-e8qk-8fbz kernel: fs: quota: create dedicated workqueue for quota_release_work CVE-2025-40196
VCID-hucp-gu2u-97e1 hw: amd: Instruction raise #VC exception at exit CVE-2024-25743
VCID-huh6-94c8-rkad kernel: x86/mce: use is_copy_from_user() to determine copy-from-user context CVE-2025-39989
VCID-hv12-tgt6-rub5 kernel: sched/deadline: Fix task_struct reference leak CVE-2024-41023
VCID-hwat-fnmq-vydn kernel: userfaultfd: fix checks for huge PMDs CVE-2024-46787
VCID-hx57-qb6n-bfba kernel: PCI: endpoint: pci-epf-test: Make use of cached &#39;epc_features&#39; in pci_epf_test_core_init() CVE-2024-43824
VCID-hxj2-cvvc-tqec kernel: cgroup/cpuset: remove kernfs active break CVE-2025-21634
VCID-j1um-9nym-muh4 kernel: efi: Don't map the entire mokvar table to determine its size CVE-2025-21872
VCID-j3rb-57kd-rfd1 CVE-2026-31676
VCID-j5zr-w83u-q7ds kernel: perf: Fix hang while freeing sigtrap event CVE-2025-37747
VCID-j7c3-n2w7-fbg4 kernel: f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode CVE-2025-38626
VCID-j843-2qbk-tkcz kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD CVE-2024-26670
VCID-j87e-taah-ubbv kernel: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data CVE-2026-23370
VCID-j8yy-3tn1-63b5 kernel: ASoC: Intel: avs: Do not share the name pointer between components CVE-2025-40338
VCID-j9s4-1dar-7qdb kernel: Linux kernel blk-cgroup: Use-after-free vulnerability leading to denial of service CVE-2023-54107
VCID-j9tf-d5qg-6fgq kernel: gfs2: Fix unlikely race in gdlm_put_lock CVE-2025-40242
VCID-jamx-hf6t-bfcd kernel: Linux kernel: Denial of service and memory corruption in RDMA umad CVE-2026-23243
VCID-jbs2-t7yr-rqh3 kernel: pktgen: use cpus_read_lock() in pg_net_init() CVE-2024-46681
VCID-jbyd-zxvz-mkf2 kernel: bpf: check changes_pkt_data property for extension programs CVE-2024-58100
VCID-jfhv-6svu-x3f6 kernel: sfc: fix NULL dereferences in ef100_process_design_param() CVE-2025-37860
VCID-jfrf-qe3s-gbax kernel: drm/amd/display: Check stream_status before it is used CVE-2024-49893
VCID-jgaw-mgbm-sfaf kernel: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop CVE-2025-40180
VCID-jgke-4yqg-s7g7 kernel: drm/amd/display: Check null pointers before used CVE-2024-49921
VCID-jhe1-2e3s-nkht In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled Keep the NOC_HDCP clock always enabled to fix the potential hang caused by the NoC ADB400 port power down handshake. CVE-2026-31655
VCID-jhz4-z9f5-4ka3 kernel: parisc: Avoid crash due to unaligned access in unwinder CVE-2025-68322
VCID-jmqw-ffjj-fqb7 kernel: drivers: perf: Check find_first_bit() return value CVE-2023-52797
VCID-jq8m-nxpa-p3hy In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED set. If the connection is broken all requests are signaled even without explicit IB_SEND_SIGNALED. CVE-2026-31536
VCID-jset-t9qq-xfah In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input. When ksmbd_decode_negTokenInit() reaches the mechToken [2] OCTET STRING element, ksmbd_neg_token_alloc() allocates conn->mechToken immediately via kmemdup_nul(). If a later element in the same blob is malformed, then the decoder will return nonzero after the allocation is already live. This could happen if mechListMIC [3] overrunse the enclosing SEQUENCE. decode_negotiation_token() then sets conn->use_spnego = false because both the negTokenInit and negTokenTarg grammars failed. The cleanup at the bottom of smb2_sess_setup() is gated on use_spnego: if (conn->use_spnego && conn->mechToken) { kfree(conn->mechToken); conn->mechToken = NULL; } so the kfree is skipped, causing the mechToken to never be freed. This codepath is reachable pre-authentication, so untrusted clients can cause slow memory leaks on a server without even being properly authenticated. Fix this up by not checking check for use_spnego, as it's not required, so the memory will always be properly freed. At the same time, always free the memory in ksmbd_conn_free() incase some other failure path forgot to free it. CVE-2026-31610
VCID-jtnv-mefv-qqff kernel: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim CVE-2026-23319
VCID-jupy-x3sh-vqcp kernel: bpf: Remove tst_run from lwt_seg6local_prog_ops. CVE-2024-46754
VCID-jvv4-j5x1-dbd6 kernel: bpf: track changes_pkt_data property for global functions CVE-2024-58098
VCID-jx72-vpup-p3gk kernel: f2fs: fix potential deadloop in prepare_compress_overwrite() CVE-2025-22127
VCID-jxkv-jbh3-9fhj kernel: drm/amd/display: add null check CVE-2025-39762
VCID-jyxp-bjx8-kfbd In the Linux kernel, the following vulnerability has been resolved: arm64: mm: Handle invalid large leaf mappings correctly It has been possible for a long time to mark ptes in the linear map as invalid. This is done for secretmem, kfence, realm dma memory un/share, and others, by simply clearing the PTE_VALID bit. But until commit a166563e7ec37 ("arm64: mm: support large block mapping when rodata=full") large leaf mappings were never made invalid in this way. It turns out various parts of the code base are not equipped to handle invalid large leaf mappings (in the way they are currently encoded) and I've observed a kernel panic while booting a realm guest on a BBML2_NOABORT system as a result: [ 15.432706] software IO TLB: Memory encryption is active and system is using DMA bounce buffers [ 15.476896] Unable to handle kernel paging request at virtual address ffff000019600000 [ 15.513762] Mem abort info: [ 15.527245] ESR = 0x0000000096000046 [ 15.548553] EC = 0x25: DABT (current EL), IL = 32 bits [ 15.572146] SET = 0, FnV = 0 [ 15.592141] EA = 0, S1PTW = 0 [ 15.612694] FSC = 0x06: level 2 translation fault [ 15.640644] Data abort info: [ 15.661983] ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000 [ 15.694875] CM = 0, WnR = 1, TnD = 0, TagAccess = 0 [ 15.723740] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 15.755776] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000081f3f000 [ 15.800410] [ffff000019600000] pgd=0000000000000000, p4d=180000009ffff403, pud=180000009fffe403, pmd=00e8000199600704 [ 15.855046] Internal error: Oops: 0000000096000046 [#1] SMP [ 15.886394] Modules linked in: [ 15.900029] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 7.0.0-rc4-dirty #4 PREEMPT [ 15.935258] Hardware name: linux,dummy-virt (DT) [ 15.955612] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 15.986009] pc : __pi_memcpy_generic+0x128/0x22c [ 16.006163] lr : swiotlb_bounce+0xf4/0x158 [ 16.024145] sp : ffff80008000b8f0 [ 16.038896] x29: ffff80008000b8f0 x28: 0000000000000000 x27: 0000000000000000 [ 16.069953] x26: ffffb3976d261ba8 x25: 0000000000000000 x24: ffff000019600000 [ 16.100876] x23: 0000000000000001 x22: ffff0000043430d0 x21: 0000000000007ff0 [ 16.131946] x20: 0000000084570010 x19: 0000000000000000 x18: ffff00001ffe3fcc [ 16.163073] x17: 0000000000000000 x16: 00000000003fffff x15: 646e612065766974 [ 16.194131] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 16.225059] x11: 0000000000000000 x10: 0000000000000010 x9 : 0000000000000018 [ 16.256113] x8 : 0000000000000018 x7 : 0000000000000000 x6 : 0000000000000000 [ 16.287203] x5 : ffff000019607ff0 x4 : ffff000004578000 x3 : ffff000019600000 [ 16.318145] x2 : 0000000000007ff0 x1 : ffff000004570010 x0 : ffff000019600000 [ 16.349071] Call trace: [ 16.360143] __pi_memcpy_generic+0x128/0x22c (P) [ 16.380310] swiotlb_tbl_map_single+0x154/0x2b4 [ 16.400282] swiotlb_map+0x5c/0x228 [ 16.415984] dma_map_phys+0x244/0x2b8 [ 16.432199] dma_map_page_attrs+0x44/0x58 [ 16.449782] virtqueue_map_page_attrs+0x38/0x44 [ 16.469596] virtqueue_map_single_attrs+0xc0/0x130 [ 16.490509] virtnet_rq_alloc.isra.0+0xa4/0x1fc [ 16.510355] try_fill_recv+0x2a4/0x584 [ 16.526989] virtnet_open+0xd4/0x238 [ 16.542775] __dev_open+0x110/0x24c [ 16.558280] __dev_change_flags+0x194/0x20c [ 16.576879] netif_change_flags+0x24/0x6c [ 16.594489] dev_change_flags+0x48/0x7c [ 16.611462] ip_auto_config+0x258/0x1114 [ 16.628727] do_one_initcall+0x80/0x1c8 [ 16.645590] kernel_init_freeable+0x208/0x2f0 [ 16.664917] kernel_init+0x24/0x1e0 [ 16.680295] ret_from_fork+0x10/0x20 [ 16.696369] Code: 927cec03 cb0e0021 8b0e0042 a9411c26 (a900340c) [ 16.723106] ---[ end trace 0000000000000000 ]--- [ 16.752866] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 16.792556] Kernel Offset: 0x3396ea200000 from 0xffff8000800000 ---truncated--- CVE-2026-31600
VCID-jz2j-4jqz-8fdg kernel: btrfs: fix use-after-free of block device file in __btrfs_free_extra_devids() CVE-2024-50217
VCID-k1eg-sz6t-skg8 kernel: Bluetooth: hci_core: lookup hci_conn on RX path on protocol side CVE-2025-68304
VCID-k1v3-945q-47eh kernel: macvlan: observe an RCU grace period in macvlan_common_newlink() error path CVE-2026-23273
VCID-k27q-9kcv-3fgh kernel: f2fs: don't set RO when shutting down f2fs CVE-2024-40969
VCID-k29n-spa9-uqdz kernel: ethtool: fail closed if we can&#39;t get max channel used in indirection tables CVE-2024-46834
VCID-k3bt-ws28-e3ex kernel: smb: client: fix use-after-free in smb2_query_info_compound() CVE-2023-52751
VCID-k48g-n4ka-fugh kernel: nvme: apple: fix device reference counting CVE-2024-43913
VCID-k68k-tnns-mkga kernel: ipv4: start using dst_dev_rcu() CVE-2025-40074
VCID-k9e5-ykzu-qyew kernel: drm/amd/display: Add null check for pipe_ctx-&gt;plane_state in dcn20_program_pipe CVE-2024-49914
VCID-ka1g-skuq-gqcs In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix possible deadlock between unlink and dio_end_io_write ocfs2_unlink takes orphan dir inode_lock first and then ip_alloc_sem, while in ocfs2_dio_end_io_write, it acquires these locks in reverse order. This creates an ABBA lock ordering violation on lock classes ocfs2_sysfile_lock_key[ORPHAN_DIR_SYSTEM_INODE] and ocfs2_file_ip_alloc_sem_key. Lock Chain #0 (orphan dir inode_lock -> ip_alloc_sem): ocfs2_unlink ocfs2_prepare_orphan_dir ocfs2_lookup_lock_orphan_dir inode_lock(orphan_dir_inode) <- lock A __ocfs2_prepare_orphan_dir ocfs2_prepare_dir_for_insert ocfs2_extend_dir ocfs2_expand_inline_dir down_write(&oi->ip_alloc_sem) <- Lock B Lock Chain #1 (ip_alloc_sem -> orphan dir inode_lock): ocfs2_dio_end_io_write down_write(&oi->ip_alloc_sem) <- Lock B ocfs2_del_inode_from_orphan() inode_lock(orphan_dir_inode) <- Lock A Deadlock Scenario: CPU0 (unlink) CPU1 (dio_end_io_write) ------ ------ inode_lock(orphan_dir_inode) down_write(ip_alloc_sem) down_write(ip_alloc_sem) inode_lock(orphan_dir_inode) Since ip_alloc_sem is to protect allocation changes, which is unrelated with operations in ocfs2_del_inode_from_orphan. So move ocfs2_del_inode_from_orphan out of ip_alloc_sem to fix the deadlock. CVE-2026-31598
VCID-ka7q-cx4u-rkar kernel: nvme-fabrics: use reserved tag for reg read/write command CVE-2024-41082
VCID-kbc5-2ek1-gfbd kernel: trace/fgraph: Fix the warning caused by missing unregister notifier CVE-2025-39829
VCID-kcca-um99-4ugp kernel: dlm: fix possible lkb_resource null dereference CVE-2024-47809
VCID-kcmk-1zxh-2yhv kernel: net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs CVE-2026-23340
VCID-kdf1-9mq7-2ue6 kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer CVE-2024-40965
VCID-kdmz-w6db-7ue2 In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check cdc_ncm_rx_verify_ndp16() validates that the NDP header and its DPE entries fit within the skb. The first check correctly accounts for ndpoffset: if ((ndpoffset + sizeof(struct usb_cdc_ncm_ndp16)) > skb_in->len) but the second check omits it: if ((sizeof(struct usb_cdc_ncm_ndp16) + ret * (sizeof(struct usb_cdc_ncm_dpe16))) > skb_in->len) This validates the DPE array size against the total skb length as if the NDP were at offset 0, rather than at ndpoffset. When the NDP is placed near the end of the NTB (large wNdpIndex), the DPE entries can extend past the skb data buffer even though the check passes. cdc_ncm_rx_fixup() then reads out-of-bounds memory when iterating the DPE array. Add ndpoffset to the nframes bounds check and use struct_size_t() to express the NDP-plus-DPE-array size more clearly. CVE-2026-23448
VCID-kg8v-183b-33ce kernel: rxrpc: Fix delayed ACKs to not set the reference serial number CVE-2024-26677
VCID-kgnw-n75c-mqe3 CVE-2026-31675
VCID-kgsv-ke1m-xkg5 kernel: LoongArch: Set hugetlb mmap base address aligned with pmd size CVE-2025-21949
VCID-kgv3-f25s-ckd5 kernel: Linux kernel KVM: Denial of Service due to uninitialized vCPU event handling CVE-2025-40102
VCID-khrd-ya2n-rygv kernel: net/sched: flower: Fix chain template offload CVE-2024-26669
VCID-kj4q-41ch-2bdx kernel: Linux kernel: uvcvideo Denial of Service from invalid UVC entity IDs CVE-2025-40016
VCID-kjn8-9h7n-dfab kernel: net: phy: phy_device: Prevent nullptr exceptions on ISR CVE-2024-35945
VCID-kk4c-najx-kyhq In the Linux kernel, the following vulnerability has been resolved: ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len() After this commit (e2b76ab8b5c9 "ksmbd: add support for read compound"), response buffer management was changed to use dynamic iov array. In the new design, smb2_calc_max_out_buf_len() expects the second argument (hdr2_len) to be the offset of ->Buffer field in the response structure, not a hardcoded magic number. Fix the remaining call sites to use the correct offsetof() value. CVE-2026-31478
VCID-kkmc-f6mq-xkfv kernel: drm/msm/dp: Drop aux devices together with DP controller CVE-2023-53851
VCID-kn25-f6gk-93fd kernel: drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401 CVE-2024-43901
VCID-kn32-aqhq-k7c5 In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: serialize lock/unlock against other NAND operations nand_lock() and nand_unlock() call into chip->ops.lock_area/unlock_area without holding the NAND device lock. On controllers that implement SET_FEATURES via multiple low-level PIO commands, these can race with concurrent UBI/UBIFS background erase/write operations that hold the device lock, resulting in cmd_pending conflicts on the NAND controller. Add nand_get_device()/nand_release_device() around the lock/unlock operations to serialize them against all other NAND controller access. CVE-2026-23434
VCID-kns4-65da-v3bc In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix cache_request leak in cache_release When a reader's file descriptor is closed while in the middle of reading a cache_request (rp->offset != 0), cache_release() decrements the request's readers count but never checks whether it should free the request. In cache_read(), when readers drops to 0 and CACHE_PENDING is clear, the cache_request is removed from the queue and freed along with its buffer and cache_head reference. cache_release() lacks this cleanup. The only other path that frees requests with readers == 0 is cache_dequeue(), but it runs only when CACHE_PENDING transitions from set to clear. If that transition already happened while readers was still non-zero, cache_dequeue() will have skipped the request, and no subsequent call will clean it up. Add the same cleanup logic from cache_read() to cache_release(): after decrementing readers, check if it reached 0 with CACHE_PENDING clear, and if so, dequeue and free the cache_request. CVE-2026-31400
VCID-kpkx-qwue-bff4 In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct() ctnetlink_dump_exp_ct() stores a conntrack pointer in cb->data for the netlink dump callback ctnetlink_exp_ct_dump_table(), but drops the conntrack reference immediately after netlink_dump_start(). When the dump spans multiple rounds, the second recvmsg() triggers the dump callback which dereferences the now-freed conntrack via nfct_help(ct), leading to a use-after-free on ct->ext. The bug is that the netlink_dump_control has no .start or .done callbacks to manage the conntrack reference across dump rounds. Other dump functions in the same file (e.g. ctnetlink_get_conntrack) properly use .start/.done callbacks for this purpose. Fix this by adding .start and .done callbacks that hold and release the conntrack reference for the duration of the dump, and move the nfct_help() call after the cb->args[0] early-return check in the dump callback to avoid dereferencing ct->ext unnecessarily. BUG: KASAN: slab-use-after-free in ctnetlink_exp_ct_dump_table+0x4f/0x2e0 Read of size 8 at addr ffff88810597ebf0 by task ctnetlink_poc/133 CPU: 1 UID: 0 PID: 133 Comm: ctnetlink_poc Not tainted 7.0.0-rc2+ #3 PREEMPTLAZY Call Trace: <TASK> ctnetlink_exp_ct_dump_table+0x4f/0x2e0 netlink_dump+0x333/0x880 netlink_recvmsg+0x3e2/0x4b0 ? aa_sk_perm+0x184/0x450 sock_recvmsg+0xde/0xf0 Allocated by task 133: kmem_cache_alloc_noprof+0x134/0x440 __nf_conntrack_alloc+0xa8/0x2b0 ctnetlink_create_conntrack+0xa1/0x900 ctnetlink_new_conntrack+0x3cf/0x7d0 nfnetlink_rcv_msg+0x48e/0x510 netlink_rcv_skb+0xc9/0x1f0 nfnetlink_rcv+0xdb/0x220 netlink_unicast+0x3ec/0x590 netlink_sendmsg+0x397/0x690 __sys_sendmsg+0xf4/0x180 Freed by task 0: slab_free_after_rcu_debug+0xad/0x1e0 rcu_core+0x5c3/0x9c0 CVE-2026-23458
VCID-kptu-sm1d-kuae kernel: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer CVE-2024-49919
VCID-kpyj-qqha-1udx kernel: bpf: Fail bpf_timer_cancel when callback is being cancelled CVE-2024-42239
VCID-ktsr-nq3s-33gt kernel: wifi: rtw88: Fix memory leak in rtw88_usb CVE-2023-53529
VCID-kv4f-h7zy-2yhd kernel: rxrpc: Fix recv-recv race of completed call CVE-2025-38524
VCID-kvbv-df49-gyaj In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request. CVE-2026-31402
VCID-kvq6-38sd-77h7 CVE-2026-31673
VCID-kw1q-k8cm-j7dj In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle invalid dinode in ocfs2_group_extend [BUG] kernel BUG at fs/ocfs2/resize.c:308! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI RIP: 0010:ocfs2_group_extend+0x10aa/0x1ae0 fs/ocfs2/resize.c:308 Code: 8b8520ff ffff83f8 860f8580 030000e8 5cc3c1fe Call Trace: ... ocfs2_ioctl+0x175/0x6e0 fs/ocfs2/ioctl.c:869 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x197/0x1e0 fs/ioctl.c:583 x64_sys_call+0x1144/0x26a0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x93/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e ... [CAUSE] ocfs2_group_extend() assumes that the global bitmap inode block returned from ocfs2_inode_lock() has already been validated and BUG_ONs when the signature is not a dinode. That assumption is too strong for crafted filesystems because the JBD2-managed buffer path can bypass structural validation and return an invalid dinode to the resize ioctl. [FIX] Validate the dinode explicitly in ocfs2_group_extend(). If the global bitmap buffer does not contain a valid dinode, report filesystem corruption with ocfs2_error() and fail the resize operation instead of crashing the kernel. CVE-2026-31596
VCID-kx5p-87fs-9kgw kernel: drm/amdgpu: Add basic validation for RAS header CVE-2025-38426
VCID-ky32-n1qj-nydf kernel: hv_netvsc: Don&#39;t free decrypted memory CVE-2024-36911
VCID-kye7-8mwh-eyc8 kernel: bnxt: properly flush XDP redirect lists CVE-2025-38246
VCID-kzsr-8hjr-gkf1 kernel: drm/amd/display: Do not return negative stream id for array CVE-2024-42118
VCID-m21d-1mj4-3bbn kernel: drm/msm: Fix pgtable prealloc error path CVE-2025-40247
VCID-m35k-ahnu-abh1 kernel: net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock() CVE-2026-23450
VCID-m3ch-q8dr-xkay In the Linux kernel, the following vulnerability has been resolved: HID: asus: avoid memory leak in asus_report_fixup() The asus_report_fixup() function was returning a newly allocated kmemdup()-allocated buffer, but never freeing it. Switch to devm_kzalloc() to ensure the memory is managed and freed automatically when the device is removed. The caller of report_fixup() does not take ownership of the returned pointer, but it is permitted to return a pointer whose lifetime is at least that of the input buffer. Also fix a harmless out-of-bounds read by copying only the original descriptor size. CVE-2026-31524
VCID-m4v3-xfhr-rbgt kernel: rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb() CVE-2024-49926
VCID-m4y2-16uk-wkdg kernel: exfat: add cluster chain loop check for dir CVE-2025-38692
VCID-m5bk-s7pe-cbd8 kernel: drm/amd/display: Fix out-of-bound accesses CVE-2025-21985
VCID-m6h1-8erq-dqb8 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop l2cap_config_req() processes CONFIG_REQ for channels in BT_CONNECTED state to support L2CAP reconfiguration (e.g. MTU changes). However, since both CONF_INPUT_DONE and CONF_OUTPUT_DONE are already set from the initial configuration, the reconfiguration path falls through to l2cap_ertm_init(), which re-initializes tx_q, srej_q, srej_list, and retrans_list without freeing the previous allocations and sets chan->sdu to NULL without freeing the existing skb. This leaks all previously allocated ERTM resources. Additionally, l2cap_parse_conf_req() does not validate the minimum value of remote_mps derived from the RFC max_pdu_size option. A zero value propagates to l2cap_segment_sdu() where pdu_len becomes zero, causing the while loop to never terminate since len is never decremented, exhausting all available memory. Fix the double-init by skipping l2cap_ertm_init() and l2cap_chan_ready() when the channel is already in BT_CONNECTED state, while still allowing the reconfiguration parameters to be updated through l2cap_parse_conf_req(). Also add a pdu_len zero check in l2cap_segment_sdu() as a safeguard. CVE-2026-31498
VCID-m6yv-nu11-ayg2 kernel: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue CVE-2024-26913
VCID-m773-z76s-8qad kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape CVE-2024-26962
VCID-m7cd-jefr-4ydy kernel: exfat: fix out-of-bounds access of directory entries CVE-2024-53147
VCID-m8n7-j86u-7ugj kernel: drm/amdkfd: range check cp bad op exception interrupts CVE-2024-36951
VCID-m995-b8rn-tkgk In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() In DecodeQ931(), the UserUserIE code path reads a 16-bit length from the packet, then decrements it by 1 to skip the protocol discriminator byte before passing it to DecodeH323_UserInformation(). If the encoded length is 0, the decrement wraps to -1, which is then passed as a large value to the decoder, leading to an out-of-bounds read. Add a check to ensure len is positive after the decrement. CVE-2026-23455
VCID-ma9f-puuw-bfge In the Linux kernel, the following vulnerability has been resolved: net: macb: Use dev_consume_skb_any() to free TX SKBs The napi_consume_skb() function is not intended to be called in an IRQ disabled context. However, after commit 6bc8a5098bf4 ("net: macb: Fix tx_ptr_lock locking"), the freeing of TX SKBs is performed with IRQs disabled. To resolve the following call trace, use dev_consume_skb_any() for freeing TX SKBs: WARNING: kernel/softirq.c:430 at __local_bh_enable_ip+0x174/0x188, CPU#0: ksoftirqd/0/15 Modules linked in: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 7.0.0-rc4-next-20260319-yocto-standard-dirty #37 PREEMPT Hardware name: ZynqMP ZCU102 Rev1.1 (DT) pstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __local_bh_enable_ip+0x174/0x188 lr : local_bh_enable+0x24/0x38 sp : ffff800082b3bb10 x29: ffff800082b3bb10 x28: ffff0008031f3c00 x27: 000000000011ede0 x26: ffff000800a7ff00 x25: ffff800083937ce8 x24: 0000000000017a80 x23: ffff000803243a78 x22: 0000000000000040 x21: 0000000000000000 x20: ffff000800394c80 x19: 0000000000000200 x18: 0000000000000001 x17: 0000000000000001 x16: ffff000803240000 x15: 0000000000000000 x14: ffffffffffffffff x13: 0000000000000028 x12: ffff000800395650 x11: ffff8000821d1528 x10: ffff800081c2bc08 x9 : ffff800081c1e258 x8 : 0000000100000301 x7 : ffff8000810426ec x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000008 x1 : 0000000000000200 x0 : ffff8000810428dc Call trace: __local_bh_enable_ip+0x174/0x188 (P) local_bh_enable+0x24/0x38 skb_attempt_defer_free+0x190/0x1d8 napi_consume_skb+0x58/0x108 macb_tx_poll+0x1a4/0x558 __napi_poll+0x50/0x198 net_rx_action+0x1f4/0x3d8 handle_softirqs+0x16c/0x560 run_ksoftirqd+0x44/0x80 smpboot_thread_fn+0x1d8/0x338 kthread+0x120/0x150 ret_from_fork+0x10/0x20 irq event stamp: 29751 hardirqs last enabled at (29750): [<ffff8000813be184>] _raw_spin_unlock_irqrestore+0x44/0x88 hardirqs last disabled at (29751): [<ffff8000813bdf60>] _raw_spin_lock_irqsave+0x38/0x98 softirqs last enabled at (29150): [<ffff8000800f1aec>] handle_softirqs+0x504/0x560 softirqs last disabled at (29153): [<ffff8000800f2fec>] run_ksoftirqd+0x44/0x80 CVE-2026-31563
VCID-madz-x835-s7cy In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: avoid memory leak in magicmouse_report_fixup() The magicmouse_report_fixup() function was returning a newly kmemdup()-allocated buffer, but never freeing it. The caller of report_fixup() does not take ownership of the returned pointer, but it *is* permitted to return a sub-portion of the input rdesc, whose lifetime is managed by the caller. CVE-2026-31522
VCID-mg8e-fpwg-rbg2 kernel: RDMA/mlx5: Fix the recovery flow of the UMR QP CVE-2025-21892
VCID-mgjc-55mm-kffq kernel: mISDN: hfcpci: Fix warning when deleting uninitialized timer CVE-2025-39833
VCID-mjbb-q1nx-8fgj kernel: Linux kernel (iavf): Denial of Service due to a locking issue CVE-2025-38311
VCID-mkjm-756w-5ygt kernel: Linux kernel: Use-after-free in traffic control (act_ct) may lead to denial of service or privilege escalation CVE-2026-23270
VCID-mkw6-9tye-x3fb kernel: nf_tables: nft_dynset: fix possible stateful expression memleak in error path CVE-2026-23399
VCID-mm1u-nfnt-nkaf kernel: net: enetc: fix the deadlock of enetc_mdio_lock CVE-2025-40347
VCID-mmsk-j6bt-wuh1 CVE-2026-23419
VCID-mp87-833h-4uag kernel: net: ibmveth: make veth_pool_store stop hanging CVE-2025-22053
VCID-mrh8-akgh-ybby kernel: btrfs: ensure no dirty metadata is written back for an fs with errors CVE-2025-40303
VCID-mrj8-hhte-77a4 kernel: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog CVE-2025-39859
VCID-msbv-kmj8-b7e8 kernel: nouveau: lock the client object tree. CVE-2024-27062
VCID-mt8z-wdzf-kugb kernel: f2fs: fix to avoid potential deadlock CVE-2025-71065
VCID-mtxh-7f6h-t3g4 kernel: HID: nintendo: avoid bluetooth suspend/resume stalls CVE-2025-38507
VCID-mu3y-rdt2-x3g1 kernel: net: hns3: don't auto enable misc vector CVE-2025-21651
VCID-mwv3-k49q-tfeu kernel: net: Fix icmp host relookup triggering ip_rt_bug CVE-2024-56647
VCID-mzg4-exh3-pugu In the Linux kernel, the following vulnerability has been resolved: btrfs: fix leak of kobject name for sub-group space_info When create_space_info_sub_group() allocates elements of space_info->sub_group[], kobject_init_and_add() is called for each element via btrfs_sysfs_add_space_info_type(). However, when check_removing_space_info() frees these elements, it does not call btrfs_sysfs_remove_space_info() on them. As a result, kobject_put() is not called and the associated kobj->name objects are leaked. This memory leak is reproduced by running the blktests test case zbd/009 on kernels built with CONFIG_DEBUG_KMEMLEAK. The kmemleak feature reports the following error: unreferenced object 0xffff888112877d40 (size 16): comm "mount", pid 1244, jiffies 4294996972 hex dump (first 16 bytes): 64 61 74 61 2d 72 65 6c 6f 63 00 c4 c6 a7 cb 7f data-reloc...... backtrace (crc 53ffde4d): __kmalloc_node_track_caller_noprof+0x619/0x870 kstrdup+0x42/0xc0 kobject_set_name_vargs+0x44/0x110 kobject_init_and_add+0xcf/0x150 btrfs_sysfs_add_space_info_type+0xfc/0x210 [btrfs] create_space_info_sub_group.constprop.0+0xfb/0x1b0 [btrfs] create_space_info+0x211/0x320 [btrfs] btrfs_init_space_info+0x15a/0x1b0 [btrfs] open_ctree+0x33c7/0x4a50 [btrfs] btrfs_get_tree.cold+0x9f/0x1ee [btrfs] vfs_get_tree+0x87/0x2f0 vfs_cmd_create+0xbd/0x280 __do_sys_fsconfig+0x3df/0x990 do_syscall_64+0x136/0x1540 entry_SYSCALL_64_after_hwframe+0x76/0x7e To avoid the leak, call btrfs_sysfs_remove_space_info() instead of kfree() for the elements. CVE-2026-31434
VCID-mzw8-vbmv-6yay kernel: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug CVE-2023-52629
VCID-n127-8kq6-1kb6 kernel: powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW CVE-2024-57999
VCID-n1tb-u9us-57bv kernel: Kernel: Race condition in espintcp can lead to denial of service CVE-2026-23239
VCID-n2ac-dtm2-sqa9 kernel: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race CVE-2026-23271
VCID-n2t8-afcr-sffj kernel: bpf: Forget ranges when refining tnum after JSET CVE-2025-39748
VCID-n4p8-dgkk-3bfr kernel: udmabuf: change folios array from kmalloc to kvmalloc CVE-2024-56544
VCID-n59e-jkf6-13bf kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously CVE-2022-3238
VCID-n5aj-87mh-hbbd kernel: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() CVE-2024-53056
VCID-n7kt-3rsy-rkg2 kernel: Linux kernel: Denial of Service in USB-audio MIDI driver due to improper timer shutdown CVE-2025-38105
VCID-n7w6-5y7w-gbcd kernel: ext4: avoid journaling sb update on error if journal is destroying CVE-2025-22113
VCID-n88t-yc67-r3f5 In the Linux kernel, the following vulnerability has been resolved: net: fix fanout UAF in packet_release() via NETDEV_UP race `packet_release()` has a race window where `NETDEV_UP` can re-register a socket into a fanout group's `arr[]` array. The re-registration is not cleaned up by `fanout_release()`, leaving a dangling pointer in the fanout array. `packet_release()` does NOT zero `po->num` in its `bind_lock` section. After releasing `bind_lock`, `po->num` is still non-zero and `po->ifindex` still matches the bound device. A concurrent `packet_notifier(NETDEV_UP)` that already found the socket in `sklist` can re-register the hook. For fanout sockets, this re-registration calls `__fanout_link(sk, po)` which adds the socket back into `f->arr[]` and increments `f->num_members`, but does NOT increment `f->sk_ref`. The fix sets `po->num` to zero in `packet_release` while `bind_lock` is held to prevent NETDEV_UP from linking, preventing the race window. This bug was found following an additional audit with Claude Code based on CVE-2025-38617. CVE-2026-31504
VCID-n8y5-74xq-f7ft kernel: can: usb: etas_es58x: correctly anchor the urb in the read bulk callback CVE-2026-23324
VCID-n99v-8wyx-a3cr In the Linux kernel, the following vulnerability has been resolved: ALSA: 6fire: fix use-after-free on disconnect In usb6fire_chip_abort(), the chip struct is allocated as the card's private data (via snd_card_new with sizeof(struct sfire_chip)). When snd_card_free_when_closed() is called and no file handles are open, the card and embedded chip are freed synchronously. The subsequent chip->card = NULL write then hits freed slab memory. Call trace: usb6fire_chip_abort sound/usb/6fire/chip.c:59 [inline] usb6fire_chip_disconnect+0x348/0x358 sound/usb/6fire/chip.c:182 usb_unbind_interface+0x1a8/0x88c drivers/usb/core/driver.c:458 ... hub_event+0x1a04/0x4518 drivers/usb/core/hub.c:5953 Fix by moving the card lifecycle out of usb6fire_chip_abort() and into usb6fire_chip_disconnect(). The card pointer is saved in a local before any teardown, snd_card_disconnect() is called first to prevent new opens, URBs are aborted while chip is still valid, and snd_card_free_when_closed() is called last so chip is never accessed after the card may be freed. CVE-2026-31581
VCID-nbnz-q819-f7g8 kernel: netfilter: nf_tables: avoid chain re-validation if possible CVE-2025-71160
VCID-ncy9-6whk-ckep kernel: ALSA: usb-audio: Prevent excessive number of frames CVE-2026-23208
VCID-ner2-8g1r-6bh5 kernel: serial: sc16is7xx: fix TX fifo corruption CVE-2024-44951
VCID-nfcw-pgwv-37dr kernel: smb: client: fix double free of TCP_Server_Info::hostname CVE-2025-21673
VCID-nfg3-jgk3-z7bk kernel: blk-mq: fix NULL dereference on q->elevator in blk_mq_elv_switch_none CVE-2023-53292
VCID-ng2z-3hcf-9uh8 kernel: net/mlx5e: Harden uplink netdev access against device unbind CVE-2025-39947
VCID-nhry-edgk-sbd6 kernel: smb: During unmount, ensure all cached dir instances drop their dentry CVE-2024-53176
VCID-nnnt-9vn7-rfc1 kernel: bpf: Fix accesses to uninit stack slots CVE-2023-52452
VCID-np3t-m158-k7he kernel: usb: typec: ucsi: Limit read size on v1.2 CVE-2024-35924
VCID-nr6b-wdnx-k7e6 kernel: RDMA/hns: Fix soft lockup under heavy CEQE load CVE-2024-43872
VCID-nrff-k45r-y7bj kernel: f2fs: fix race in concurrent f2fs_stop_gc_thread CVE-2024-53218
VCID-ns6g-c2p2-myf5 kernel: PCI: imx6: Fix suspend/resume support on i.MX6QDL CVE-2024-57809
VCID-nsa2-qgf5-xffq kernel: fsl/fman: Fix refcount handling of fman-related devices CVE-2024-50166
VCID-nsbf-fkcw-cbed CVE-2026-31407
VCID-ntqj-fmmb-b3g8 kernel: md: Don't register sync_thread for reshape directly CVE-2024-26756
VCID-nuhs-4sjq-dkcb kernel: inet: frags: flush pending skbs in fqdir_pre_exit() CVE-2025-68768
VCID-nv5d-ux4k-gbck kernel: bonding: change ipsec_lock from spin lock to mutex CVE-2024-46678
VCID-nv6q-r1kv-c7e3 kernel: net/mlx5e: xsk: Fix crash on regular rq reactivation CVE-2023-53394
VCID-nw2n-9b59-gbdm In the Linux kernel, the following vulnerability has been resolved: vfio/xe: Reorganize the init to decouple migration from reset Attempting to issue reset on VF devices that don't support migration leads to the following: BUG: unable to handle page fault for address: 00000000000011f8 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 2 UID: 0 PID: 7443 Comm: xe_sriov_flr Tainted: G S U 7.0.0-rc1-lgci-xe-xe-4588-cec43d5c2696af219-nodebug+ #1 PREEMPT(lazy) Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023 RIP: 0010:xe_sriov_vfio_wait_flr_done+0xc/0x80 [xe] Code: ff c3 cc cc cc cc 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 54 53 <83> bf f8 11 00 00 02 75 61 41 89 f4 85 f6 74 52 48 8b 47 08 48 89 RSP: 0018:ffffc9000f7c39b8 EFLAGS: 00010202 RAX: ffffffffa04d8660 RBX: ffff88813e3e4000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000f7c39c8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff888101a48800 R13: ffff88813e3e4150 R14: ffff888130d0d008 R15: ffff88813e3e40d0 FS: 00007877d3d0d940(0000) GS:ffff88890b6d3000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000011f8 CR3: 000000015a762000 CR4: 0000000000f52ef0 PKRU: 55555554 Call Trace: <TASK> xe_vfio_pci_reset_done+0x49/0x120 [xe_vfio_pci] pci_dev_restore+0x3b/0x80 pci_reset_function+0x109/0x140 reset_store+0x5c/0xb0 dev_attr_store+0x17/0x40 sysfs_kf_write+0x72/0x90 kernfs_fop_write_iter+0x161/0x1f0 vfs_write+0x261/0x440 ksys_write+0x69/0xf0 __x64_sys_write+0x19/0x30 x64_sys_call+0x259/0x26e0 do_syscall_64+0xcb/0x1500 ? __fput+0x1a2/0x2d0 ? fput_close_sync+0x3d/0xa0 ? __x64_sys_close+0x3e/0x90 ? x64_sys_call+0x1b7c/0x26e0 ? do_syscall_64+0x109/0x1500 ? __task_pid_nr_ns+0x68/0x100 ? __do_sys_getpid+0x1d/0x30 ? x64_sys_call+0x10b5/0x26e0 ? do_syscall_64+0x109/0x1500 ? putname+0x41/0x90 ? do_faccessat+0x1e8/0x300 ? __x64_sys_access+0x1c/0x30 ? x64_sys_call+0x1822/0x26e0 ? do_syscall_64+0x109/0x1500 ? tick_program_event+0x43/0xa0 ? hrtimer_interrupt+0x126/0x260 ? irqentry_exit+0xb2/0x710 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7877d5f1c5a4 Code: c7 00 16 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 80 3d a5 ea 0e 00 00 74 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 55 48 89 e5 48 83 ec 20 48 89 RSP: 002b:00007fff48e5f908 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007877d5f1c5a4 RDX: 0000000000000001 RSI: 00007877d621b0c9 RDI: 0000000000000009 RBP: 0000000000000001 R08: 00005fb49113b010 R09: 0000000000000007 R10: 0000000000000000 R11: 0000000000000202 R12: 00007877d621b0c9 R13: 0000000000000009 R14: 00007fff48e5fac0 R15: 00007fff48e5fac0 </TASK> This is caused by the fact that some of the xe_vfio_pci_core_device members needed for handling reset are only initialized as part of migration init. Fix the problem by reorganizing the code to decouple VF init from migration init. CVE-2026-31601
VCID-nw3c-5apn-zfhv kernel: net: fix segmentation of forwarding fraglist GRO CVE-2026-23154
VCID-nwn5-d5f1-rkbr kernel: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() CVE-2024-40998
VCID-p1cj-v8rw-rqf4 In the Linux kernel, the following vulnerability has been resolved: net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer smc_rx_splice() allocates one smc_spd_priv per pipe_buffer and stores the pointer in pipe_buffer.private. The pipe_buf_operations for these buffers used .get = generic_pipe_buf_get, which only increments the page reference count when tee(2) duplicates a pipe buffer. The smc_spd_priv pointer itself was not handled, so after tee() both the original and the cloned pipe_buffer share the same smc_spd_priv *. When both pipes are subsequently released, smc_rx_pipe_buf_release() is called twice against the same object: 1st call: kfree(priv) sock_put(sk) smc_rx_update_cons() [correct] 2nd call: kfree(priv) sock_put(sk) smc_rx_update_cons() [UAF] KASAN reports a slab-use-after-free in smc_rx_pipe_buf_release(), which then escalates to a NULL-pointer dereference and kernel panic via smc_rx_update_consumer() when it chases the freed priv->smc pointer: BUG: KASAN: slab-use-after-free in smc_rx_pipe_buf_release+0x78/0x2a0 Read of size 8 at addr ffff888004a45740 by task smc_splice_tee_/74 Call Trace: <TASK> dump_stack_lvl+0x53/0x70 print_report+0xce/0x650 kasan_report+0xc6/0x100 smc_rx_pipe_buf_release+0x78/0x2a0 free_pipe_info+0xd4/0x130 pipe_release+0x142/0x160 __fput+0x1c6/0x490 __x64_sys_close+0x4f/0x90 do_syscall_64+0xa6/0x1a0 entry_SYSCALL_64_after_hwframe+0x77/0x7f </TASK> BUG: kernel NULL pointer dereference, address: 0000000000000020 RIP: 0010:smc_rx_update_consumer+0x8d/0x350 Call Trace: <TASK> smc_rx_pipe_buf_release+0x121/0x2a0 free_pipe_info+0xd4/0x130 pipe_release+0x142/0x160 __fput+0x1c6/0x490 __x64_sys_close+0x4f/0x90 do_syscall_64+0xa6/0x1a0 entry_SYSCALL_64_after_hwframe+0x77/0x7f </TASK> Kernel panic - not syncing: Fatal exception Beyond the memory-safety problem, duplicating an SMC splice buffer is semantically questionable: smc_rx_update_cons() would advance the consumer cursor twice for the same data, corrupting receive-window accounting. A refcount on smc_spd_priv could fix the double-free, but the cursor-accounting issue would still need to be addressed separately. The .get callback is invoked by both tee(2) and splice_pipe_to_pipe() for partial transfers; both will now return -EFAULT. Users who need to duplicate SMC socket data must use a copy-based read path. CVE-2026-31507
VCID-p1cz-e94f-57c2 kernel: crypto: x86/aegis - Add missing error checks CVE-2025-39789
VCID-p1xn-hbgr-efby In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map The DAT inode's btree node cache (i_assoc_inode) is initialized lazily during btree operations. However, nilfs_mdt_save_to_shadow_map() assumes i_assoc_inode is already initialized when copying dirty pages to the shadow map during GC. If NILFS_IOCTL_CLEAN_SEGMENTS is called immediately after mount before any btree operation has occurred on the DAT inode, i_assoc_inode is NULL leading to a general protection fault. Fix this by calling nilfs_attach_btree_node_cache() on the DAT inode in nilfs_dat_read() at mount time, ensuring i_assoc_inode is always initialized before any GC operation can use it. CVE-2026-31577
VCID-p2gz-4gyx-ebbu In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib amdgpu_amdkfd_submit_ib() submits a GPU job and gets a fence from amdgpu_ib_schedule(). This fence is used to wait for job completion. Currently, the code drops the fence reference using dma_fence_put() before calling dma_fence_wait(). If dma_fence_put() releases the last reference, the fence may be freed before dma_fence_wait() is called. This can lead to a use-after-free. Fix this by waiting on the fence first and releasing the reference only after dma_fence_wait() completes. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.c:697 amdgpu_amdkfd_submit_ib() warn: passing freed memory 'f' (line 696) (cherry picked from commit 8b9e5259adc385b61a6590a13b82ae0ac2bd3482) CVE-2026-31566
VCID-p2ng-3bek-d3b6 kernel: fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST CVE-2025-71267
VCID-p31e-jzac-8kbe kernel: scsi: ufs: core: Fix use-after free in init error and remove paths CVE-2025-21739
VCID-p472-z1xz-r3cj kernel: io_uring/kbuf: re-using old struct io_buffer_list may lead to a use-after-free situation CVE-2025-21836
VCID-p47c-bn8d-6ka7 kernel: LoongArch: KVM: Mark hrtimer to expire in hard interrupt context CVE-2024-53089
VCID-p4as-tvvw-ubcu kernel: drm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range CVE-2024-46808
VCID-p4by-fm53-yybk CVE-2026-31425
VCID-p4nk-v455-puaf kernel: drm/amd/display: Check index for aux_rd_interval before using CVE-2024-46728
VCID-p4p8-hzzp-ake1 kernel: pmdomain: imx93-blk-ctrl: correct remove path CVE-2024-53134
VCID-p595-1qtr-tuae kernel: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled CVE-2026-23381
VCID-p6sm-vcng-mubd kernel: net: esp: fix bad handling of pages from page_pool CVE-2024-26953
VCID-p72b-szhh-wyd6 kernel: rxrpc: Make it so that a waiting process can be aborted CVE-2023-53218
VCID-p9x5-syxd-fufc kernel: io_uring/poll: fix multishot recv missing EOF on wakeup race CVE-2026-23473
VCID-padk-1w3h-7bfs kernel: cifs: fix memory leak in smb3_fs_context_parse_param error path CVE-2025-68219
VCID-pbby-yjrv-23hc kernel: media: vimc: skip .s_stream() for stopped entities CVE-2025-22028
VCID-pd3f-rmqx-cya3 kernel: staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() CVE-2025-38585
VCID-pepq-cqcb-dkdm kernel: net: add xmit recursion limit to tunnel xmit functions CVE-2026-23276
VCID-pest-xjma-sfbn In the Linux kernel, the following vulnerability has been resolved: media: em28xx: fix use-after-free in em28xx_v4l2_open() em28xx_v4l2_open() reads dev->v4l2 without holding dev->lock, creating a race with em28xx_v4l2_init()'s error path and em28xx_v4l2_fini(), both of which free the em28xx_v4l2 struct and set dev->v4l2 to NULL under dev->lock. This race leads to two issues: - use-after-free in v4l2_fh_init() when accessing vdev->ctrl_handler, since the video_device is embedded in the freed em28xx_v4l2 struct. - NULL pointer dereference in em28xx_resolution_set() when accessing v4l2->norm, since dev->v4l2 has been set to NULL. Fix this by moving the mutex_lock() before the dev->v4l2 read and adding a NULL check for dev->v4l2 under the lock. CVE-2026-31583
VCID-pg2a-j1hc-83hr kernel: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg CVE-2024-49568
VCID-pgrh-f1dv-27dh In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup Disable the delayed work before clearing BAR mappings and doorbells to avoid running the handler after resources have been torn down. Unable to handle kernel paging request at virtual address ffff800083f46004 [...] Internal error: Oops: 0000000096000007 [#1] SMP [...] Call trace: epf_ntb_cmd_handler+0x54/0x200 [pci_epf_vntb] (P) process_one_work+0x154/0x3b0 worker_thread+0x2c8/0x400 kthread+0x148/0x210 ret_from_fork+0x10/0x20 CVE-2026-31595
VCID-pj46-9jp7-33ha In the Linux kernel, the following vulnerability has been resolved: media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections syzbot reported a general protection fault in vidtv_psi_desc_assign [1]. vidtv_psi_pmt_stream_init() can return NULL on memory allocation failure, but vidtv_channel_pmt_match_sections() does not check for this. When tail is NULL, the subsequent call to vidtv_psi_desc_assign(&tail->descriptor, desc) dereferences a NULL pointer offset, causing a general protection fault. Add a NULL check after vidtv_psi_pmt_stream_init(). On failure, clean up the already-allocated stream chain and return. [1] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:vidtv_psi_desc_assign+0x24/0x90 drivers/media/test-drivers/vidtv/vidtv_psi.c:629 Call Trace: <TASK> vidtv_channel_pmt_match_sections drivers/media/test-drivers/vidtv/vidtv_channel.c:349 [inline] vidtv_channel_si_init+0x1445/0x1a50 drivers/media/test-drivers/vidtv/vidtv_channel.c:479 vidtv_mux_init+0x526/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:519 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline] vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 CVE-2026-31599
VCID-pk74-dafk-e3gj kernel: drm/amdgpu: change vm-&gt;task_info handling CVE-2024-41008
VCID-pmn9-t8by-myhb In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly. CVE-2026-31431
VCID-pnfa-xm28-w3bk kernel: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() CVE-2026-23304
VCID-ppa4-r2pf-v7a2 In the Linux kernel, the following vulnerability has been resolved: Input: uinput - fix circular locking dependency with ff-core A lockdep circular locking dependency warning can be triggered reproducibly when using a force-feedback gamepad with uinput (for example, playing ELDEN RING under Wine with a Flydigi Vader 5 controller): ff->mutex -> udev->mutex -> input_mutex -> dev->mutex -> ff->mutex The cycle is caused by four lock acquisition paths: 1. ff upload: input_ff_upload() holds ff->mutex and calls uinput_dev_upload_effect() -> uinput_request_submit() -> uinput_request_send(), which acquires udev->mutex. 2. device create: uinput_ioctl_handler() holds udev->mutex and calls uinput_create_device() -> input_register_device(), which acquires input_mutex. 3. device register: input_register_device() holds input_mutex and calls kbd_connect() -> input_register_handle(), which acquires dev->mutex. 4. evdev release: evdev_release() calls input_flush_device() under dev->mutex, which calls input_ff_flush() acquiring ff->mutex. Fix this by introducing a new state_lock spinlock to protect udev->state and udev->dev access in uinput_request_send() instead of acquiring udev->mutex. The function only needs to atomically check device state and queue an input event into the ring buffer via uinput_dev_event() -- both operations are safe under a spinlock (ktime_get_ts64() and wake_up_interruptible() do not sleep). This breaks the ff->mutex -> udev->mutex link since a spinlock is a leaf in the lock ordering and cannot form cycles with mutexes. To keep state transitions visible to uinput_request_send(), protect writes to udev->state in uinput_create_device() and uinput_destroy_device() with the same state_lock spinlock. Additionally, move init_completion(&request->done) from uinput_request_send() to uinput_request_submit() before uinput_request_reserve_slot(). Once the slot is allocated, uinput_flush_requests() may call complete() on it at any time from the destroy path, so the completion must be initialised before the request becomes visible. Lock ordering after the fix: ff->mutex -> state_lock (spinlock, leaf) udev->mutex -> state_lock (spinlock, leaf) udev->mutex -> input_mutex -> dev->mutex -> ff->mutex (no back-edge) CVE-2026-31667
VCID-ppgp-v6th-y3ar kernel: smb: client: Fix use-after-free of network namespace. CVE-2024-53095
VCID-ppyy-4rvt-gydv kernel: KVM: arm64: Check the untrusted offset in FF-A memory share CVE-2025-40266
VCID-psqs-wgmf-57d8 kernel: ksmbd: fix WARNING "do not call blocking ops when !TASK_RUNNING" CVE-2025-37802
VCID-ptyj-1y6d-dud1 kernel: Linux kernel: Denial of Service via unsafe requeue in rxrpc_recvmsg CVE-2026-23066
VCID-puhc-5h95-13ff kernel: Kernel: Bluetooth HCI local DoS CVE-2024-58241
VCID-purc-p6w1-1fhc In the Linux kernel, the following vulnerability has been resolved: futex: Clear stale exiting pointer in futex_lock_pi() retry path Fuzzying/stressing futexes triggered: WARNING: kernel/futex/core.c:825 at wait_for_owner_exiting+0x7a/0x80, CPU#11: futex_lock_pi_s/524 When futex_lock_pi_atomic() sees the owner is exiting, it returns -EBUSY and stores a refcounted task pointer in 'exiting'. After wait_for_owner_exiting() consumes that reference, the local pointer is never reset to nil. Upon a retry, if futex_lock_pi_atomic() returns a different error, the bogus pointer is passed to wait_for_owner_exiting(). CPU0 CPU1 CPU2 futex_lock_pi(uaddr) // acquires the PI futex exit() futex_cleanup_begin() futex_state = EXITING; futex_lock_pi(uaddr) futex_lock_pi_atomic() attach_to_pi_owner() // observes EXITING *exiting = owner; // takes ref return -EBUSY wait_for_owner_exiting(-EBUSY, owner) put_task_struct(); // drops ref // exiting still points to owner goto retry; futex_lock_pi_atomic() lock_pi_update_atomic() cmpxchg(uaddr) *uaddr ^= WAITERS // whatever // value changed return -EAGAIN; wait_for_owner_exiting(-EAGAIN, exiting) // stale WARN_ON_ONCE(exiting) Fix this by resetting upon retry, essentially aligning it with requeue_pi. CVE-2026-31555
VCID-pva7-b7rk-ykam CVE-2026-31410
VCID-pwd1-juze-77bx kernel: arm64: io: Extract user memory type in ioremap_prot() CVE-2026-23346
VCID-pytf-9ehq-ykc5 In the Linux kernel, the following vulnerability has been resolved: ext4: reject mount if bigalloc with s_first_data_block != 0 bigalloc with s_first_data_block != 0 is not supported, reject mounting it. CVE-2026-31447
VCID-q1ts-48c2-xkgb kernel: l2tp: prevent possible tunnel refcount underflow CVE-2024-49940
VCID-q2nc-hdcj-gfdm kernel: btrfs: do not BUG_ON() when freeing tree block after error CVE-2024-44963
VCID-q36y-yr48-k3ex In the Linux kernel, the following vulnerability has been resolved: NFC: nxp-nci: allow GPIOs to sleep Allow the firmware and enable GPIOs to sleep. This fixes a `WARN_ON' and allows the driver to operate GPIOs which are connected to I2C GPIO expanders. -- >8 -- kernel: WARNING: CPU: 3 PID: 2636 at drivers/gpio/gpiolib.c:3880 gpiod_set_value+0x88/0x98 -- >8 -- CVE-2026-31545
VCID-q3hg-ug68-cffr kernel: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data CVE-2025-68342
VCID-q5ky-7fqu-efcs kernel: kvm: s390: Reject memory region operations for ucontrol VMs CVE-2024-43819
VCID-q7a3-cm2m-ayga kernel: smc: Fix use-after-free in __pnet_find_base_ndev() CVE-2025-40064
VCID-q7ty-xfyp-cbff kernel: net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY CVE-2025-37945
VCID-q8p1-em5q-wuhw kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd CVE-2025-21969
VCID-qa1s-pr21-cycs kernel: Kernel: Denial of Service via DVB DVR ringbuffer reinitialization flaw CVE-2026-23253
VCID-qdxg-kymb-mqdb kernel: net: decrease cached dst counters in dst_release CVE-2025-22057
VCID-qffu-7n92-bbhy In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid boot crash in RedBoot partition table parser Given CONFIG_FORTIFY_SOURCE=y and a recent compiler, commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when available") produces the warning below and an oops. Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000 ------------[ cut here ]------------ WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1 memcmp: detected buffer overflow: 15 byte read of buffer size 14 Modules linked in: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE As Kees said, "'names' is pointing to the final 'namelen' many bytes of the allocation ... 'namelen' could be basically any length at all. This fortify warning looks legit to me -- this code used to be reading beyond the end of the allocation." Since the size of the dynamic allocation is calculated with strlen() we can use strcmp() instead of memcmp() and remain within bounds. CVE-2026-23474
VCID-qg8t-cx91-c7e3 kernel: f2fs: fix to shrink read extent node in batches CVE-2024-41935
VCID-qje4-3svy-5kg8 kernel: net: stmmac: move the EST lock to struct stmmac_priv CVE-2024-38594
VCID-qjqb-cqc9-17e1 kernel: use-after-free in drivers/net/usb/lan78xx.c in lan78xx_disconnect CVE-2023-6039
VCID-qjup-fvr1-xybc kernel: ksmbd: add bounds check for durable handle context CVE-2025-22043
VCID-qk2m-qzes-qfhu kernel: leds: an30259a: Use devm_mutex_init() for mutex initialization CVE-2024-42128
VCID-qmuk-1txu-z3da kernel: Squashfs: check metadata block offset is within range CVE-2026-23388
VCID-qsdm-cyzs-aufy CVE-2026-31414
VCID-qucs-qaj4-q7cf kernel: btrfs: zoned: fix use-after-free in do_zone_finish() CVE-2024-26944
VCID-qweq-8dcb-x7eb kernel: gfs2: Validate i_depth for exhash directories CVE-2025-38710
VCID-qwre-yeev-uya8 kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend CVE-2024-27057
VCID-qx21-w7wn-tqap kernel: f2fs: fix to do sanity check on node footer in {read,write}_end_io CVE-2026-23265
VCID-qxd4-7ack-dkaf kernel: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc() CVE-2025-39910
VCID-qxth-4ftd-s3ac kernel: media: mediatek: vcodec: Only free buffer VA that is not NULL CVE-2023-52888
VCID-qyu2-kw7b-1kg1 kernel: riscv: VMAP_STACK overflow detection thread-safe CVE-2023-52761
VCID-qyxy-uh9d-fqhr kernel: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() CVE-2026-23335
VCID-qzb2-2zd9-5kf4 kernel: drm/amd/display: Disable DMCUB timeout for DCN35 CVE-2024-46870
VCID-r23v-vjat-6qdk kernel: ice: protect XDP configuration with a mutex CVE-2024-46765
VCID-r4kz-m7m8-c3b2 In the Linux kernel, the following vulnerability has been resolved: i2c: s3c24xx: check the size of the SMBUS message before using it The first byte of an i2c SMBUS message is the size, and it should be verified to ensure that it is in the range of 0..I2C_SMBUS_BLOCK_MAX before processing it. This is the same logic that was added in commit a6e04f05ce0b ("i2c: tegra: check msg length in SMBUS block read") to the i2c tegra driver. CVE-2026-31627
VCID-r4zk-9j6t-uyhg kernel: Bluetooth: MGMT: Fix possible UAFs CVE-2025-39981
VCID-r76g-d7px-hqff kernel: net/sched: ets: fix divide by zero in the offload path CVE-2026-23379
VCID-r7fp-rb7m-b7gs CVE-2026-31427
VCID-r89h-js19-77dr In the Linux kernel, the following vulnerability has been resolved: ext4: fix use-after-free in update_super_work when racing with umount Commit b98535d09179 ("ext4: fix bug_on in start_this_handle during umount filesystem") moved ext4_unregister_sysfs() before flushing s_sb_upd_work to prevent new error work from being queued via /proc/fs/ext4/xx/mb_groups reads during unmount. However, this introduced a use-after-free because update_super_work calls ext4_notify_error_sysfs() -> sysfs_notify() which accesses the kobject's kernfs_node after it has been freed by kobject_del() in ext4_unregister_sysfs(): update_super_work ext4_put_super ----------------- -------------- ext4_unregister_sysfs(sb) kobject_del(&sbi->s_kobj) __kobject_del() sysfs_remove_dir() kobj->sd = NULL sysfs_put(sd) kernfs_put() // RCU free ext4_notify_error_sysfs(sbi) sysfs_notify(&sbi->s_kobj) kn = kobj->sd // stale pointer kernfs_get(kn) // UAF on freed kernfs_node ext4_journal_destroy() flush_work(&sbi->s_sb_upd_work) Instead of reordering the teardown sequence, fix this by making ext4_notify_error_sysfs() detect that sysfs has already been torn down by checking s_kobj.state_in_sysfs, and skipping the sysfs_notify() call in that case. A dedicated mutex (s_error_notify_mutex) serializes ext4_notify_error_sysfs() against kobject_del() in ext4_unregister_sysfs() to prevent TOCTOU races where the kobject could be deleted between the state_in_sysfs check and the sysfs_notify() call. CVE-2026-31446
VCID-r99q-4cst-dbem kernel: md/raid1,raid10: don't ignore IO flags CVE-2025-22125
VCID-rayk-m71k-pkd5 kernel: drm/amd/display: Add NULL check for clk_mgr and clk_mgr-&gt;funcs in dcn401_init_hw CVE-2024-49916
VCID-rbua-nn9a-kfb9 kernel: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP CVE-2023-54263
VCID-rdch-b3ck-qugc kernel: drm/amd/display: Fix hang/underflow when transitioning to ODM4:1 CVE-2023-52671
VCID-rffh-vskt-b7ga kernel: net/mlx5e: Remove skb secpath if xfrm state is not found CVE-2025-38590
VCID-rh4e-sbew-nkbm kernel: virtio: break and reset virtio devices on device_shutdown() CVE-2025-38064
VCID-rjdd-dk1r-subd kernel: blk-cgroup: hold queue_lock when removing blkg->q_node CVE-2023-54088
VCID-rjgp-ta5t-vqge kernel: xfrm: Duplicate SPI Handling CVE-2025-39797
VCID-rjuh-7kkv-3qch kernel: btrfs: do proper folio cleanup when cow_file_range() failed CVE-2024-57976
VCID-rkqz-erqh-dfh4 In the Linux kernel, the following vulnerability has been resolved: btrfs: log new dentries when logging parent dir of a conflicting inode If we log the parent directory of a conflicting inode, we are not logging the new dentries of the directory, so when we finish we have the parent directory's inode marked as logged but we did not log its new dentries. As a consequence if the parent directory is explicitly fsynced later and it does not have any new changes since we logged it, the fsync is a no-op and after a power failure the new dentries are missing. Example scenario: $ mkdir foo $ sync $rmdir foo $ mkdir dir1 $ mkdir dir2 # A file with the same name and parent as the directory we just deleted # and was persisted in a past transaction. So the deleted directory's # inode is a conflicting inode of this new file's inode. $ touch foo $ ln foo dir2/link # The fsync on dir2 will log the parent directory (".") because the # conflicting inode (deleted directory) does not exists anymore, but it # it does not log its new dentries (dir1). $ xfs_io -c "fsync" dir2 # This fsync on the parent directory is no-op, since the previous fsync # logged it (but without logging its new dentries). $ xfs_io -c "fsync" . <power failure> # After log replay dir1 is missing. Fix this by ensuring we log new dir dentries whenever we log the parent directory of a no longer existing conflicting inode. A test case for fstests will follow soon. CVE-2026-23465
VCID-rmuw-t9j1-sygw kernel: blk-mq: fix potential deadlock while nr_requests grown CVE-2025-40146
VCID-rq73-h79m-hqhy kernel: ksmbd: Fix UAF in __close_file_table_ids CVE-2025-37952
VCID-rrxa-r3j8-ubh3 In the Linux kernel, the following vulnerability has been resolved: media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex MEDIA_REQUEST_IOC_REINIT can run concurrently with VIDIOC_REQBUFS(0) queue teardown paths. This can race request object cleanup against vb2 queue cancellation and lead to use-after-free reports. We already serialize request queueing against STREAMON/OFF with req_queue_mutex. Extend that serialization to REQBUFS, and also take the same mutex in media_request_ioctl_reinit() so REINIT is in the same exclusion domain. This keeps request cleanup and queue cancellation from running in parallel for request-capable devices. CVE-2026-31473
VCID-rsny-tzcn-nbhu In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom Since upstream commit e75665dd0968 ("wifi: wlcore: ensure skb headroom before skb_push"), wl1271_tx_allocate() and with it wl1271_prepare_tx_frame() returns -EAGAIN if pskb_expand_head() fails. However, in wlcore_tx_work_locked(), a return value of -EAGAIN from wl1271_prepare_tx_frame() is interpreted as the aggregation buffer being full. This causes the code to flush the buffer, put the skb back at the head of the queue, and immediately retry the same skb in a tight while loop. Because wlcore_tx_work_locked() holds wl->mutex, and the retry happens immediately with GFP_ATOMIC, this will result in an infinite loop and a CPU soft lockup. Return -ENOMEM instead so the packet is dropped and the loop terminates. The problem was found by an experimental code review agent based on gemini-3.1-pro while reviewing backports into v6.18.y. CVE-2026-31552
VCID-rsz5-e5fc-syh2 kernel: ax25: Remove broken autobind CVE-2025-22109
VCID-rudf-s931-1qct kernel: nvme-tcp: sanitize request list handling CVE-2025-38264
VCID-rup3-z1qu-j3hr kernel: thermal: core: Reference count the zone in thermal_zone_get_by_id() CVE-2024-50028
VCID-ruxz-24k9-sbcf In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() A malicious USB device claiming to be a CDC Phonet modem can overflow the skb_shared_info->frags[] array by sending an unbounded sequence of full-page bulk transfers. Drop the skb and increment the length error when the frag limit is reached. This matches the same fix that commit f0813bcd2d9d ("net: wwan: t7xx: fix potential skb->frags overflow in RX path") did for the t7xx driver. CVE-2026-31623
VCID-rv7g-3bjt-qkgc In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix memory leak when a wq is reset idxd_wq_disable_cleanup() which is called from the reset path for a workqueue, sets the wq type to NONE, which for other parts of the driver mean that the wq is empty (all its resources were released). Only set the wq type to NONE after its resources are released. CVE-2026-31441
VCID-rw71-ued5-jfg4 kernel: net: stmmac: Correctly handle Rx checksum offload errors CVE-2025-40337
VCID-rwfc-mzfg-akft kernel: pNFS: Fix a deadlock when returning a delegation during open() CVE-2026-23050
VCID-rxej-y11f-tbca kernel: bpf: Fix stackmap overflow check in __bpf_get_stackid() CVE-2025-68378
VCID-rzvj-774t-cqf8 kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' CVE-2024-26672
VCID-s3mt-8hwh-xkgm In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. syzbot reported static_branch_dec() underflow in aql_enable_write(). [0] The problem is that aql_enable_write() does not serialise concurrent write()s to the debugfs. aql_enable_write() checks static_key_false(&aql_disable.key) and later calls static_branch_inc() or static_branch_dec(), but the state may change between the two calls. aql_disable does not need to track inc/dec. Let's use static_branch_enable() and static_branch_disable(). [0]: val == 0 WARNING: kernel/jump_label.c:311 at __static_key_slow_dec_cpuslocked.part.0+0x107/0x120 kernel/jump_label.c:311, CPU#0: syz.1.3155/20288 Modules linked in: CPU: 0 UID: 0 PID: 20288 Comm: syz.1.3155 Tainted: G U L syzkaller #0 PREEMPT(full) Tainted: [U]=USER, [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 RIP: 0010:__static_key_slow_dec_cpuslocked.part.0+0x107/0x120 kernel/jump_label.c:311 Code: f2 c9 ff 5b 5d c3 cc cc cc cc e8 54 f2 c9 ff 48 89 df e8 ac f9 ff ff eb ad e8 45 f2 c9 ff 90 0f 0b 90 eb a2 e8 3a f2 c9 ff 90 <0f> 0b 90 eb 97 48 89 df e8 5c 4b 33 00 e9 36 ff ff ff 0f 1f 80 00 RSP: 0018:ffffc9000b9f7c10 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffffffff9b3e5d40 RCX: ffffffff823c57b4 RDX: ffff8880285a0000 RSI: ffffffff823c5846 RDI: ffff8880285a0000 RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 000000000000000a R13: 1ffff9200173ef88 R14: 0000000000000001 R15: ffffc9000b9f7e98 FS: 00007f530dd726c0(0000) GS:ffff8881245e3000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000001140 CR3: 000000007cc4a000 CR4: 00000000003526f0 Call Trace: <TASK> __static_key_slow_dec_cpuslocked kernel/jump_label.c:297 [inline] __static_key_slow_dec kernel/jump_label.c:321 [inline] static_key_slow_dec+0x7c/0xc0 kernel/jump_label.c:336 aql_enable_write+0x2b2/0x310 net/mac80211/debugfs.c:343 short_proxy_write+0x133/0x1a0 fs/debugfs/file.c:383 vfs_write+0x2aa/0x1070 fs/read_write.c:684 ksys_pwrite64 fs/read_write.c:793 [inline] __do_sys_pwrite64 fs/read_write.c:801 [inline] __se_sys_pwrite64 fs/read_write.c:798 [inline] __x64_sys_pwrite64+0x1eb/0x250 fs/read_write.c:798 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc9/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f530cf9aeb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f530dd72028 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 RAX: ffffffffffffffda RBX: 00007f530d215fa0 RCX: 00007f530cf9aeb9 RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000010 RBP: 00007f530d008c1f R08: 0000000000000000 R09: 0000000000000000 R10: 4200000000000005 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f530d216038 R14: 00007f530d215fa0 R15: 00007ffde89fb978 </TASK> CVE-2026-31551
VCID-s5k9-u1uk-3be8 kernel: Linux kernel: Denial of Service in ublk due to deadlock when reading partition table CVE-2025-68823
VCID-s9mp-wsn8-cycf kernel: accel/habanalabs: support mapping cb with vmalloc-backed coherent memory CVE-2025-40311
VCID-sdwv-6ycc-9ubh kernel: media: ipu-bridge: Fix null pointer deref on SSDB/PLD parsing warnings CVE-2023-53336
VCID-sjam-bp41-27f4 kernel: net: usb: kalmia: validate USB endpoints CVE-2026-23365
VCID-sk93-hxg5-yffv kernel: erofs: handle overlapped pclusters out of crafted images properly CVE-2024-47736
VCID-skjn-kete-x7e1 kernel: net: stmmac: fix TSO DMA API usage causing oops CVE-2024-56719
VCID-sm3v-84rs-nyem In the Linux kernel, the following vulnerability has been resolved: net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect syzkaller reported a bug [1], and the reproducer is available at [2]. ROSE sockets use four sk->sk_state values: TCP_CLOSE, TCP_LISTEN, TCP_SYN_SENT, and TCP_ESTABLISHED. rose_connect() already rejects calls for TCP_ESTABLISHED (-EISCONN) and TCP_CLOSE with SS_CONNECTING (-ECONNREFUSED), but lacks a check for TCP_SYN_SENT. When rose_connect() is called a second time while the first connection attempt is still in progress (TCP_SYN_SENT), it overwrites rose->neighbour via rose_get_neigh(). If that returns NULL, the socket is left with rose->state == ROSE_STATE_1 but rose->neighbour == NULL. When the socket is subsequently closed, rose_release() sees ROSE_STATE_1 and calls rose_write_internal() -> rose_transmit_link(skb, NULL), causing a NULL pointer dereference. Per connect(2), a second connect() while a connection is already in progress should return -EALREADY. Add this missing check for TCP_SYN_SENT to complete the state validation in rose_connect(). [1] https://syzkaller.appspot.com/bug?extid=d00f90e0af54102fb271 [2] https://gist.github.com/mrpre/9e6779e0d13e2c66779b1653fef80516 CVE-2026-23460
VCID-sne8-13hq-mqan kernel: netfilter: nf_tables: unconditionally bump set->nelems before insertion CVE-2026-23272
VCID-spab-qnhh-vqap kernel: irqchip/sifive-plic: Fix frozen interrupt due to affinity setting CVE-2026-23287
VCID-sq9c-y7kc-1yga kernel: f2fs: fix null-ptr-deref in f2fs_submit_page_bio() CVE-2024-53221
VCID-sqf7-4e8r-7ken kernel: wifi: mac80211: fix NULL deref in mesh_matches_local() CVE-2026-23396
VCID-sqkd-cwbk-tkec In the Linux kernel, the following vulnerability has been resolved: staging: sm750fb: fix division by zero in ps_to_hz() ps_to_hz() is called from hw_sm750_crtc_set_mode() without validating that pixclock is non-zero. A zero pixclock passed via FBIOPUT_VSCREENINFO causes a division by zero. Fix by rejecting zero pixclock in lynxfb_ops_check_var(), consistent with other framebuffer drivers. CVE-2026-31603
VCID-st59-ndz1-1yc5 kernel: f2fs: fix to do sanity check on node blkaddr in truncate_node() CVE-2024-56692
VCID-stma-rnkr-c3ef kernel: s390/pkey: Wipe copies of protected- and secure-keys CVE-2024-42155
VCID-susc-ysbn-eqbn kernel: RDMA/mlx5: Fix a WARN during dereg_mr for DM type CVE-2025-21888
VCID-sv2x-sud7-9fcv In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Limit BO list entry count to prevent resource exhaustion Userspace can pass an arbitrary number of BO list entries via the bo_number field. Although the previous multiplication overflow check prevents out-of-bounds allocation, a large number of entries could still cause excessive memory allocation (up to potentially gigabytes) and unnecessarily long list processing times. Introduce a hard limit of 128k entries per BO list, which is more than sufficient for any realistic use case (e.g., a single list containing all buffers in a large scene). This prevents memory exhaustion attacks and ensures predictable performance. Return -EINVAL if the requested entry count exceeds the limit (cherry picked from commit 688b87d39e0aa8135105b40dc167d74b5ada5332) CVE-2026-23468
VCID-sv8j-57vx-9ubs kernel: drm/amd/display: Ensure array index tg_inst won&#39;t be -1 CVE-2024-46730
VCID-svm7-nyr5-kfa3 kernel: atm: lec: fix null-ptr-deref in lec_arp_clear_vccs CVE-2026-23286
VCID-sx8s-kw5x-myea In the Linux kernel, the following vulnerability has been resolved: pmdomain: bcm: bcm2835-power: Increase ASB control timeout The bcm2835_asb_control() function uses a tight polling loop to wait for the ASB bridge to acknowledge a request. During intensive workloads, this handshake intermittently fails for V3D's master ASB on BCM2711, resulting in "Failed to disable ASB master for v3d" errors during runtime PM suspend. As a consequence, the failed power-off leaves V3D in a broken state, leading to bus faults or system hangs on later accesses. As the timeout is insufficient in some scenarios, increase the polling timeout from 1us to 5us, which is still negligible in the context of a power domain transition. Also, replace the open-coded ktime_get_ns()/ cpu_relax() polling loop with readl_poll_timeout_atomic(). CVE-2026-31550
VCID-sxyp-anqf-z3hq In the Linux kernel, the following vulnerability has been resolved: net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit() When dma_map_single() fails in tse_start_xmit(), the function returns NETDEV_TX_OK without freeing the skb. Since NETDEV_TX_OK tells the stack the packet was consumed, the skb is never freed, leaking memory on every DMA mapping failure. Add dev_kfree_skb_any() before returning to properly free the skb. CVE-2026-31658
VCID-sy3c-f5q7-qygm kernel: icmp: fix NULL pointer dereference in icmp_tag_validation() CVE-2026-23398
VCID-syxu-a4az-qfe4 kernel: block/rq_qos: protect rq_qos apis with a new lock CVE-2023-53823
VCID-szdg-jd74-r7g1 kernel: wifi: mac80211: don't WARN for connections on invalid channels CVE-2025-71227
VCID-szq9-t587-83h2 In the Linux kernel, the following vulnerability has been resolved: smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() smb_direct_flush_send_list() already calls smb_direct_free_sendmsg(), so we should not call it again after post_sendmsg() moved it to the batch list. CVE-2026-31608
VCID-t2sv-vqq2-q7av kernel: netfilter: nf_tables: always walk all pending catchall elements CVE-2026-23278
VCID-t5y5-2hne-7keh kernel: net: dsa: improve shutdown sequence CVE-2024-49998
VCID-t5z7-w31u-j7gs kernel: virtiofs: use pages instead of pointer for kernel direct IO CVE-2024-53219
VCID-t644-dxrr-2qhp kernel: LoongArch: BPF: Sign extend kfunc call arguments CVE-2025-71129
VCID-t8we-jmxu-k3bf kernel: sched/rt: Fix race in push_rt_task CVE-2025-38234
VCID-t9de-4jgf-wuc7 kernel: smb: Don't leak cfid when reconnect races with open_cached_dir CVE-2024-53178
VCID-tafy-p8yj-ukdv CVE-2026-31531
VCID-tb3q-ndrt-mkg3 kernel: wifi: iwlwifi: read txq-&gt;read_ptr under lock CVE-2024-36922
VCID-tb98-2sh1-67d4 In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Check set_default_submission() before deferencing When the i915 driver firmware binaries are not present, the set_default_submission pointer is not set. This pointer is dereferenced during suspend anyways. Add a check to make sure it is set before dereferencing. [ 23.289926] PM: suspend entry (deep) [ 23.293558] Filesystems sync: 0.000 seconds [ 23.298010] Freezing user space processes [ 23.302771] Freezing user space processes completed (elapsed 0.000 seconds) [ 23.309766] OOM killer disabled. [ 23.313027] Freezing remaining freezable tasks [ 23.318540] Freezing remaining freezable tasks completed (elapsed 0.001 seconds) [ 23.342038] serial 00:05: disabled [ 23.345719] serial 00:02: disabled [ 23.349342] serial 00:01: disabled [ 23.353782] sd 0:0:0:0: [sda] Synchronizing SCSI cache [ 23.358993] sd 1:0:0:0: [sdb] Synchronizing SCSI cache [ 23.361635] ata1.00: Entering standby power mode [ 23.368863] ata2.00: Entering standby power mode [ 23.445187] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 23.452194] #PF: supervisor instruction fetch in kernel mode [ 23.457896] #PF: error_code(0x0010) - not-present page [ 23.463065] PGD 0 P4D 0 [ 23.465640] Oops: Oops: 0010 [#1] SMP NOPTI [ 23.469869] CPU: 8 UID: 0 PID: 211 Comm: kworker/u48:18 Tainted: G S W 6.19.0-rc4-00020-gf0b9d8eb98df #10 PREEMPT(voluntary) [ 23.482512] Tainted: [S]=CPU_OUT_OF_SPEC, [W]=WARN [ 23.496511] Workqueue: async async_run_entry_fn [ 23.501087] RIP: 0010:0x0 [ 23.503755] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 23.510324] RSP: 0018:ffffb4a60065fca8 EFLAGS: 00010246 [ 23.515592] RAX: 0000000000000000 RBX: ffff9f428290e000 RCX: 000000000000000f [ 23.522765] RDX: 0000000000000000 RSI: 0000000000000282 RDI: ffff9f428290e000 [ 23.529937] RBP: ffff9f4282907070 R08: ffff9f4281130428 R09: 00000000ffffffff [ 23.537111] R10: 0000000000000000 R11: 0000000000000001 R12: ffff9f42829070f8 [ 23.544284] R13: ffff9f4282906028 R14: ffff9f4282900000 R15: ffff9f4282906b68 [ 23.551457] FS: 0000000000000000(0000) GS:ffff9f466b2cf000(0000) knlGS:0000000000000000 [ 23.559588] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.565365] CR2: ffffffffffffffd6 CR3: 000000031c230001 CR4: 0000000000f70ef0 [ 23.572539] PKRU: 55555554 [ 23.575281] Call Trace: [ 23.577770] <TASK> [ 23.579905] intel_engines_reset_default_submission+0x42/0x60 [ 23.585695] __intel_gt_unset_wedged+0x191/0x200 [ 23.590360] intel_gt_unset_wedged+0x20/0x40 [ 23.594675] gt_sanitize+0x15e/0x170 [ 23.598290] i915_gem_suspend_late+0x6b/0x180 [ 23.602692] i915_drm_suspend_late+0x35/0xf0 [ 23.607008] ? __pfx_pci_pm_suspend_late+0x10/0x10 [ 23.611843] dpm_run_callback+0x78/0x1c0 [ 23.615817] device_suspend_late+0xde/0x2e0 [ 23.620037] async_suspend_late+0x18/0x30 [ 23.624082] async_run_entry_fn+0x25/0xa0 [ 23.628129] process_one_work+0x15b/0x380 [ 23.632182] worker_thread+0x2a5/0x3c0 [ 23.635973] ? __pfx_worker_thread+0x10/0x10 [ 23.640279] kthread+0xf6/0x1f0 [ 23.643464] ? __pfx_kthread+0x10/0x10 [ 23.647263] ? __pfx_kthread+0x10/0x10 [ 23.651045] ret_from_fork+0x131/0x190 [ 23.654837] ? __pfx_kthread+0x10/0x10 [ 23.658634] ret_from_fork_asm+0x1a/0x30 [ 23.662597] </TASK> [ 23.664826] Modules linked in: [ 23.667914] CR2: 0000000000000000 [ 23.671271] ------------[ cut here ]------------ (cherry picked from commit daa199abc3d3d1740c9e3a2c3e9216ae5b447cad) CVE-2026-31540
VCID-tc63-4q6e-nker kernel: mm: zswap: properly synchronize freeing resources during CPU hotunplug CVE-2025-21693
VCID-td5e-4c6y-cyc9 kernel: net: usb: kaweth: validate USB endpoints CVE-2026-23312
VCID-texr-5weq-v3dw CVE-2026-31424
VCID-tfg7-cn7k-ffaj kernel: drm/amd/display: Increase block_sequence array size CVE-2025-38080
VCID-tgch-ns3e-qkhc kernel: LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] CVE-2024-26768
VCID-than-1kz8-yucx In the Linux kernel, the following vulnerability has been resolved: bnge: return after auxiliary_device_uninit() in error path When auxiliary_device_add() fails, the error block calls auxiliary_device_uninit() but does not return. The uninit drops the last reference and synchronously runs bnge_aux_dev_release(), which sets bd->auxr_dev = NULL and frees the underlying object. The subsequent bd->auxr_dev->net = bd->netdev then dereferences NULL, which is not a good thing to have happen when trying to clean up from an error. Add the missing return, as the auxiliary bus documentation states is a requirement (seems that LLM tools read documentation better than humans do...) CVE-2026-31621
VCID-tnur-avf1-sybe kernel: bpf: Call free_htab_elem() after htab_unlock_bucket() CVE-2024-56592
VCID-tp92-5gfk-1qb5 In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.send_io.bcredits It turns out that our code will corrupt the stream of reassabled data transfer messages when we trigger an immendiate (empty) send. In order to fix this we'll have a single 'batch' credit per connection. And code getting that credit is free to use as much messages until remaining_length reaches 0, then the batch credit it given back and the next logical send can happen. CVE-2026-31537
VCID-tpyv-xst5-vyd6 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_expect: skip expectations in other netns via proc Skip expectations that do not reside in this netns. Similar to e77e6ff502ea ("netfilter: conntrack: do not dump other netns's conntrack entries via proc"). CVE-2026-31496
VCID-tsfh-mjd5-cuch kernel: smb: client: fix potential UAF in smb2_close_cached_fid() CVE-2025-40328
VCID-tsp7-ggzj-gud7 kernel: ASoC: qcom: Fix uninitialized pointer dmactl CVE-2024-26799
VCID-tspb-2q9s-u3d6 kernel: iommu/vt-d: Use device rbtree in iopf reporting path CVE-2024-35843
VCID-tt18-fh9r-57c9 kernel: nfc: nci: free skb on nci_transceive early error paths CVE-2026-23339
VCID-ttde-y49k-eqdw kernel: exfat: validate cluster allocation bits of the allocation bitmap CVE-2025-40307
VCID-tu5g-jnzs-33d4 In the Linux kernel, the following vulnerability has been resolved: spi: use generic driver_override infrastructure When a driver is probed through __driver_attach(), the bus' match() callback is called without the device lock held, thus accessing the driver_override field without a lock, which can cause a UAF. Fix this by using the driver-core driver_override infrastructure taking care of proper locking internally. Note that calling match() from __driver_attach() without the device lock held is intentional. [1] Also note that we do not enable the driver_override feature of struct bus_type, as SPI - in contrast to most other buses - passes "" to sysfs_emit() when the driver_override pointer is NULL. Thus, printing "\n" instead of "(null)\n". CVE-2026-31487
VCID-tusw-jz3p-y3d5 kernel: ksmbd: fix use-after-free in smb_break_all_levII_oplock() CVE-2025-37776
VCID-txtu-9qtr-13bj In the Linux kernel, the following vulnerability has been resolved: tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG The GRP_ACK_MSG handler in tipc_group_proto_rcv() currently decrements bc_ackers on every inbound group ACK, even when the same member has already acknowledged the current broadcast round. Because bc_ackers is a u16, a duplicate ACK received after the last legitimate ACK wraps the counter to 65535. Once wrapped, tipc_group_bc_cong() keeps reporting congestion and later group broadcasts on the affected socket stay blocked until the group is recreated. Fix this by ignoring duplicate or stale ACKs before touching bc_acked or bc_ackers. This makes repeated GRP_ACK_MSG handling idempotent and prevents the underflow path. CVE-2026-31662
VCID-tyvp-9xvj-7uax kernel: drm/amd/display: Prevent crash when disable stream CVE-2024-35799
VCID-tz5h-hd3e-rbbv In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY filemap_fault() may drop the mmap_lock before returning VM_FAULT_RETRY, as documented in mm/filemap.c: "If our return value has VM_FAULT_RETRY set, it's because the mmap_lock may be dropped before doing I/O or by lock_folio_maybe_drop_mmap()." When this happens, a concurrent munmap() can call remove_vma() and free the vm_area_struct via RCU. The saved 'vma' pointer in ocfs2_fault() then becomes a dangling pointer, and the subsequent trace_ocfs2_fault() call dereferences it -- a use-after-free. Fix this by saving ip_blkno as a plain integer before calling filemap_fault(), and removing vma from the trace event. Since ip_blkno is copied by value before the lock can be dropped, it remains valid regardless of what happens to the vma or inode afterward. CVE-2026-31597
VCID-tzdq-wy6d-xbbx kernel: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry CVE-2026-23361
VCID-u28n-uwtv-tyaj kernel: netfilter: IDLETIMER: Fix for possible ABBA deadlock CVE-2024-54683
VCID-u2dn-mnr7-m3hy kernel: s390/ism: fix concurrency management in ism_cmd() CVE-2025-39726
VCID-u58e-6ztz-5bcx kernel: f2fs: fix to avoid overflow while left shift operation CVE-2025-40077
VCID-u6nn-wr8u-qqdj kernel: Linux kernel: Use-after-free in bonding module can cause system crash or arbitrary code execution CVE-2026-23171
VCID-u892-96zg-9ke6 In the Linux kernel, the following vulnerability has been resolved: udp: Fix wildcard bind conflict check when using hash2 When binding a udp_sock to a local address and port, UDP uses two hashes (udptable->hash and udptable->hash2) for collision detection. The current code switches to "hash2" when hslot->count > 10. "hash2" is keyed by local address and local port. "hash" is keyed by local port only. The issue can be shown in the following bind sequence (pseudo code): bind(fd1, "[fd00::1]:8888") bind(fd2, "[fd00::2]:8888") bind(fd3, "[fd00::3]:8888") bind(fd4, "[fd00::4]:8888") bind(fd5, "[fd00::5]:8888") bind(fd6, "[fd00::6]:8888") bind(fd7, "[fd00::7]:8888") bind(fd8, "[fd00::8]:8888") bind(fd9, "[fd00::9]:8888") bind(fd10, "[fd00::10]:8888") /* Correctly return -EADDRINUSE because "hash" is used * instead of "hash2". udp_lib_lport_inuse() detects the * conflict. */ bind(fail_fd, "[::]:8888") /* After one more socket is bound to "[fd00::11]:8888", * hslot->count exceeds 10 and "hash2" is used instead. */ bind(fd11, "[fd00::11]:8888") bind(fail_fd, "[::]:8888") /* succeeds unexpectedly */ The same issue applies to the IPv4 wildcard address "0.0.0.0" and the IPv4-mapped wildcard address "::ffff:0.0.0.0". For example, if there are existing sockets bound to "192.168.1.[1-11]:8888", then binding "0.0.0.0:8888" or "[::ffff:0.0.0.0]:8888" can also miss the conflict when hslot->count > 10. TCP inet_csk_get_port() already has the correct check in inet_use_bhash2_on_bind(). Rename it to inet_use_hash2_on_bind() and move it to inet_hashtables.h so udp.c can reuse it in this fix. CVE-2026-31503
VCID-u8gh-ber8-q3dw kernel: drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs CVE-2024-49901
VCID-ub6v-8wt6-5fbg kernel: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 CVE-2025-21831
VCID-ub6v-vb3r-83eh kernel: x86/efi: defer freeing of boot services memory CVE-2026-23352
VCID-ubtn-8mb7-huef kernel: Input: lkkbd - disable pending work before freeing device CVE-2025-71073
VCID-ubuz-ts2u-ufem kernel: rcu: Fix rcu_read_unlock() deadloop due to IRQ work CVE-2025-39744
VCID-ubyx-g9qc-x7dk kernel: net/sched: Fix mirred deadlock on device recursion CVE-2024-27010
VCID-ucab-wj54-hyey kernel: Linux kernel: Local denial of service in device mapper CVE-2025-38140
VCID-udny-3t6r-fyhn In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent immediate PASID reuse case PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PASID, it's possible that page faults are still pending in the IH ring buffer when the process exits and frees up its PASID. To prevent the case, it uses idr cyclic allocator same as kernel pid's. (cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d) CVE-2026-31462
VCID-uem4-47we-qua4 kernel: f2fs: fix to cover read extent cache access with lock CVE-2024-44941
VCID-ug16-p9vj-57e7 kernel: RDMA/hns: Fix double destruction of rsv_qp CVE-2025-38582
VCID-ug5j-gaab-kuag kernel: cxl/port: Fix use-after-free, permit out-of-order decoder shutdown CVE-2024-50226
VCID-uh94-5nuu-w7fd kernel: parisc: Try to fix random segmentation faults in package builds CVE-2024-40918
VCID-uhng-dru9-7yht In the Linux kernel, the following vulnerability has been resolved: net: usb: aqc111: Do not perform PM inside suspend callback syzbot reports "task hung in rpm_resume" This is caused by aqc111_suspend calling the PM variant of its write_cmd routine. The simplified call trace looks like this: rpm_suspend() usb_suspend_both() - here udev->dev.power.runtime_status == RPM_SUSPENDING aqc111_suspend() - called for the usb device interface aqc111_write32_cmd() usb_autopm_get_interface() pm_runtime_resume_and_get() rpm_resume() - here we call rpm_resume() on our parent rpm_resume() - Here we wait for a status change that will never happen. At this point we block another task which holds rtnl_lock and locks up the whole networking stack. Fix this by replacing the write_cmd calls with their _nopm variants CVE-2026-23446
VCID-ukr2-rp6y-rkf1 kernel: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels CVE-2026-23274
VCID-umyr-w4sv-gkgd kernel: pinmux: Use sequential access to access desc->pinmux data CVE-2024-47141
VCID-upcd-ngpy-ekeu CVE-2026-31411
VCID-uvrh-s5dy-puc5 In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6apm: move component registration to unmanaged version q6apm component registers dais dynamically from ASoC toplology, which are allocated using device managed version apis. Allocating both component and dynamic dais using managed version could lead to incorrect free ordering, dai will be freed while component still holding references to it. Fix this issue by moving component to unmanged version so that the dai pointers are only freeded after the component is removed. ================================================================== BUG: KASAN: slab-use-after-free in snd_soc_del_component_unlocked+0x3d4/0x400 [snd_soc_core] Read of size 8 at addr ffff00084493a6e8 by task kworker/u48:0/3426 Tainted: [W]=WARN Hardware name: LENOVO 21N2ZC5PUS/21N2ZC5PUS, BIOS N42ET57W (1.31 ) 08/08/2024 Workqueue: pdr_notifier_wq pdr_notifier_work [pdr_interface] Call trace: show_stack+0x28/0x7c (C) dump_stack_lvl+0x60/0x80 print_report+0x160/0x4b4 kasan_report+0xac/0xfc __asan_report_load8_noabort+0x20/0x34 snd_soc_del_component_unlocked+0x3d4/0x400 [snd_soc_core] snd_soc_unregister_component_by_driver+0x50/0x88 [snd_soc_core] devm_component_release+0x30/0x5c [snd_soc_core] devres_release_all+0x13c/0x210 device_unbind_cleanup+0x20/0x190 device_release_driver_internal+0x350/0x468 device_release_driver+0x18/0x30 bus_remove_device+0x1a0/0x35c device_del+0x314/0x7f0 device_unregister+0x20/0xbc apr_remove_device+0x5c/0x7c [apr] device_for_each_child+0xd8/0x160 apr_pd_status+0x7c/0xa8 [apr] pdr_notifier_work+0x114/0x240 [pdr_interface] process_one_work+0x500/0xb70 worker_thread+0x630/0xfb0 kthread+0x370/0x6c0 ret_from_fork+0x10/0x20 Allocated by task 77: kasan_save_stack+0x40/0x68 kasan_save_track+0x20/0x40 kasan_save_alloc_info+0x44/0x58 __kasan_kmalloc+0xbc/0xdc __kmalloc_node_track_caller_noprof+0x1f4/0x620 devm_kmalloc+0x7c/0x1c8 snd_soc_register_dai+0x50/0x4f0 [snd_soc_core] soc_tplg_pcm_elems_load+0x55c/0x1eb8 [snd_soc_core] snd_soc_tplg_component_load+0x4f8/0xb60 [snd_soc_core] audioreach_tplg_init+0x124/0x1fc [snd_q6apm] q6apm_audio_probe+0x10/0x1c [snd_q6apm] snd_soc_component_probe+0x5c/0x118 [snd_soc_core] soc_probe_component+0x44c/0xaf0 [snd_soc_core] snd_soc_bind_card+0xad0/0x2370 [snd_soc_core] snd_soc_register_card+0x3b0/0x4c0 [snd_soc_core] devm_snd_soc_register_card+0x50/0xc8 [snd_soc_core] x1e80100_platform_probe+0x208/0x368 [snd_soc_x1e80100] platform_probe+0xc0/0x188 really_probe+0x188/0x804 __driver_probe_device+0x158/0x358 driver_probe_device+0x60/0x190 __device_attach_driver+0x16c/0x2a8 bus_for_each_drv+0x100/0x194 __device_attach+0x174/0x380 device_initial_probe+0x14/0x20 bus_probe_device+0x124/0x154 deferred_probe_work_func+0x140/0x220 process_one_work+0x500/0xb70 worker_thread+0x630/0xfb0 kthread+0x370/0x6c0 ret_from_fork+0x10/0x20 Freed by task 3426: kasan_save_stack+0x40/0x68 kasan_save_track+0x20/0x40 __kasan_save_free_info+0x4c/0x80 __kasan_slab_free+0x78/0xa0 kfree+0x100/0x4a4 devres_release_all+0x144/0x210 device_unbind_cleanup+0x20/0x190 device_release_driver_internal+0x350/0x468 device_release_driver+0x18/0x30 bus_remove_device+0x1a0/0x35c device_del+0x314/0x7f0 device_unregister+0x20/0xbc apr_remove_device+0x5c/0x7c [apr] device_for_each_child+0xd8/0x160 apr_pd_status+0x7c/0xa8 [apr] pdr_notifier_work+0x114/0x240 [pdr_interface] process_one_work+0x500/0xb70 worker_thread+0x630/0xfb0 kthread+0x370/0x6c0 ret_from_fork+0x10/0x20 CVE-2026-31587
VCID-uvyu-va81-wbgj In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use netlink policy range checks Replace manual range and mask validations with netlink policy annotations in ctnetlink code paths, so that the netlink core rejects invalid values early and can generate extack errors. - CTA_PROTOINFO_TCP_STATE: reject values > TCP_CONNTRACK_SYN_SENT2 at policy level, removing the manual >= TCP_CONNTRACK_MAX check. - CTA_PROTOINFO_TCP_WSCALE_ORIGINAL/REPLY: reject values > TCP_MAX_WSCALE (14). The normal TCP option parsing path already clamps to this value, but the ctnetlink path accepted 0-255, causing undefined behavior when used as a u32 shift count. - CTA_FILTER_ORIG_FLAGS/REPLY_FLAGS: use NLA_POLICY_MASK with CTA_FILTER_F_ALL, removing the manual mask checks. - CTA_EXPECT_FLAGS: use NLA_POLICY_MASK with NF_CT_EXPECT_MASK, adding a new mask define grouping all valid expect flags. Extracted from a broader nf-next patch by Florian Westphal, scoped to ctnetlink for the fixes tree. CVE-2026-31495
VCID-uyug-vjrw-87h6 CVE-2026-31681
VCID-uzfu-ke47-1qaq CVE-2026-23426
VCID-uzrt-axb3-qfcs In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() Initialize le_tmp64 to zero in rtw_BIP_verify() to prevent using uninitialized data. Smatch warns that only 6 bytes are copied to this 8-byte (u64) variable, leaving the last two bytes uninitialized: drivers/staging/rtl8723bs/core/rtw_security.c:1308 rtw_BIP_verify() warn: not copying enough bytes for '&le_tmp64' (8 vs 6 bytes) Initializing the variable at the start of the function fixes this warning and ensures predictable behavior. CVE-2026-31626
VCID-uzsb-9yx8-kua1 kernel: wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() CVE-2025-39732
VCID-v1ka-ynm7-q3cw kernel: drm/amd/display: Add null check for &#39;afb&#39; in amdgpu_dm_update_cursor (v2) CVE-2024-49908
VCID-v2rb-s1g7-1ub4 In the Linux kernel, the following vulnerability has been resolved: NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd The /proc/fs/nfs/exports proc entry is created at module init and persists for the module's lifetime. exports_proc_open() captures the caller's current network namespace and stores its svc_export_cache in seq->private, but takes no reference on the namespace. If the namespace is subsequently torn down (e.g. container destruction after the opener does setns() to a different namespace), nfsd_net_exit() calls nfsd_export_shutdown() which frees the cache. Subsequent reads on the still-open fd dereference the freed cache_detail, walking a freed hash table. Hold a reference on the struct net for the lifetime of the open file descriptor. This prevents nfsd_net_exit() from running -- and thus prevents nfsd_export_shutdown() from freeing the cache -- while any exports fd is open. cache_detail already stores its net pointer (cd->net, set by cache_create_net()), so exports_release() can retrieve it without additional per-file storage. CVE-2026-31403
VCID-v2y7-vmt3-w3dq kernel: ksmbd: vfs: fix race on m_flags in vfs_cache CVE-2025-68809
VCID-v3ba-uvsy-ybfv kernel: dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue() CVE-2025-71221
VCID-v3m5-xj2s-5yef kernel: s390/mm: Fix in_atomic() handling in do_secure_storage_access() CVE-2025-38359
VCID-v41b-jva8-u7at kernel: afs: Fix lock recursion CVE-2024-53090
VCID-v4ds-msgy-m3bv kernel: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() CVE-2025-22115
VCID-v893-rr8x-nyay kernel: btrfs: send: check for inline extents in range_is_hole_in_parent() CVE-2026-23141
VCID-v8xr-k446-8uar kernel: Linux kernel: Denial of Service due to race condition in fbcon setup CVE-2025-68296
VCID-v9bm-48ec-9fc2 kernel: net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown CVE-2026-23454
VCID-v9p4-t339-t3g4 kernel: net: dsa: properly keep track of conduit reference CVE-2025-71152
VCID-vaaz-21uq-gbc8 kernel: interconnect: Fix locking for runpm vs reclaim CVE-2023-54013
VCID-vccj-gtv8-kug3 kernel: bpf: Fix stack-out-of-bounds write in devmap CVE-2026-23359
VCID-vck1-emav-93gc kernel: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger CVE-2024-38630
VCID-vdnv-8h83-7kfs kernel: ipv6: use RCU in ip6_xmit() CVE-2025-40135
VCID-vejg-5n4z-c7e8 kernel: arm64: mm: fix VA-range sanity check CVE-2023-53989
VCID-vekd-9q54-b7bg CVE-2026-31533
VCID-vfxs-5p9x-5kcx kernel: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync CVE-2024-50029
VCID-vg82-2bbq-q7ex In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: allocate rx skb before consuming bytes pn532_receive_buf() reports the number of accepted bytes to the serdev core. The current code consumes bytes into recv_skb and may already hand a complete frame to pn533_recv_frame() before allocating a fresh receive buffer. If that alloc_skb() fails, the callback returns 0 even though it has already consumed bytes, and it leaves recv_skb as NULL for the next receive callback. That breaks the receive_buf() accounting contract and can also lead to a NULL dereference on the next skb_put_u8(). Allocate the receive skb lazily before consuming the next byte instead. If allocation fails, return the number of bytes already accepted. CVE-2026-31660
VCID-vg98-dpfg-u7g8 In the Linux kernel, the following vulnerability has been resolved: net: rfkill: prevent unlimited numbers of rfkill events from being created Userspace can create an unlimited number of rfkill events if the system is so configured, while not consuming them from the rfkill file descriptor, causing a potential out of memory situation. Prevent this from bounding the number of pending rfkill events at a "large" number (i.e. 1000) to prevent abuses like this. CVE-2026-31670
VCID-vgze-rbc5-bbc6 kernel: netfilter: xt_CT: drop pending enqueued packets on template removal CVE-2026-23391
VCID-vm3p-zgmr-13gw kernel: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box CVE-2024-46811
VCID-vmts-4etq-hqh7 kernel: gfs2: Fix potential glock use-after-free on unmount CVE-2024-38570
VCID-vmvf-81ex-yug4 kernel: nvme-rdma: unquiesce admin_q before destroy it CVE-2024-49569
VCID-vqmu-xn3y-e3gc kernel: io_uring/net: don't overflow multishot recv CVE-2023-54030
VCID-vrfu-1kn8-x3be kernel: mm: memory-failure: update ttu flag inside unmap_poisoned_folio CVE-2025-21907
VCID-vrz9-k2a3-4uep kernel: scsi: hisi_sas: Create all dump files during debugfs initialization CVE-2024-56588
VCID-vsyg-x46t-ayhz kernel: net/sched: cls_u32: use skb_header_pointer_careful() CVE-2026-23204
VCID-vt3e-tx5j-b7aq kernel: reiserfs: Avoid touching renamed directory if parent does not change CVE-2023-52591
VCID-vtwb-e5mq-6bgq kernel: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit CVE-2026-23277
VCID-vw6j-sby6-dbh3 In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: Fix double-free in teql_master_xmit Whenever a TEQL devices has a lockless Qdisc as root, qdisc_reset should be called using the seq_lock to avoid racing with the datapath. Failure to do so may cause crashes like the following: [ 238.028993][ T318] BUG: KASAN: double-free in skb_release_data (net/core/skbuff.c:1139) [ 238.029328][ T318] Free of addr ffff88810c67ec00 by task poc_teql_uaf_ke/318 [ 238.029749][ T318] [ 238.029900][ T318] CPU: 3 UID: 0 PID: 318 Comm: poc_teql_ke Not tainted 7.0.0-rc3-00149-ge5b31d988a41 #704 PREEMPT(full) [ 238.029906][ T318] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 238.029910][ T318] Call Trace: [ 238.029913][ T318] <TASK> [ 238.029916][ T318] dump_stack_lvl (lib/dump_stack.c:122) [ 238.029928][ T318] print_report (mm/kasan/report.c:379 mm/kasan/report.c:482) [ 238.029940][ T318] ? skb_release_data (net/core/skbuff.c:1139) [ 238.029944][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) ... [ 238.029957][ T318] ? skb_release_data (net/core/skbuff.c:1139) [ 238.029969][ T318] kasan_report_invalid_free (mm/kasan/report.c:221 mm/kasan/report.c:563) [ 238.029979][ T318] ? skb_release_data (net/core/skbuff.c:1139) [ 238.029989][ T318] check_slab_allocation (mm/kasan/common.c:231) [ 238.029995][ T318] kmem_cache_free (mm/slub.c:2637 (discriminator 1) mm/slub.c:6168 (discriminator 1) mm/slub.c:6298 (discriminator 1)) [ 238.030004][ T318] skb_release_data (net/core/skbuff.c:1139) ... [ 238.030025][ T318] sk_skb_reason_drop (net/core/skbuff.c:1256) [ 238.030032][ T318] pfifo_fast_reset (./include/linux/ptr_ring.h:171 ./include/linux/ptr_ring.h:309 ./include/linux/skb_array.h:98 net/sched/sch_generic.c:827) [ 238.030039][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) ... [ 238.030054][ T318] qdisc_reset (net/sched/sch_generic.c:1034) [ 238.030062][ T318] teql_destroy (./include/linux/spinlock.h:395 net/sched/sch_teql.c:157) [ 238.030071][ T318] __qdisc_destroy (./include/net/pkt_sched.h:328 net/sched/sch_generic.c:1077) [ 238.030077][ T318] qdisc_graft (net/sched/sch_api.c:1062 net/sched/sch_api.c:1053 net/sched/sch_api.c:1159) [ 238.030089][ T318] ? __pfx_qdisc_graft (net/sched/sch_api.c:1091) [ 238.030095][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 238.030102][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 238.030106][ T318] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221) [ 238.030114][ T318] tc_get_qdisc (net/sched/sch_api.c:1529 net/sched/sch_api.c:1556) ... [ 238.072958][ T318] Allocated by task 303 on cpu 5 at 238.026275s: [ 238.073392][ T318] kasan_save_stack (mm/kasan/common.c:58) [ 238.073884][ T318] kasan_save_track (mm/kasan/common.c:64 (discriminator 5) mm/kasan/common.c:79 (discriminator 5)) [ 238.074230][ T318] __kasan_slab_alloc (mm/kasan/common.c:369) [ 238.074578][ T318] kmem_cache_alloc_node_noprof (./include/linux/kasan.h:253 mm/slub.c:4542 mm/slub.c:4869 mm/slub.c:4921) [ 238.076091][ T318] kmalloc_reserve (net/core/skbuff.c:616 (discriminator 107)) [ 238.076450][ T318] __alloc_skb (net/core/skbuff.c:713) [ 238.076834][ T318] alloc_skb_with_frags (./include/linux/skbuff.h:1383 net/core/skbuff.c:6763) [ 238.077178][ T318] sock_alloc_send_pskb (net/core/sock.c:2997) [ 238.077520][ T318] packet_sendmsg (net/packet/af_packet.c:2926 net/packet/af_packet.c:3019 net/packet/af_packet.c:3108) [ 238.081469][ T318] [ 238.081870][ T318] Freed by task 299 on cpu 1 at 238.028496s: [ 238.082761][ T318] kasan_save_stack (mm/kasan/common.c:58) [ 238.083481][ T318] kasan_save_track (mm/kasan/common.c:64 (discriminator 5) mm/kasan/common.c:79 (discriminator 5)) [ 238.085348][ T318] kasan_save_free_info (mm/kasan/generic.c:587 (discriminator 1)) [ 238.085900][ T318] __kasan_slab_free (mm/ ---truncated--- CVE-2026-23449
VCID-vwmn-w6tb-sudq kernel: Linux kernel: Denial of Service in amd-pstate cpufreq driver via deadlock CVE-2025-38038
VCID-vwnc-y4ve-nkhv kernel: drm/msm/dpu: move dpu_encoder&#39;s connector assignment to atomic_enable() CVE-2024-45015
VCID-vx8c-nssy-ubaj In the Linux kernel, the following vulnerability has been resolved: fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO Much like commit 19f953e74356 ("fbdev: fb_pm2fb: Avoid potential divide by zero error"), we also need to prevent that same crash from happening in the udlfb driver as it uses pixclock directly when dividing, which will crash. CVE-2026-31618
VCID-vxys-jj3n-n7gz kernel: eth: bnxt: fix truesize for mb-xdp-pass case CVE-2025-21961
VCID-vysr-bztb-yugx kernel: i40e: remove read access to debugfs files CVE-2025-39901
VCID-vz1n-7fbk-kyag kernel: f2fs: fix to detect potential corrupted nid in free_nid_list CVE-2025-68315
VCID-vz73-y2va-5kbw In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check The same bounds-check bug fixed for NDP16 in the previous patch also exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated against the total skb length without accounting for ndpoffset, allowing out-of-bounds reads when the NDP32 is placed near the end of the NTB. Add ndpoffset to the nframes bounds check and use struct_size_t() to express the NDP-plus-DPE-array size more clearly. Compile-tested only. CVE-2026-23447
VCID-vzkt-5648-ukh7 CVE-2026-31415
VCID-vzyy-16xe-qkgm In the Linux kernel, the following vulnerability has been resolved: media: hackrf: fix to not free memory after the device is registered in hackrf_probe() In hackrf driver, the following race condition occurs: ``` CPU0 CPU1 hackrf_probe() kzalloc(); // alloc hackrf_dev .... v4l2_device_register(); .... fd = sys_open("/path/to/dev"); // open hackrf fd .... v4l2_device_unregister(); .... kfree(); // free hackrf_dev .... sys_ioctl(fd, ...); v4l2_ioctl(); video_is_registered() // UAF!! .... sys_close(fd); v4l2_release() // UAF!! hackrf_video_release() kfree(); // DFB!! ``` When a V4L2 or video device is unregistered, the device node is removed so new open() calls are blocked. However, file descriptors that are already open-and any in-flight I/O-do not terminate immediately; they remain valid until the last reference is dropped and the driver's release() is invoked. Therefore, freeing device memory on the error path after hackrf_probe() has registered dev it will lead to a race to use-after-free vuln, since those already-open handles haven't been released yet. And since release() free memory too, race to use-after-free and double-free vuln occur. To prevent this, if device is registered from probe(), it should be modified to free memory only through release() rather than calling kfree() directly. CVE-2026-31576
VCID-w1sf-m294-jke8 kernel: fbdev: hyperv_fb: Allow graceful removal of framebuffer CVE-2025-21976
VCID-w4d7-nppw-pye9 kernel: scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set CVE-2025-37977
VCID-w4u7-5ke3-57a7 kernel: net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabled CVE-2025-38039
VCID-w53c-hafw-6kbb In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case In decode_int(), the CONS case calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) without checking that len bytes remain in the buffer. The existing boundary check only validates the 2 bits for get_bits(), not the subsequent 1-4 bytes that get_uint() reads. This allows a malformed H.323/RAS packet to cause a 1-4 byte slab-out-of-bounds read. Add a boundary check for len bytes after get_bits() and before get_uint(). CVE-2026-23456
VCID-w71f-nskm-nyau kernel: udmabuf: fix memory leak on last export_udmabuf() error path CVE-2024-56712
VCID-w8d1-9zry-wydv In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: fix use-after-free in encoder release path The fops_vcodec_release() function frees the context structure (ctx) without first cancelling any pending or running work in ctx->encode_work. This creates a race window where the workqueue handler (mtk_venc_worker) may still be accessing the context memory after it has been freed. Race condition: CPU 0 (release path) CPU 1 (workqueue) --------------------- ------------------ fops_vcodec_release() v4l2_m2m_ctx_release() v4l2_m2m_cancel_job() // waits for m2m job "done" mtk_venc_worker() v4l2_m2m_job_finish() // m2m job "done" // BUT worker still running! // post-job_finish access: other ctx dereferences // UAF if ctx already freed // returns (job "done") kfree(ctx) // ctx freed Root cause: The v4l2_m2m_ctx_release() only waits for the m2m job lifecycle (via TRANS_RUNNING flag), not the workqueue lifecycle. After v4l2_m2m_job_finish() is called, the m2m framework considers the job complete and v4l2_m2m_ctx_release() returns, but the worker function continues executing and may still access ctx. The work is queued during encode operations via: queue_work(ctx->dev->encode_workqueue, &ctx->encode_work) The worker function accesses ctx->m2m_ctx, ctx->dev, and other ctx fields even after calling v4l2_m2m_job_finish(). This vulnerability was confirmed with KASAN by running an instrumented test module that widens the post-job_finish race window. KASAN detected: BUG: KASAN: slab-use-after-free in mtk_venc_worker+0x159/0x180 Read of size 4 at addr ffff88800326e000 by task kworker/u8:0/12 Workqueue: mtk_vcodec_enc_wq mtk_venc_worker Allocated by task 47: __kasan_kmalloc+0x7f/0x90 fops_vcodec_open+0x85/0x1a0 Freed by task 47: __kasan_slab_free+0x43/0x70 kfree+0xee/0x3a0 fops_vcodec_release+0xb7/0x190 Fix this by calling cancel_work_sync(&ctx->encode_work) before kfree(ctx). This ensures the workqueue handler is both cancelled (if pending) and synchronized (waits for any running handler to complete) before the context is freed. Placement rationale: The fix is placed after v4l2_ctrl_handler_free() and before list_del_init(&ctx->list). At this point, all m2m operations are done (v4l2_m2m_ctx_release() has returned), and we need to ensure the workqueue is synchronized before removing ctx from the list and freeing it. Note: The open error path does NOT need cancel_work_sync() because INIT_WORK() only initializes the work structure - it does not schedule it. Work is only scheduled later during device_run() operations. CVE-2026-31584
VCID-w8r5-decj-vkem kernel: io_uring: prevent opcode speculation CVE-2025-21863
VCID-wanj-gu4w-2qaz kernel: padata: Fix pd UAF once and for all CVE-2025-38584
VCID-wax6-n8k7-9fab kernel: ksmbd: prevent rename with empty string CVE-2025-37956
VCID-wc4k-86v7-ykh7 kernel: accel/habanalabs: fix mem leak in capture user mappings CVE-2023-53367
VCID-wcu7-me4d-bugc kernel: ksmbd: add chann_lock to protect ksmbd_chann_list xarray CVE-2026-23226
VCID-wd2z-jnpt-3bd3 kernel: f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread() CVE-2024-47691
VCID-wjeh-m3f2-tkbg kernel: wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode CVE-2024-58096
VCID-wk3t-3jvn-quf1 kernel: media: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode() CVE-2025-38237
VCID-wkqf-ex7a-73ft kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses CVE-2024-26947
VCID-wnh7-18vz-vbgn kernel: drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func CVE-2024-49910
VCID-wq4h-q7vt-23ex In the Linux kernel, the following vulnerability has been resolved: nvdimm/bus: Fix potential use after free in asynchronous initialization Dingisoul with KASAN reports a use after free if device_add() fails in nd_async_device_register(). Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while scheduling async init") correctly added a reference on the parent device to be held until asynchronous initialization was complete. However, if device_add() results in an allocation failure the ref count of the device drops to 0 prior to the parent pointer being accessed. Thus resulting in use after free. The bug bot AI correctly identified the fix. Save a reference to the parent pointer to be used to drop the parent reference regardless of the outcome of device_add(). CVE-2026-31399
VCID-wstb-4k78-gufv kernel: drm/bridge: adv7511: fix crash on irq during probe CVE-2024-26876
VCID-wtcb-jzbu-fkcn In the Linux kernel, the following vulnerability has been resolved: s390/syscalls: Add spectre boundary for syscall dispatch table The s390 syscall number is directly controlled by userspace, but does not have an array_index_nospec() boundary to prevent access past the syscall function pointer tables. CVE-2026-31483
VCID-wv35-ucjn-3bb5 In the Linux kernel, the following vulnerability has been resolved: ext4: avoid infinite loops caused by residual data On the mkdir/mknod path, when mapping logical blocks to physical blocks, if inserting a new extent into the extent tree fails (in this example, because the file system disabled the huge file feature when marking the inode as dirty), ext4_ext_map_blocks() only calls ext4_free_blocks() to reclaim the physical block without deleting the corresponding data in the extent tree. This causes subsequent mkdir operations to reference the previously reclaimed physical block number again, even though this physical block is already being used by the xattr block. Therefore, a situation arises where both the directory and xattr are using the same buffer head block in memory simultaneously. The above causes ext4_xattr_block_set() to enter an infinite loop about "inserted" and cannot release the inode lock, ultimately leading to the 143s blocking problem mentioned in [1]. If the metadata is corrupted, then trying to remove some extent space can do even more harm. Also in case EXT4_GET_BLOCKS_DELALLOC_RESERVE was passed, remove space wrongly update quota information. Jan Kara suggests distinguishing between two cases: 1) The error is ENOSPC or EDQUOT - in this case the filesystem is fully consistent and we must maintain its consistency including all the accounting. However these errors can happen only early before we've inserted the extent into the extent tree. So current code works correctly for this case. 2) Some other error - this means metadata is corrupted. We should strive to do as few modifications as possible to limit damage. So I'd just skip freeing of allocated blocks. [1] INFO: task syz.0.17:5995 blocked for more than 143 seconds. Call Trace: inode_lock_nested include/linux/fs.h:1073 [inline] __start_dirop fs/namei.c:2923 [inline] start_dirop fs/namei.c:2934 [inline] CVE-2026-31448
VCID-wvp8-cst3-cuhr kernel: xfrm: state: fix out-of-bounds read during lookup CVE-2024-57982
VCID-wvu1-rfc1-zya9 In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] has 17 entries so a status value outside that range goes off into the weeds when looking at the %s value. Even worse, the status could return EFR_STATUS_INCOMPLETE which is 0x80000000, and is obviously not in that array of potential strings. Fix this up by properly bounding the index against the array size and printing "unknown" if it's not recognized. CVE-2026-31619
VCID-wwax-w4gg-cuhy kernel: functionfs: fix the open/removal races CVE-2025-71074
VCID-wxx7-3a43-h7gh CVE-2026-31408
VCID-wzkm-rtcg-cbdu kernel: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning CVE-2024-47752
VCID-x1m4-hf24-27hq kernel: scsi: target: Fix recursive locking in __configfs_open_file() CVE-2026-23292
VCID-x226-2yqa-uuhv kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain CVE-2024-35942
VCID-x245-d866-nkff kernel: ksmbd: prevent connection release during oplock break notification CVE-2025-21955
VCID-x5jd-ruv2-1qac CVE-2026-31428
VCID-x5y6-u3c8-3qbe In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] Multiple sysfs command paths dereference contexts_arr[0] without first verifying that kdamond->contexts->nr == 1. A user can set nr_contexts to 0 via sysfs while DAMON is running, causing NULL pointer dereferences. In more detail, the issue can be triggered by privileged users like below. First, start DAMON and make contexts directory empty (kdamond->contexts->nr == 0). # damo start # cd /sys/kernel/mm/damon/admin/kdamonds/0 # echo 0 > contexts/nr_contexts Then, each of below commands will cause the NULL pointer dereference. # echo update_schemes_stats > state # echo update_schemes_tried_regions > state # echo update_schemes_tried_bytes > state # echo update_schemes_effective_quotas > state # echo update_tuned_intervals > state Guard all commands (except OFF) at the entry point of damon_sysfs_handle_cmd(). CVE-2026-31458
VCID-x6kd-y436-nbaw kernel: wifi: rtw88: usb: schedule rx work after everything is set up CVE-2024-46760
VCID-x9a9-thjn-yya5 In the Linux kernel, the following vulnerability has been resolved: xfs: save ailp before dropping the AIL lock in push callbacks In xfs_inode_item_push() and xfs_qm_dquot_logitem_push(), the AIL lock is dropped to perform buffer IO. Once the cluster buffer no longer protects the log item from reclaim, the log item may be freed by background reclaim or the dquot shrinker. The subsequent spin_lock() call dereferences lip->li_ailp, which is a use-after-free. Fix this by saving the ailp pointer in a local variable while the AIL lock is held and the log item is guaranteed to be valid. CVE-2026-31454
VCID-x9wt-jmne-vudk In the Linux kernel, the following vulnerability has been resolved: KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION Drop the WARN in sev_pin_memory() on npages overflowing an int, as the WARN is comically trivially to trigger from userspace, e.g. by doing: struct kvm_enc_region range = { .addr = 0, .size = -1ul, }; __vm_ioctl(vm, KVM_MEMORY_ENCRYPT_REG_REGION, &range); Note, the checks in sev_mem_enc_register_region() that presumably exist to verify the incoming address+size are completely worthless, as both "addr" and "size" are u64s and SEV is 64-bit only, i.e. they _can't_ be greater than ULONG_MAX. That wart will be cleaned up in the near future. if (range->addr > ULONG_MAX || range->size > ULONG_MAX) return -EINVAL; Opportunistically add a comment to explain why the code calculates the number of pages the "hard" way, e.g. instead of just shifting @ulen. CVE-2026-31590
VCID-xafq-y8ca-hkhe kernel: rv: Use strings in da monitors tracepoints CVE-2025-38636
VCID-xag6-3jdm-bqha kernel: fs/ntfs3: Keep write operations atomic CVE-2025-37806
VCID-xawd-7qp7-uben In the Linux kernel, the following vulnerability has been resolved: net: bonding: fix NULL deref in bond_debug_rlb_hash_show rlb_clear_slave intentionally keeps RLB hash-table entries on the rx_hashtbl_used_head list with slave set to NULL when no replacement slave is available. However, bond_debug_rlb_hash_show visites client_info->slave without checking if it's NULL. Other used-list iterators in bond_alb.c already handle this NULL-slave state safely: - rlb_update_client returns early on !client_info->slave - rlb_req_update_slave_clients, rlb_clear_slave, and rlb_rebalance compare slave values before visiting - lb_req_update_subnet_clients continues if slave is NULL The following NULL deref crash can be trigger in bond_debug_rlb_hash_show: [ 1.289791] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 1.292058] RIP: 0010:bond_debug_rlb_hash_show (drivers/net/bonding/bond_debugfs.c:41) [ 1.293101] RSP: 0018:ffffc900004a7d00 EFLAGS: 00010286 [ 1.293333] RAX: 0000000000000000 RBX: ffff888102b48200 RCX: ffff888102b48204 [ 1.293631] RDX: ffff888102b48200 RSI: ffffffff839daad5 RDI: ffff888102815078 [ 1.293924] RBP: ffff888102815078 R08: ffff888102b4820e R09: 0000000000000000 [ 1.294267] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888100f929c0 [ 1.294564] R13: ffff888100f92a00 R14: 0000000000000001 R15: ffffc900004a7ed8 [ 1.294864] FS: 0000000001395380(0000) GS:ffff888196e75000(0000) knlGS:0000000000000000 [ 1.295239] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1.295480] CR2: 0000000000000000 CR3: 0000000102adc004 CR4: 0000000000772ef0 [ 1.295897] Call Trace: [ 1.296134] seq_read_iter (fs/seq_file.c:231) [ 1.296341] seq_read (fs/seq_file.c:164) [ 1.296493] full_proxy_read (fs/debugfs/file.c:378 (discriminator 1)) [ 1.296658] vfs_read (fs/read_write.c:572) [ 1.296981] ksys_read (fs/read_write.c:717) [ 1.297132] do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1)) [ 1.297325] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Add a NULL check and print "(none)" for entries with no assigned slave. CVE-2026-31546
VCID-xb4p-ngcu-m3by kernel: tpm: Lock TPM chip in tpm_pm_suspend() first CVE-2024-53085
VCID-xbbw-gd21-sfgs In the Linux kernel, the following vulnerability has been resolved: xfrm: clear trailing padding in build_polexpire() build_expire() clears the trailing padding bytes of struct xfrm_user_expire after setting the hard field via memset_after(), but the analogous function build_polexpire() does not do this for struct xfrm_user_polexpire. The padding bytes after the __u8 hard field are left uninitialized from the heap allocation, and are then sent to userspace via netlink multicast to XFRMNLGRP_EXPIRE listeners, leaking kernel heap memory contents. Add the missing memset_after() call, matching build_expire(). CVE-2026-31664
VCID-xbra-jtwd-6bhf kernel: wifi: rtw88: fix memory leak in rtw_usb_probe() CVE-2023-53460
VCID-xc83-2865-7bgz kernel: RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers CVE-2025-21885
VCID-xd76-s5yw-fyaq kernel: drm/amdgpu: unmap and remove csa_va properly CVE-2023-53545
VCID-xdde-euh1-dqfv kernel: spi: cadence-quadspi: Implement refcount to handle unbind during busy CVE-2025-40005
VCID-xf8w-1v5k-nyf7 kernel: tcp_metrics: use dst_dev_net_rcu() CVE-2025-40075
VCID-xh1w-u484-dbet In the Linux kernel, the following vulnerability has been resolved: erofs: add GFP_NOIO in the bio completion if needed The bio completion path in the process context (e.g. dm-verity) will directly call into decompression rather than trigger another workqueue context for minimal scheduling latencies, which can then call vm_map_ram() with GFP_KERNEL. Due to insufficient memory, vm_map_ram() may generate memory swapping I/O, which can cause submit_bio_wait to deadlock in some scenarios. Trimmed down the call stack, as follows: f2fs_submit_read_io submit_bio //bio_list is initialized. mmc_blk_mq_recovery z_erofs_endio vm_map_ram __pte_alloc_kernel __alloc_pages_direct_reclaim shrink_folio_list __swap_writepage submit_bio_wait //bio_list is non-NULL, hang!!! Use memalloc_noio_{save,restore}() to wrap up this path. CVE-2026-31467
VCID-xh6y-ja9y-u3es kernel: net: mctp: unshare packets when reassembling CVE-2025-21972
VCID-xhfy-gkwq-afbr kernel: wifi: libertas: fix use-after-free in lbs_free_adapter() CVE-2026-23281
VCID-xncx-nvr7-k7d8 kernel: x86/mm/ident_map: Use gbpages only where full GB page should be mapped. CVE-2024-50017
VCID-xnee-wpbs-7bc2 In the Linux kernel, the following vulnerability has been resolved: x86/CPU: Fix FPDSS on Zen1 Zen1's hardware divider can leave, under certain circumstances, partial results from previous operations. Those results can be leaked by another, attacker thread. Fix that with a chicken bit. CVE-2026-31628
VCID-xp23-rfjr-2ydv kernel: bpf: Tell memcg to use allow_spinning=false path in bpf_timer_init() CVE-2025-39886
VCID-xqpe-25bd-vygx CVE-2026-23401
VCID-xs4a-ha3z-2bej kernel: tracing: Add recursion protection in kernel stack trace recording CVE-2026-23138
VCID-xxe5-3ae2-vygt kernel: cxl/port: Fix delete_endpoint() vs parent unregistration race CVE-2023-52771
VCID-xxhg-up2k-yyhv kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN401 CVE-2024-49970
VCID-xyds-k35a-2yf2 kernel: net: dsa: clean up FDB, MDB, VLAN entries on unbind CVE-2025-37864
VCID-xzc2-9tmc-7qey In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock btintel_hw_error() issues two __hci_cmd_sync() calls (HCI_OP_RESET and Intel exception-info retrieval) without holding hci_req_sync_lock(). This lets it race against hci_dev_do_close() -> btintel_shutdown_combined(), which also runs __hci_cmd_sync() under the same lock. When both paths manipulate hdev->req_status/req_rsp concurrently, the close path may free the response skb first, and the still-running hw_error path hits a slab-use-after-free in kfree_skb(). Wrap the whole recovery sequence in hci_req_sync_lock/unlock so it is serialized with every other synchronous HCI command issuer. Below is the data race report and the kasan report: BUG: data-race in __hci_cmd_sync_sk / btintel_shutdown_combined read of hdev->req_rsp at net/bluetooth/hci_sync.c:199 by task kworker/u17:1/83: __hci_cmd_sync_sk+0x12f2/0x1c30 net/bluetooth/hci_sync.c:200 __hci_cmd_sync+0x55/0x80 net/bluetooth/hci_sync.c:223 btintel_hw_error+0x114/0x670 drivers/bluetooth/btintel.c:254 hci_error_reset+0x348/0xa30 net/bluetooth/hci_core.c:1030 write/free by task ioctl/22580: btintel_shutdown_combined+0xd0/0x360 drivers/bluetooth/btintel.c:3648 hci_dev_close_sync+0x9ae/0x2c10 net/bluetooth/hci_sync.c:5246 hci_dev_do_close+0x232/0x460 net/bluetooth/hci_core.c:526 BUG: KASAN: slab-use-after-free in sk_skb_reason_drop+0x43/0x380 net/core/skbuff.c:1202 Read of size 4 at addr ffff888144a738dc by task kworker/u17:1/83: __hci_cmd_sync_sk+0x12f2/0x1c30 net/bluetooth/hci_sync.c:200 __hci_cmd_sync+0x55/0x80 net/bluetooth/hci_sync.c:223 btintel_hw_error+0x186/0x670 drivers/bluetooth/btintel.c:260 CVE-2026-31500
VCID-y13n-jhsr-ryd2 kernel: mm/vmscan: don't try to reclaim hwpoison folio CVE-2025-37834
VCID-y3wu-za9p-yub1 kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() CVE-2025-21927
VCID-y439-52f2-rfck kernel: net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop CVE-2026-23300
VCID-y4w2-qru6-p3g4 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix krb5 mount with username option Customer reported that some of their krb5 mounts were failing against a single server as the client was trying to mount the shares with wrong credentials. It turned out the client was reusing SMB session from first mount to try mounting the other shares, even though a different username= option had been specified to the other mounts. By using username mount option along with sec=krb5 to search for principals from keytab is supported by cifs.upcall(8) since cifs-utils-4.8. So fix this by matching username mount option in match_session() even with Kerberos. For example, the second mount below should fail with -ENOKEY as there is no 'foobar' principal in keytab (/etc/krb5.keytab). The client ends up reusing SMB session from first mount to perform the second one, which is wrong. ``` $ ktutil ktutil: add_entry -password -p testuser -k 1 -e aes256-cts Password for testuser@ZELDA.TEST: ktutil: write_kt /etc/krb5.keytab ktutil: quit $ klist -ke Keytab name: FILE:/etc/krb5.keytab KVNO Principal ---- ---------------------------------------------------------------- 1 testuser@ZELDA.TEST (aes256-cts-hmac-sha1-96) $ mount.cifs //w22-root2/scratch /mnt/1 -o sec=krb5,username=testuser $ mount.cifs //w22-root2/scratch /mnt/2 -o sec=krb5,username=foobar $ mount -t cifs | grep -Po 'username=\K\w+' testuser testuser ``` CVE-2026-31392
VCID-y54q-e569-p7cx In the Linux kernel, the following vulnerability has been resolved: NFC: digital: Bounds check NFC-A cascade depth in SDD response handler The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3 or 4 bytes to target->nfcid1 on each round, but the number of cascade rounds is controlled entirely by the peer device. The peer sets the cascade tag in the SDD_RES (deciding 3 vs 4 bytes) and the cascade-incomplete bit in the SEL_RES (deciding whether another round follows). ISO 14443-3 limits NFC-A to three cascade levels and target->nfcid1 is sized accordingly (NFC_NFCID1_MAXSIZE = 10), but nothing in the driver actually enforces this. This means a malicious peer can keep the cascade running, writing past the heap-allocated nfc_target with each round. Fix this by rejecting the response when the accumulated UID would exceed the buffer. Commit e329e71013c9 ("NFC: nci: Bounds check struct nfc_target arrays") fixed similar missing checks against the same field on the NCI path. CVE-2026-31622
VCID-y5bm-2fr5-8bbp kernel: net: dsa: b53: do not enable EEE on bcm63xx CVE-2025-38272
VCID-y5ds-5mpf-u3hz kernel: ext4: avoid deadlock in fs reclaim with page writeback CVE-2023-53149
VCID-y6kc-guf2-bqdz kernel: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove CVE-2024-43850
VCID-y7wh-qssq-cbg1 kernel: drm/amd/display: Check null pointers before multiple uses CVE-2024-49920
VCID-ya16-qrwm-kkfs kernel: Linux kernel: Denial of Service via NULL pointer dereference in blk-cgroup CVE-2023-54271
VCID-yaz4-szyc-afg8 kernel: drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free CVE-2026-23227
VCID-ycev-sqxs-13da kernel: Kernel: Double free vulnerability in exFAT filesystem can lead to denial of service CVE-2025-38206
VCID-yehk-tjrt-rbbe kernel: dm-verity: disable recursive forward error correction CVE-2025-71161
VCID-yeww-6ybr-qye8 kernel: f2fs: fix infinite loop in __insert_extent_tree() CVE-2025-40333
VCID-yf6e-3aw3-tqeg kernel: net: clear the dst when changing skb protocol CVE-2025-38192
VCID-yhft-bm7y-jfde kernel: mm/slub: Avoid list corruption when removing a slab from the full list CVE-2024-56566
VCID-yj28-va7b-3ug8 kernel: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels CVE-2025-21768
VCID-yj3z-hvs9-47hj In the Linux kernel, the following vulnerability has been resolved: PM: runtime: Fix a race condition related to device removal The following code in pm_runtime_work() may dereference the dev->parent pointer after the parent device has been freed: /* Maybe the parent is now able to suspend. */ if (parent && !parent->power.ignore_children) { spin_unlock(&dev->power.lock); spin_lock(&parent->power.lock); rpm_idle(parent, RPM_ASYNC); spin_unlock(&parent->power.lock); spin_lock(&dev->power.lock); } Fix this by inserting a flush_work() call in pm_runtime_remove(). Without this patch blktest block/001 triggers the following complaint sporadically: BUG: KASAN: slab-use-after-free in lock_acquire+0x70/0x160 Read of size 1 at addr ffff88812bef7198 by task kworker/u553:1/3081 Workqueue: pm pm_runtime_work Call Trace: <TASK> dump_stack_lvl+0x61/0x80 print_address_description.constprop.0+0x8b/0x310 print_report+0xfd/0x1d7 kasan_report+0xd8/0x1d0 __kasan_check_byte+0x42/0x60 lock_acquire.part.0+0x38/0x230 lock_acquire+0x70/0x160 _raw_spin_lock+0x36/0x50 rpm_suspend+0xc6a/0xfe0 rpm_idle+0x578/0x770 pm_runtime_work+0xee/0x120 process_one_work+0xde3/0x1410 worker_thread+0x5eb/0xfe0 kthread+0x37b/0x480 ret_from_fork+0x6cb/0x920 ret_from_fork_asm+0x11/0x20 </TASK> Allocated by task 4314: kasan_save_stack+0x2a/0x50 kasan_save_track+0x18/0x40 kasan_save_alloc_info+0x3d/0x50 __kasan_kmalloc+0xa0/0xb0 __kmalloc_noprof+0x311/0x990 scsi_alloc_target+0x122/0xb60 [scsi_mod] __scsi_scan_target+0x101/0x460 [scsi_mod] scsi_scan_channel+0x179/0x1c0 [scsi_mod] scsi_scan_host_selected+0x259/0x2d0 [scsi_mod] store_scan+0x2d2/0x390 [scsi_mod] dev_attr_store+0x43/0x80 sysfs_kf_write+0xde/0x140 kernfs_fop_write_iter+0x3ef/0x670 vfs_write+0x506/0x1470 ksys_write+0xfd/0x230 __x64_sys_write+0x76/0xc0 x64_sys_call+0x213/0x1810 do_syscall_64+0xee/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 Freed by task 4314: kasan_save_stack+0x2a/0x50 kasan_save_track+0x18/0x40 kasan_save_free_info+0x3f/0x50 __kasan_slab_free+0x67/0x80 kfree+0x225/0x6c0 scsi_target_dev_release+0x3d/0x60 [scsi_mod] device_release+0xa3/0x220 kobject_cleanup+0x105/0x3a0 kobject_put+0x72/0xd0 put_device+0x17/0x20 scsi_device_dev_release+0xacf/0x12c0 [scsi_mod] device_release+0xa3/0x220 kobject_cleanup+0x105/0x3a0 kobject_put+0x72/0xd0 put_device+0x17/0x20 scsi_device_put+0x7f/0xc0 [scsi_mod] sdev_store_delete+0xa5/0x120 [scsi_mod] dev_attr_store+0x43/0x80 sysfs_kf_write+0xde/0x140 kernfs_fop_write_iter+0x3ef/0x670 vfs_write+0x506/0x1470 ksys_write+0xfd/0x230 __x64_sys_write+0x76/0xc0 x64_sys_call+0x213/0x1810 CVE-2026-23452
VCID-yj9c-fda5-57g2 In the Linux kernel, the following vulnerability has been resolved: media: vidtv: fix nfeeds state corruption on start_streaming failure syzbot reported a memory leak in vidtv_psi_service_desc_init [1]. When vidtv_start_streaming() fails inside vidtv_start_feed(), the nfeeds counter is left incremented even though no feed was actually started. This corrupts the driver state: subsequent start_feed calls see nfeeds > 1 and skip starting the mux, while stop_feed calls eventually try to stop a non-existent stream. This state corruption can also lead to memory leaks, since the mux and channel resources may be partially allocated during a failed start_streaming but never cleaned up, as the stop path finds dvb->streaming == false and returns early. Fix by decrementing nfeeds back when start_streaming fails, keeping the counter in sync with the actual number of active feeds. [1] BUG: memory leak unreferenced object 0xffff888145b50820 (size 32): comm "syz.0.17", pid 6068, jiffies 4294944486 backtrace (crc 90a0c7d4): vidtv_psi_service_desc_init+0x74/0x1b0 drivers/media/test-drivers/vidtv/vidtv_psi.c:288 vidtv_channel_s302m_init+0xb1/0x2a0 drivers/media/test-drivers/vidtv/vidtv_channel.c:83 vidtv_channels_init+0x1b/0x40 drivers/media/test-drivers/vidtv/vidtv_channel.c:524 vidtv_mux_init+0x516/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:518 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline] vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 CVE-2026-31585
VCID-yp8m-zttt-ffdt kernel: Linux kernel: Denial of service due to a race condition in the TLS subsystem CVE-2026-23240
VCID-ypt7-tc1u-p3ev kernel: btrfs: avoid NULL pointer dereference if no valid csum tree CVE-2025-38059
VCID-yq9b-dpsh-cuhy kernel: drm/amd/display: Disable idle reallow as part of command/gpint execution CVE-2024-36024
VCID-yqcj-27j2-tqb8 CVE-2026-31419
VCID-yr2z-pe4g-8yhu kernel: nfc: rawsock: cancel tx_work before socket teardown CVE-2026-23372
VCID-yr96-2nha-xbed kernel: can: gs_usb: fix time stamp counter initialization CVE-2023-53523
VCID-yrgr-2c4c-3fgq kernel: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx CVE-2024-53091
VCID-ytcn-fxjj-efhj kernel: selinux: avoid dereference of garbage after mount failure CVE-2024-35904
VCID-ytfc-yqtw-4yhb kernel: bridge: cfm: Fix race condition in peer_mep deletion CVE-2026-23393
VCID-yvab-budx-47ec In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix integer underflow in chain mode The jumbo_frm() chain-mode implementation unconditionally computes len = nopaged_len - bmax; where nopaged_len = skb_headlen(skb) (linear bytes only) and bmax is BUF_SIZE_8KiB or BUF_SIZE_2KiB. However, the caller stmmac_xmit() decides to invoke jumbo_frm() based on skb->len (total length including page fragments): is_jumbo = stmmac_is_jumbo_frm(priv, skb->len, enh_desc); When a packet has a small linear portion (nopaged_len <= bmax) but a large total length due to page fragments (skb->len > bmax), the subtraction wraps as an unsigned integer, producing a huge len value (~0xFFFFxxxx). This causes the while (len != 0) loop to execute hundreds of thousands of iterations, passing skb->data + bmax * i pointers far beyond the skb buffer to dma_map_single(). On IOMMU-less SoCs (the typical deployment for stmmac), this maps arbitrary kernel memory to the DMA engine, constituting a kernel memory disclosure and potential memory corruption from hardware. Fix this by introducing a buf_len local variable clamped to min(nopaged_len, bmax). Computing len = nopaged_len - buf_len is then always safe: it is zero when the linear portion fits within a single descriptor, causing the while (len != 0) loop to be skipped naturally, and the fragment loop in stmmac_xmit() handles page fragments afterward. CVE-2026-31649
VCID-yve9-y9ec-cycs In the Linux kernel, the following vulnerability has been resolved: seg6: separate dst_cache for input and output paths in seg6 lwtunnel The seg6 lwtunnel uses a single dst_cache per encap route, shared between seg6_input_core() and seg6_output_core(). These two paths can perform the post-encap SID lookup in different routing contexts (e.g., ip rules matching on the ingress interface, or VRF table separation). Whichever path runs first populates the cache, and the other reuses it blindly, bypassing its own lookup. Fix this by splitting the cache into cache_input and cache_output, so each path maintains its own cached dst independently. CVE-2026-31668
VCID-yvk3-2upk-pkem In the Linux kernel, the following vulnerability has been resolved: xfrm: hold dev ref until after transport_finish NF_HOOK After async crypto completes, xfrm_input_resume() calls dev_put() immediately on re-entry before the skb reaches transport_finish. The skb->dev pointer is then used inside NF_HOOK and its okfn, which can race with device teardown. Remove the dev_put from the async resumption entry and instead drop the reference after the NF_HOOK call in transport_finish, using a saved device pointer since NF_HOOK may consume the skb. This covers NF_DROP, NF_QUEUE and NF_STOLEN paths that skip the okfn. For non-transport exits (decaps, gro, drop) and secondary async return points, release the reference inline when async is set. CVE-2026-31663
VCID-yx1f-r3sr-rues In the Linux kernel, the following vulnerability has been resolved: ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio Replace BUG_ON() with proper error handling when inline data size exceeds PAGE_SIZE. This prevents kernel panic and allows the system to continue running while properly reporting the filesystem corruption. The error is logged via ext4_error_inode(), the buffer head is released to prevent memory leak, and -EFSCORRUPTED is returned to indicate filesystem corruption. CVE-2026-31451
VCID-yx9t-1w27-akec kernel: btrfs: reject new transactions if the fs is fully read-only CVE-2026-23214
VCID-yzsh-2rk2-5yhq kernel: RDMA/siw: Remove direct link to net_device CVE-2024-57857
VCID-z18v-yptf-7fhp kernel: Linux kernel: Denial of Service in kTLS due to race condition in receive path CVE-2025-38616
VCID-z1gu-rwfd-7yfa kernel: f2fs: fix UAF issue in f2fs_merge_page_bio() CVE-2025-40054
VCID-z24p-wtzg-a3gh kernel: md: Don't ignore read-only array in md_check_recovery() CVE-2024-26757
VCID-z3qs-q6ce-aqbc kernel: s390/pkey: Wipe copies of clear-key structures on failure CVE-2024-42156
VCID-z423-786s-hyd2 kernel: i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition CVE-2024-57984
VCID-z4xx-msk4-k7bz kernel: xen/events: Return -EEXIST for bound VIRQs CVE-2025-40160
VCID-z4yz-sjm9-3ke4 kernel: f2fs: fix to drop all discards after creating snapshot on lvm device CVE-2024-56565
VCID-z6xa-pf4r-4kbm In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix folio isn't locked in softleaf_to_folio() On arm64 server, we found folio that get from migration entry isn't locked in softleaf_to_folio(). This issue triggers when mTHP splitting and zap_nonpresent_ptes() races, and the root cause is lack of memory barrier in softleaf_to_folio(). The race is as follows: CPU0 CPU1 deferred_split_scan() zap_nonpresent_ptes() lock folio split_folio() unmap_folio() change ptes to migration entries __split_folio_to_order() softleaf_to_folio() set flags(including PG_locked) for tail pages folio = pfn_folio(softleaf_to_pfn(entry)) smp_wmb() VM_WARN_ON_ONCE(!folio_test_locked(folio)) prep_compound_page() for tail pages In __split_folio_to_order(), smp_wmb() guarantees page flags of tail pages are visible before the tail page becomes non-compound. smp_wmb() should be paired with smp_rmb() in softleaf_to_folio(), which is missed. As a result, if zap_nonpresent_ptes() accesses migration entry that stores tail pfn, softleaf_to_folio() may see the updated compound_head of tail page before page->flags. This issue will trigger VM_WARN_ON_ONCE() in pfn_swap_entry_folio() because of the race between folio split and zap_nonpresent_ptes() leading to a folio incorrectly undergoing modification without a folio lock being held. This is a BUG_ON() before commit 93976a20345b ("mm: eliminate further swapops predicates"), which in merged in v6.19-rc1. To fix it, add missing smp_rmb() if the softleaf entry is migration entry in softleaf_to_folio() and softleaf_to_page(). [tujinjiang@huawei.com: update function name and comments] CVE-2026-31466
VCID-z711-tvkz-9qa4 kernel: bonding: check xdp prog when set bond mode CVE-2025-22105
VCID-z767-vnpz-37g8 kernel: drm/amdgpu: Fix the warning division or modulo by zero CVE-2024-46806
VCID-z9yn-4b8y-t3er kernel: SUNRPC: fix a memleak in gss_import_v2_context CVE-2023-52653
VCID-zamd-w45x-e3g5 kernel: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker CVE-2024-57888
VCID-zey3-3zvc-tkhh In the Linux kernel, the following vulnerability has been resolved: rxrpc: proc: size address buffers for %pISpc output The AF_RXRPC procfs helpers format local and remote socket addresses into fixed 50-byte stack buffers with "%pISpc". That is too small for the longest current-tree IPv6-with-port form the formatter can produce. In lib/vsprintf.c, the compressed IPv6 path uses a dotted-quad tail not only for v4mapped addresses, but also for ISATAP addresses via ipv6_addr_is_isatap(). As a result, a case such as [ffff:ffff:ffff:ffff:0:5efe:255.255.255.255]:65535 is possible with the current formatter. That is 50 visible characters, so 51 bytes including the trailing NUL, which does not fit in the existing char[50] buffers used by net/rxrpc/proc.c. Size the buffers from the formatter's maximum textual form and switch the call sites to scnprintf(). Changes since v1: - correct the changelog to cite the actual maximum current-tree case explicitly - frame the proof around the ISATAP formatting path instead of the earlier mapped-v4 example CVE-2026-31630
VCID-zgb6-kq8s-w3dm CVE-2026-31686
VCID-zh6a-z135-ayeg kernel: dmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup CVE-2024-27408
VCID-zhaf-5de2-tycd In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use-after-free access to PTP clock PTP clock is registered on every opening of the interface and destroyed on every closing. However it may be accessed via get_ts_info ethtool call which is possible while the interface is just present in the kernel. BUG: KASAN: use-after-free in ptp_clock_index+0x47/0x50 drivers/ptp/ptp_clock.c:426 Read of size 4 at addr ffff8880194345cc by task syz.0.6/948 CPU: 1 PID: 948 Comm: syz.0.6 Not tainted 6.1.164+ #109 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.1-0-g3208b098f51a-prebuilt.qemu.org 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x8d/0xba lib/dump_stack.c:106 print_address_description mm/kasan/report.c:316 [inline] print_report+0x17f/0x496 mm/kasan/report.c:420 kasan_report+0xd9/0x180 mm/kasan/report.c:524 ptp_clock_index+0x47/0x50 drivers/ptp/ptp_clock.c:426 gem_get_ts_info+0x138/0x1e0 drivers/net/ethernet/cadence/macb_main.c:3349 macb_get_ts_info+0x68/0xb0 drivers/net/ethernet/cadence/macb_main.c:3371 __ethtool_get_ts_info+0x17c/0x260 net/ethtool/common.c:558 ethtool_get_ts_info net/ethtool/ioctl.c:2367 [inline] __dev_ethtool net/ethtool/ioctl.c:3017 [inline] dev_ethtool+0x2b05/0x6290 net/ethtool/ioctl.c:3095 dev_ioctl+0x637/0x1070 net/core/dev_ioctl.c:510 sock_do_ioctl+0x20d/0x2c0 net/socket.c:1215 sock_ioctl+0x577/0x6d0 net/socket.c:1320 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __x64_sys_ioctl+0x18c/0x210 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 </TASK> Allocated by task 457: kmalloc include/linux/slab.h:563 [inline] kzalloc include/linux/slab.h:699 [inline] ptp_clock_register+0x144/0x10e0 drivers/ptp/ptp_clock.c:235 gem_ptp_init+0x46f/0x930 drivers/net/ethernet/cadence/macb_ptp.c:375 macb_open+0x901/0xd10 drivers/net/ethernet/cadence/macb_main.c:2920 __dev_open+0x2ce/0x500 net/core/dev.c:1501 __dev_change_flags+0x56a/0x740 net/core/dev.c:8651 dev_change_flags+0x92/0x170 net/core/dev.c:8722 do_setlink+0xaf8/0x3a80 net/core/rtnetlink.c:2833 __rtnl_newlink+0xbf4/0x1940 net/core/rtnetlink.c:3608 rtnl_newlink+0x63/0xa0 net/core/rtnetlink.c:3655 rtnetlink_rcv_msg+0x3c6/0xed0 net/core/rtnetlink.c:6150 netlink_rcv_skb+0x15d/0x430 net/netlink/af_netlink.c:2511 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x6d7/0xa30 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x97e/0xeb0 net/netlink/af_netlink.c:1872 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x14b/0x180 net/socket.c:730 __sys_sendto+0x320/0x3b0 net/socket.c:2152 __do_sys_sendto net/socket.c:2164 [inline] __se_sys_sendto net/socket.c:2160 [inline] __x64_sys_sendto+0xdc/0x1b0 net/socket.c:2160 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Freed by task 938: kasan_slab_free include/linux/kasan.h:177 [inline] slab_free_hook mm/slub.c:1729 [inline] slab_free_freelist_hook mm/slub.c:1755 [inline] slab_free mm/slub.c:3687 [inline] __kmem_cache_free+0xbc/0x320 mm/slub.c:3700 device_release+0xa0/0x240 drivers/base/core.c:2507 kobject_cleanup lib/kobject.c:681 [inline] kobject_release lib/kobject.c:712 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1cd/0x350 lib/kobject.c:729 put_device+0x1b/0x30 drivers/base/core.c:3805 ptp_clock_unregister+0x171/0x270 drivers/ptp/ptp_clock.c:391 gem_ptp_remove+0x4e/0x1f0 drivers/net/ethernet/cadence/macb_ptp.c:404 macb_close+0x1c8/0x270 drivers/net/ethernet/cadence/macb_main.c:2966 __dev_close_many+0x1b9/0x310 net/core/dev.c:1585 __dev_close net/core/dev.c:1597 [inline] __dev_change_flags+0x2bb/0x740 net/core/dev.c:8649 dev_change_fl ---truncated--- CVE-2026-31396
VCID-zrf8-efng-gfd9 kernel: drm/amd/display: fix incorrect mpc_combine array size CVE-2024-26914
VCID-zs1j-hpbv-7qbz kernel: ibmvnic: Use kernel helpers for hex dumps CVE-2025-22104
VCID-zs38-9m63-xfh9 CVE-2026-31683
VCID-zufu-pwxh-eqbw kernel: PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops CVE-2025-38069
VCID-zvp5-zhsh-9qap kernel: ntfs: set dummy blocksize to read boot_block when mounting CVE-2025-71067
VCID-zx9u-zu1f-gbf2 kernel: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM CVE-2024-56611
VCID-zxmw-r6pn-6fdt kernel: scsi: hisi_sas: Grab sas_dev lock when traversing the members of sas_dev.list CVE-2023-53627
VCID-zyme-v3xf-3kah kernel: scsi: mpi3mr: Fix possible crash when setting up bsg fails CVE-2025-21723

Date Actor Action Vulnerability Source VulnerableCode Version
2026-05-02T08:13:33.257184+00:00 Debian Importer Fixing VCID-w8d1-9zry-wydv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T08:12:06.734956+00:00 Debian Importer Fixing VCID-dqu3-2d1w-bked https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T08:05:57.575887+00:00 Debian Importer Fixing VCID-f5xb-v8j6-nye2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T08:00:56.267728+00:00 Debian Importer Fixing VCID-n99v-8wyx-a3cr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T07:43:26.635855+00:00 Debian Importer Fixing VCID-kvq6-38sd-77h7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T07:35:41.576838+00:00 Debian Importer Fixing VCID-1kgs-19ue-wbe1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T07:30:14.045940+00:00 Debian Importer Fixing VCID-95pv-sezn-6qhp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T07:01:11.388512+00:00 Debian Importer Fixing VCID-xnee-wpbs-7bc2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:58:37.087758+00:00 Debian Importer Fixing VCID-euxu-gjpw-8yhs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:53:10.010455+00:00 Debian Importer Fixing VCID-9rrq-d3g4-jyfy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:49:46.463612+00:00 Debian Importer Fixing VCID-fhfz-6h5m-hbed https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:44:51.224397+00:00 Debian Importer Fixing VCID-a454-61sh-j7ay https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:40:39.974002+00:00 Debian Importer Fixing VCID-ht2j-bafp-eudq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:38:30.196199+00:00 Debian Importer Fixing VCID-wvu1-rfc1-zya9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:35:22.051937+00:00 Debian Importer Fixing VCID-9bru-3rtm-sfey https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:14:05.713848+00:00 Debian Importer Fixing VCID-jyxp-bjx8-kfbd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:06:36.104618+00:00 Debian Importer Fixing VCID-x5y6-u3c8-3qbe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:06:33.636419+00:00 Debian Importer Fixing VCID-uvrh-s5dy-puc5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T06:01:00.401910+00:00 Debian Importer Fixing VCID-kgnw-n75c-mqe3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:40:22.681817+00:00 Debian Importer Fixing VCID-aw15-85yp-e7b6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:39:17.119719+00:00 Debian Importer Fixing VCID-brte-gqy3-r3ax https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:37:42.605069+00:00 Debian Importer Fixing VCID-sqkd-cwbk-tkec https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:28:20.271774+00:00 Debian Importer Fixing VCID-3jmx-jfhk-yqh5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:24:26.723119+00:00 Debian Importer Fixing VCID-656s-tkaz-m7bj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:21:00.148628+00:00 Debian Importer Fixing VCID-cc41-mkuk-2fgu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:17:24.488885+00:00 Debian Importer Fixing VCID-v9bm-48ec-9fc2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:17:13.817927+00:00 Debian Importer Fixing VCID-pgrh-f1dv-27dh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:14:29.635338+00:00 Debian Importer Fixing VCID-ya16-qrwm-kkfs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T05:12:18.806975+00:00 Debian Importer Fixing VCID-7fmr-tj7p-4uap https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:53:28.143170+00:00 Debian Importer Fixing VCID-179u-b611-z7hc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:52:35.865674+00:00 Debian Importer Fixing VCID-ppa4-r2pf-v7a2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:50:21.075736+00:00 Debian Importer Fixing VCID-cfrh-y31w-r7de https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:47:22.242290+00:00 Debian Importer Fixing VCID-tz5h-hd3e-rbbv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:46:47.636208+00:00 Debian Importer Fixing VCID-sx8s-kw5x-myea https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:44:20.577711+00:00 Debian Importer Fixing VCID-9wsp-xbm7-yfb9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:41:18.162740+00:00 Debian Importer Fixing VCID-4e1f-qvnx-87fc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:32:51.105712+00:00 Debian Importer Fixing VCID-1k5n-pxpr-4bc4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:25:34.579051+00:00 Debian Importer Fixing VCID-g2yr-d1ta-93g7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:18:01.590663+00:00 Debian Importer Fixing VCID-e8ky-fyhz-dqhc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:13:44.631943+00:00 Debian Importer Fixing VCID-yvab-budx-47ec https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:13:19.346069+00:00 Debian Importer Fixing VCID-8qua-yr2x-s7fd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:09:26.659805+00:00 Debian Importer Fixing VCID-kdmz-w6db-7ue2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:09:09.991905+00:00 Debian Importer Fixing VCID-jxkv-jbh3-9fhj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:04:54.465953+00:00 Debian Importer Fixing VCID-xbbw-gd21-sfgs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T04:03:37.041586+00:00 Debian Importer Fixing VCID-c8qb-kbef-8qg8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:55:03.650614+00:00 Debian Importer Fixing VCID-p2gz-4gyx-ebbu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:52:42.924383+00:00 Debian Importer Fixing VCID-fs2g-g159-guhj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:49:03.631140+00:00 Debian Importer Fixing VCID-txtu-9qtr-13bj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:44:44.861979+00:00 Debian Importer Fixing VCID-fs73-5ucn-qke1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:34:56.202992+00:00 Debian Importer Fixing VCID-e1pe-znzp-jqhx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:34:35.228671+00:00 Debian Importer Fixing VCID-kw1q-k8cm-j7dj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:22:06.285975+00:00 Debian Importer Fixing VCID-5ahq-saw1-suf1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:15:20.127525+00:00 Debian Importer Fixing VCID-zs38-9m63-xfh9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:13:44.279782+00:00 Debian Importer Fixing VCID-11nd-2f5c-ybe1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:08:16.244794+00:00 Debian Importer Fixing VCID-vz1n-7fbk-kyag https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:01:55.012689+00:00 Debian Importer Fixing VCID-9jq2-6zek-rqh3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:56:51.931532+00:00 Debian Importer Fixing VCID-cvcu-khre-3bc8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:56:21.447563+00:00 Debian Importer Fixing VCID-sm3v-84rs-nyem https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:54:31.956638+00:00 Debian Importer Fixing VCID-qjqb-cqc9-17e1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:54:09.074782+00:00 Debian Importer Fixing VCID-cyy8-6pff-vyf1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:51:52.040472+00:00 Debian Importer Fixing VCID-9zxp-tyb1-ubg8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:51:38.118458+00:00 Debian Importer Fixing VCID-p1xn-hbgr-efby https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:44:32.913028+00:00 Debian Importer Fixing VCID-cv97-j139-vbfz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:42:43.454890+00:00 Debian Importer Fixing VCID-6xv7-46du-f7ha https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:38:45.054600+00:00 Debian Importer Fixing VCID-ete6-ycnw-7kgg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:36:23.234290+00:00 Debian Importer Fixing VCID-hjf7-23wz-1qeg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:32:03.360208+00:00 Debian Importer Fixing VCID-22zu-qy6y-aub1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:30:43.604966+00:00 Debian Importer Fixing VCID-t2sv-vqq2-q7av https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:29:37.312076+00:00 Debian Importer Fixing VCID-8e38-5bq1-8be9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:28:42.505763+00:00 Debian Importer Fixing VCID-4bsb-hypz-5bav https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:28:13.586775+00:00 Debian Importer Fixing VCID-tb98-2sh1-67d4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:24:31.103522+00:00 Debian Importer Fixing VCID-ky32-n1qj-nydf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:23:55.638924+00:00 Debian Importer Fixing VCID-rv7g-3bjt-qkgc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:23:30.792295+00:00 Debian Importer Fixing VCID-188w-9sxd-5khx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:23:23.792786+00:00 Debian Importer Fixing VCID-pest-xjma-sfbn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:22:46.244342+00:00 Debian Importer Fixing VCID-zey3-3zvc-tkhh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:22:39.480863+00:00 Debian Importer Fixing VCID-j7c3-n2w7-fbg4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:18:44.959854+00:00 Debian Importer Fixing VCID-czue-c27z-bkgp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:18:39.427349+00:00 Debian Importer Fixing VCID-d4u6-bzuu-dubz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:15:49.354713+00:00 Debian Importer Fixing VCID-2dp8-mmkf-w7dx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:15:00.738424+00:00 Debian Importer Fixing VCID-purc-p6w1-1fhc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:14:55.110668+00:00 Debian Importer Fixing VCID-uyug-vjrw-87h6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:12:55.925804+00:00 Debian Importer Fixing VCID-padk-1w3h-7bfs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:12:19.463493+00:00 Debian Importer Fixing VCID-yvk3-2upk-pkem https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:10:41.398356+00:00 Debian Importer Fixing VCID-6syp-3js8-qudn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:08:37.134623+00:00 Debian Importer Fixing VCID-1s26-havx-dkey https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:08:08.381309+00:00 Debian Importer Fixing VCID-pytf-9ehq-ykc5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:06:45.229208+00:00 Debian Importer Fixing VCID-fp52-xjc8-s3bw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:05:35.915422+00:00 Debian Importer Fixing VCID-r89h-js19-77dr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:03:44.349029+00:00 Debian Importer Fixing VCID-zgb6-kq8s-w3dm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:03:14.306672+00:00 Debian Importer Fixing VCID-4gup-x2rj-w3bq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:00:22.423983+00:00 Debian Importer Fixing VCID-ed3p-sm1w-33am https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:59:22.800773+00:00 Debian Importer Fixing VCID-4eg9-yh2g-a7gc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:57:02.825756+00:00 Debian Importer Fixing VCID-xh6y-ja9y-u3es https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:57:00.417861+00:00 Debian Importer Fixing VCID-fhme-yjgr-suep https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:55:49.016750+00:00 Debian Importer Fixing VCID-4jvb-unxd-3qg3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:53:57.836497+00:00 Debian Importer Fixing VCID-jz2j-4jqz-8fdg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:52:05.186086+00:00 Debian Importer Fixing VCID-b1an-t4b8-4bd1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:51:30.584378+00:00 Debian Importer Fixing VCID-cwk5-n1mq-kkd2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:51:06.266566+00:00 Debian Importer Fixing VCID-psqs-wgmf-57d8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:49:24.061932+00:00 Debian Importer Fixing VCID-xzc2-9tmc-7qey https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:44:48.603282+00:00 Debian Importer Fixing VCID-m6h1-8erq-dqb8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:43:53.062474+00:00 Debian Importer Fixing VCID-2wmk-4bjz-bbhh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:42:19.936413+00:00 Debian Importer Fixing VCID-b51x-3ss2-67ex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:42:17.956517+00:00 Debian Importer Fixing VCID-khrd-ya2n-rygv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:41:52.289370+00:00 Debian Importer Fixing VCID-c8xs-q7hr-uua8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:39:04.590514+00:00 Debian Importer Fixing VCID-ypt7-tc1u-p3ev https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:38:17.108685+00:00 Debian Importer Fixing VCID-14u5-h6vv-p7c3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:37:50.518997+00:00 Debian Importer Fixing VCID-yqcj-27j2-tqb8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:36:06.591041+00:00 Debian Importer Fixing VCID-d9ty-7748-33a7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:35:31.861888+00:00 Debian Importer Fixing VCID-abcd-nfuq-2kc6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:33:26.337490+00:00 Debian Importer Fixing VCID-pmn9-t8by-myhb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:31:02.977052+00:00 Debian Importer Fixing VCID-dwp4-mc1w-4bcw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:30:28.247975+00:00 Debian Importer Fixing VCID-rkqz-erqh-dfh4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:30:07.081527+00:00 Debian Importer Fixing VCID-yj3z-hvs9-47hj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:29:55.574209+00:00 Debian Importer Fixing VCID-tspb-2q9s-u3d6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:29:37.381409+00:00 Debian Importer Fixing VCID-gbkk-anun-a3ce https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:28:46.477010+00:00 Debian Importer Fixing VCID-25nt-fa4m-97fm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:28:11.234212+00:00 Debian Importer Fixing VCID-9axt-c2hy-63eb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:27:18.768817+00:00 Debian Importer Fixing VCID-wtcb-jzbu-fkcn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:24:59.408964+00:00 Debian Importer Fixing VCID-xhfy-gkwq-afbr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:24:51.233984+00:00 Debian Importer Fixing VCID-4399-j8sn-t3b1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:23:54.435383+00:00 Debian Importer Fixing VCID-pepq-cqcb-dkdm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:23:43.911625+00:00 Debian Importer Fixing VCID-2vqp-wpcw-pfbm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:23:18.501716+00:00 Debian Importer Fixing VCID-syxu-a4az-qfe4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:20:52.504158+00:00 Debian Importer Fixing VCID-es8r-wvmz-gfe6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:20:38.737149+00:00 Debian Importer Fixing VCID-hhxy-swz4-eqfy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:20:16.827238+00:00 Debian Importer Fixing VCID-bg8h-jw13-8yhk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:18:04.993763+00:00 Debian Importer Fixing VCID-p472-z1xz-r3cj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:17:26.821261+00:00 Debian Importer Fixing VCID-wjeh-m3f2-tkbg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:17:08.847056+00:00 Debian Importer Fixing VCID-3ktq-cbhp-8fhb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:17:04.680395+00:00 Debian Importer Fixing VCID-tu5g-jnzs-33d4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:16:36.922380+00:00 Debian Importer Fixing VCID-jbs2-t7yr-rqh3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:13:29.383353+00:00 Debian Importer Fixing VCID-jx72-vpup-p3gk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:12:36.030470+00:00 Debian Importer Fixing VCID-6uka-tgq1-gfb6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:11:50.441599+00:00 Debian Importer Fixing VCID-8ssr-76q5-6kf4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:07:59.754949+00:00 Debian Importer Fixing VCID-rjdd-dk1r-subd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:06:01.624989+00:00 Debian Importer Fixing VCID-3qmn-b1w4-jkg4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:04:57.882939+00:00 Debian Importer Fixing VCID-vz73-y2va-5kbw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:04:49.720749+00:00 Debian Importer Fixing VCID-y54q-e569-p7cx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:04:15.850099+00:00 Debian Importer Fixing VCID-8q49-pygk-33d1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:03:49.393649+00:00 Debian Importer Fixing VCID-6hur-ug1s-83am https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:03:21.618967+00:00 Debian Importer Fixing VCID-qwre-yeev-uya8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:01:29.058124+00:00 Debian Importer Fixing VCID-t5y5-2hne-7keh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:00:45.220205+00:00 Debian Importer Fixing VCID-xs4a-ha3z-2bej https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:00:00.709846+00:00 Debian Importer Fixing VCID-3z2m-anud-zubb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:59:41.570183+00:00 Debian Importer Fixing VCID-v3ba-uvsy-ybfv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:59:26.830488+00:00 Debian Importer Fixing VCID-14ey-bdy6-5qe9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:58:56.394682+00:00 Debian Importer Fixing VCID-mzg4-exh3-pugu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:57:29.488565+00:00 Debian Importer Fixing VCID-687u-nzmt-n7a6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:57:19.895907+00:00 Debian Importer Fixing VCID-e495-c57w-tkft https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:56:57.653060+00:00 Debian Importer Fixing VCID-vekd-9q54-b7bg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:56:43.664224+00:00 Debian Importer Fixing VCID-2bbj-94mj-rfa7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:56:31.448592+00:00 Debian Importer Fixing VCID-esup-2y63-afa4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:55:23.587963+00:00 Debian Importer Fixing VCID-dzvh-zq3w-r7ah https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:55:10.276688+00:00 Debian Importer Fixing VCID-rq73-h79m-hqhy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:54:50.482349+00:00 Debian Importer Fixing VCID-xncx-nvr7-k7d8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:53:59.836007+00:00 Debian Importer Fixing VCID-9cuj-t2sc-bbdj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:53:13.981301+00:00 Debian Importer Fixing VCID-hq39-2qnw-v3dw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:53:00.066585+00:00 Debian Importer Fixing VCID-9axb-sz3w-ubcx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:52:52.301291+00:00 Debian Importer Fixing VCID-92j7-p476-97ca https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:52:10.918816+00:00 Debian Importer Fixing VCID-33re-7rh6-2bg4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:51:48.842535+00:00 Debian Importer Fixing VCID-ddm7-5p27-3khg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:51:14.156742+00:00 Debian Importer Fixing VCID-c7xf-x7d5-87gn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:51:08.814721+00:00 Debian Importer Fixing VCID-hucp-gu2u-97e1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:50:38.964356+00:00 Debian Importer Fixing VCID-8d9a-bf6e-dkga https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:50:29.155192+00:00 Debian Importer Fixing VCID-p72b-szhh-wyd6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:50:13.361585+00:00 Debian Importer Fixing VCID-k68k-tnns-mkga https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:49:54.224846+00:00 Debian Importer Fixing VCID-38ja-dsj5-qyfc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:49:37.483990+00:00 Debian Importer Fixing VCID-n88t-yc67-r3f5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:49:20.912435+00:00 Debian Importer Fixing VCID-1zbm-pnj5-xqb4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:48:40.643710+00:00 Debian Importer Fixing VCID-d5cu-m235-x3gr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:48:10.004796+00:00 Debian Importer Fixing VCID-h31q-rcq3-7ud3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:48:02.955379+00:00 Debian Importer Fixing VCID-5j3a-r6pk-2kdb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:47:27.225212+00:00 Debian Importer Fixing VCID-qyu2-kw7b-1kg1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:46:39.890281+00:00 Debian Importer Fixing VCID-p9x5-syxd-fufc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:46:36.717095+00:00 Debian Importer Fixing VCID-w4d7-nppw-pye9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:45:35.203754+00:00 Debian Importer Fixing VCID-3ay8-sdv3-3ydv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:45:05.213027+00:00 Debian Importer Fixing VCID-1dxt-yy4z-y7cs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:44:42.748992+00:00 Debian Importer Fixing VCID-5zuy-q1p8-hqex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:44:37.480245+00:00 Debian Importer Fixing VCID-m995-b8rn-tkgk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:44:21.067653+00:00 Debian Importer Fixing VCID-vg82-2bbq-q7ex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:43:45.068192+00:00 Debian Importer Fixing VCID-f2m2-u9j3-3ba9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:42:20.693278+00:00 Debian Importer Fixing VCID-s5k9-u1uk-3be8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:42:16.318072+00:00 Debian Importer Fixing VCID-gyzx-musu-83c4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:40:55.942827+00:00 Debian Importer Fixing VCID-r7fp-rb7m-b7gs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:37:39.507171+00:00 Debian Importer Fixing VCID-q7a3-cm2m-ayga https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:35:57.089937+00:00 Debian Importer Fixing VCID-341t-wy9a-p7fz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:35:01.333423+00:00 Debian Importer Fixing VCID-sv8j-57vx-9ubs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:34:39.186862+00:00 Debian Importer Fixing VCID-eetb-e929-77bc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:34:10.672238+00:00 Debian Importer Fixing VCID-tp92-5gfk-1qb5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:33:13.513115+00:00 Debian Importer Fixing VCID-uzrt-axb3-qfcs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:32:05.623660+00:00 Debian Importer Fixing VCID-mkw6-9tye-x3fb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:31:50.131445+00:00 Debian Importer Fixing VCID-jq8m-nxpa-p3hy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:31:45.458896+00:00 Debian Importer Fixing VCID-hwat-fnmq-vydn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:31:34.170184+00:00 Debian Importer Fixing VCID-xag6-3jdm-bqha https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:31:11.502370+00:00 Debian Importer Fixing VCID-7t89-3m8t-1ydq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:30:42.929090+00:00 Debian Importer Fixing VCID-f3sv-pbfs-cqcc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:30:33.838026+00:00 Debian Importer Fixing VCID-9tb7-5mp1-pkhc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:29:17.593605+00:00 Debian Importer Fixing VCID-sdwv-6ycc-9ubh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:29:16.645442+00:00 Debian Importer Fixing VCID-d83g-5tdr-7fd5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:29:10.873926+00:00 Debian Importer Fixing VCID-ucab-wj54-hyey https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:26:55.780629+00:00 Debian Importer Fixing VCID-j8yy-3tn1-63b5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:26:52.477528+00:00 Debian Importer Fixing VCID-dda8-c6rr-sqgq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:25:57.116011+00:00 Debian Importer Fixing VCID-j3rb-57kd-rfd1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:25:26.871141+00:00 Debian Importer Fixing VCID-s3mt-8hwh-xkgm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:24:54.801929+00:00 Debian Importer Fixing VCID-sy3c-f5q7-qygm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:24:01.914227+00:00 Debian Importer Fixing VCID-3ans-72mm-sfh1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:23:56.599600+00:00 Debian Importer Fixing VCID-sqf7-4e8r-7ken https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:23:48.623857+00:00 Debian Importer Fixing VCID-drqe-npyk-5yfa https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:23:23.488461+00:00 Debian Importer Fixing VCID-m3ch-q8dr-xkay https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:23:02.334389+00:00 Debian Importer Fixing VCID-wvp8-cst3-cuhr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:21:32.747211+00:00 Debian Importer Fixing VCID-than-1kz8-yucx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:20:01.314822+00:00 Debian Importer Fixing VCID-qffu-7n92-bbhy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:19:58.228960+00:00 Debian Importer Fixing VCID-2369-8134-y3ck https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:19:55.693993+00:00 Debian Importer Fixing VCID-rxej-y11f-tbca https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:19:19.137101+00:00 Debian Importer Fixing VCID-v2y7-vmt3-w3dq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:18:49.072059+00:00 Debian Importer Fixing VCID-xh1w-u484-dbet https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:18:18.886437+00:00 Debian Importer Fixing VCID-46pr-2cfb-mbhn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:17:54.231064+00:00 Debian Importer Fixing VCID-skjn-kete-x7e1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:17:43.724643+00:00 Debian Importer Fixing VCID-2cky-e16g-yqgf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:16:43.967588+00:00 Debian Importer Fixing VCID-8v51-tdqe-tbcp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:16:10.120809+00:00 Debian Importer Fixing VCID-zxmw-r6pn-6fdt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:16:04.674598+00:00 Debian Importer Fixing VCID-17tu-a4wu-b3hv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:15:16.561840+00:00 Debian Importer Fixing VCID-zs1j-hpbv-7qbz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:14:55.956052+00:00 Debian Importer Fixing VCID-g7k7-e2h7-a7f6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:14:30.649140+00:00 Debian Importer Fixing VCID-p6sm-vcng-mubd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:12:05.500438+00:00 Debian Importer Fixing VCID-2kan-b4em-f3fg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:11:49.211113+00:00 Debian Importer Fixing VCID-nuhs-4sjq-dkcb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:11:30.757965+00:00 Debian Importer Fixing VCID-fqzh-sckm-a3ff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:10:49.231083+00:00 Debian Importer Fixing VCID-y3wu-za9p-yub1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:10:25.793266+00:00 Debian Importer Fixing VCID-82f7-2axv-jbbf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:10:17.636299+00:00 Debian Importer Fixing VCID-vx8c-nssy-ubaj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:10:03.034719+00:00 Debian Importer Fixing VCID-4spt-a3n7-z7fu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:10:00.413002+00:00 Debian Importer Fixing VCID-878n-d9ss-rugc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:09:53.908604+00:00 Debian Importer Fixing VCID-5kdh-vgcu-kkf3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:09:37.094684+00:00 Debian Importer Fixing VCID-exkc-gh4x-p3bh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:08:58.295527+00:00 Debian Importer Fixing VCID-fufn-uqtv-wkas https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:08:12.902426+00:00 Debian Importer Fixing VCID-yeww-6ybr-qye8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:08:05.156264+00:00 Debian Importer Fixing VCID-3vk2-4sx1-aybu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:08:01.968903+00:00 Debian Importer Fixing VCID-8xay-cepn-vfdd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:07:59.931637+00:00 Debian Importer Fixing VCID-mjbb-q1nx-8fgj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:07:53.969902+00:00 Debian Importer Fixing VCID-3d8r-1n1k-skff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:07:28.036821+00:00 Debian Importer Fixing VCID-5hdv-pgsr-cfbm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:07:19.389919+00:00 Debian Importer Fixing VCID-7fcn-v6b9-yber https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:07:08.790658+00:00 Debian Importer Fixing VCID-h7pm-dyef-1fan https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:06:31.240783+00:00 Debian Importer Fixing VCID-yj9c-fda5-57g2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:06:01.655582+00:00 Debian Importer Fixing VCID-m4v3-xfhr-rbgt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:05:11.556095+00:00 Debian Importer Fixing VCID-uvyu-va81-wbgj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:04:25.537958+00:00 Debian Importer Fixing VCID-wv35-ucjn-3bb5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:04:03.832398+00:00 Debian Importer Fixing VCID-uzfu-ke47-1qaq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:03:03.868041+00:00 Debian Importer Fixing VCID-31hs-1pwx-7uak https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:03:00.398254+00:00 Debian Importer Fixing VCID-1g77-qwuy-nkg8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:02:21.240186+00:00 Debian Importer Fixing VCID-rjgp-ta5t-vqge https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:02:19.783974+00:00 Debian Importer Fixing VCID-ezwh-qc41-pugn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:01:56.995077+00:00 Debian Importer Fixing VCID-mt8z-wdzf-kugb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:01:49.517981+00:00 Debian Importer Fixing VCID-nw2n-9b59-gbdm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:01:16.498652+00:00 Debian Importer Fixing VCID-4qx6-ysye-efhu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:01:09.228329+00:00 Debian Importer Fixing VCID-h9cw-fv5h-13de https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:00:28.521958+00:00 Debian Importer Fixing VCID-xp23-rfjr-2ydv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:00:16.400984+00:00 Debian Importer Fixing VCID-h7tb-d7q2-pqcr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:00:05.492310+00:00 Debian Importer Fixing VCID-nr6b-wdnx-k7e6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:59:44.027531+00:00 Debian Importer Fixing VCID-3a8a-ns8q-wbgy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:59:34.607774+00:00 Debian Importer Fixing VCID-exhn-kypt-2fbd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:59:07.891290+00:00 Debian Importer Fixing VCID-d1ke-rn87-f7ec https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:58:21.373854+00:00 Debian Importer Fixing VCID-9azr-qrcs-k7by https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:57:07.239451+00:00 Debian Importer Fixing VCID-u6nn-wr8u-qqdj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:57:03.618962+00:00 Debian Importer Fixing VCID-24gw-73zd-3khc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:56:39.128866+00:00 Debian Importer Fixing VCID-n7kt-3rsy-rkg2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:55:55.484299+00:00 Debian Importer Fixing VCID-ajfm-hpzg-uqck https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:54:13.321552+00:00 Debian Importer Fixing VCID-ea36-7v42-fyfp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:53:46.925435+00:00 Debian Importer Fixing VCID-yx9t-1w27-akec https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:53:18.061977+00:00 Debian Importer Fixing VCID-g8k1-wwq1-yka2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:53:06.235050+00:00 Debian Importer Fixing VCID-9n5j-cp2p-qkhc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:53:03.746089+00:00 Debian Importer Fixing VCID-emdc-7k4g-67e5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:51:37.434270+00:00 Debian Importer Fixing VCID-nbnz-q819-f7g8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:50:47.899165+00:00 Debian Importer Fixing VCID-jgaw-mgbm-sfaf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:49:50.751009+00:00 Debian Importer Fixing VCID-4uvy-ga5j-a7g3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:49:44.993974+00:00 Debian Importer Fixing VCID-bxaj-dwje-sbhe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:49:33.111095+00:00 Debian Importer Fixing VCID-4ebq-x7rk-4ya3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:49:03.360222+00:00 Debian Importer Fixing VCID-e2wu-3vmz-3yae https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:47:24.170878+00:00 Debian Importer Fixing VCID-47k1-5vw2-97hy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:47:12.404196+00:00 Debian Importer Fixing VCID-vxys-jj3n-n7gz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:47:11.338387+00:00 Debian Importer Fixing VCID-m4y2-16uk-wkdg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:46:45.212362+00:00 Debian Importer Fixing VCID-xdde-euh1-dqfv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:46:43.363548+00:00 Debian Importer Fixing VCID-yp8m-zttt-ffdt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:45:33.621128+00:00 Debian Importer Fixing VCID-kgv3-f25s-ckd5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:45:29.200763+00:00 Debian Importer Fixing VCID-1zkc-5ucw-e3et https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:45:27.401195+00:00 Debian Importer Fixing VCID-cn7e-8bbs-rubj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:45:00.552492+00:00 Debian Importer Fixing VCID-3ccs-8xaf-wfgw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:44:36.401577+00:00 Debian Importer Fixing VCID-u8gh-ber8-q3dw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:44:30.951043+00:00 Debian Importer Fixing VCID-r23v-vjat-6qdk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:44:06.264036+00:00 Debian Importer Fixing VCID-kk4c-najx-kyhq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:43:39.441945+00:00 Debian Importer Fixing VCID-bkp8-m2yc-qub7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:43:02.437868+00:00 Debian Importer Fixing VCID-gyhz-a9pm-zqav https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:42:55.757707+00:00 Debian Importer Fixing VCID-vck1-emav-93gc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:42:40.497288+00:00 Debian Importer Fixing VCID-9qhe-6xhk-hfhf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:42:29.030057+00:00 Debian Importer Fixing VCID-kye7-8mwh-eyc8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:42:20.723697+00:00 Debian Importer Fixing VCID-dy8y-by76-1ufm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:41:37.759918+00:00 Debian Importer Fixing VCID-mu3y-rdt2-x3g1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:41:31.446916+00:00 Debian Importer Fixing VCID-a89e-bca3-1qfg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:41:22.653661+00:00 Debian Importer Fixing VCID-21z5-p9ct-p7g2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:40:44.096509+00:00 Debian Importer Fixing VCID-cqye-p3y7-bfdp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:40:43.227068+00:00 Debian Importer Fixing VCID-u28n-uwtv-tyaj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:40:38.492601+00:00 Debian Importer Fixing VCID-3bwh-381p-6qbh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:40:35.126890+00:00 Debian Importer Fixing VCID-cvps-1xf8-kqb5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:40:25.295470+00:00 Debian Importer Fixing VCID-ew57-csay-bube https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:40:07.785825+00:00 Debian Importer Fixing VCID-wxx7-3a43-h7gh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:39:46.072231+00:00 Debian Importer Fixing VCID-q7ty-xfyp-cbff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:39:27.369213+00:00 Debian Importer Fixing VCID-atux-q6hk-hfau https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:38:47.738506+00:00 Debian Importer Fixing VCID-vg98-dpfg-u7g8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:38:42.440327+00:00 Debian Importer Fixing VCID-qxth-4ftd-s3ac https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:38:11.636636+00:00 Debian Importer Fixing VCID-9m2t-y1zb-hfar https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:38:10.019491+00:00 Debian Importer Fixing VCID-cecv-w1gr-qkbp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:38:02.667751+00:00 Debian Importer Fixing VCID-av2k-qrby-suhg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:58.114789+00:00 Debian Importer Fixing VCID-ex8u-z3r8-cycq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:55.160102+00:00 Debian Importer Fixing VCID-cear-n94a-jqdq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:49.774474+00:00 Debian Importer Fixing VCID-cp52-z8dw-gfhf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:43.342152+00:00 Debian Importer Fixing VCID-kvbv-df49-gyaj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:41.709518+00:00 Debian Importer Fixing VCID-jhz4-z9f5-4ka3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:26.880672+00:00 Debian Importer Fixing VCID-v9p4-t339-t3g4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:20.231657+00:00 Debian Importer Fixing VCID-m35k-ahnu-abh1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:37:15.975650+00:00 Debian Importer Fixing VCID-ner2-8g1r-6bh5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:36:40.322756+00:00 Debian Importer Fixing VCID-yx1f-r3sr-rues https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:36:33.753311+00:00 Debian Importer Fixing VCID-szq9-t587-83h2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:36:31.333651+00:00 Debian Importer Fixing VCID-1s77-djzb-xffp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:36:20.349118+00:00 Debian Importer Fixing VCID-dqp6-k3du-n3ep https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:36:05.192695+00:00 Debian Importer Fixing VCID-hbzk-b7gn-9bgz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:35:56.257404+00:00 Debian Importer Fixing VCID-a7fz-5z23-17ey https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:35:47.598662+00:00 Debian Importer Fixing VCID-8xdj-ys7r-rffm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:34:02.561403+00:00 Debian Importer Fixing VCID-8bmx-4nbw-6qcn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:33:43.136800+00:00 Debian Importer Fixing VCID-9sm6-shj5-cqh5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:33:39.239473+00:00 Debian Importer Fixing VCID-8q1z-p2qp-nkbf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:33:25.495119+00:00 Debian Importer Fixing VCID-zufu-pwxh-eqbw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:32:09.426236+00:00 Debian Importer Fixing VCID-ptyj-1y6d-dud1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:31:45.459536+00:00 Debian Importer Fixing VCID-6wrr-yr71-xuhk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:31:07.236262+00:00 Debian Importer Fixing VCID-995q-6nn5-ykgg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:30:37.620377+00:00 Debian Importer Fixing VCID-p4as-tvvw-ubcu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:30:34.037829+00:00 Debian Importer Fixing VCID-q1ts-48c2-xkgb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:30:12.620952+00:00 Debian Importer Fixing VCID-xafq-y8ca-hkhe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:29:48.968135+00:00 Debian Importer Fixing VCID-gekz-p7dw-cbb1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:29:22.907082+00:00 Debian Importer Fixing VCID-e2vy-prvw-xkhq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:29:14.498619+00:00 Debian Importer Fixing VCID-ka1g-skuq-gqcs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:29:09.873421+00:00 Debian Importer Fixing VCID-ans1-wmuz-e3bw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:29:03.394668+00:00 Debian Importer Fixing VCID-w1sf-m294-jke8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:28:58.833053+00:00 Debian Importer Fixing VCID-yf6e-3aw3-tqeg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:28:44.242206+00:00 Debian Importer Fixing VCID-94ha-pwzk-dbdt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:28:29.755262+00:00 Debian Importer Fixing VCID-sq9c-y7kc-1yga https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:27:51.975376+00:00 Debian Importer Fixing VCID-6tb9-nnj3-57gv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:27:01.996235+00:00 Debian Importer Fixing VCID-r4kz-m7m8-c3b2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:27:00.790011+00:00 Debian Importer Fixing VCID-93yj-3vbb-3ub5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:26:55.470642+00:00 Debian Importer Fixing VCID-2cxv-ay17-4kh2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:26:54.176722+00:00 Debian Importer Fixing VCID-v3m5-xj2s-5yef https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:26:34.658333+00:00 Debian Importer Fixing VCID-16bv-9gad-pkat https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:26:31.182279+00:00 Debian Importer Fixing VCID-n1tb-u9us-57bv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:26:24.322655+00:00 Debian Importer Fixing VCID-vejg-5n4z-c7e8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:26:08.399620+00:00 Debian Importer Fixing VCID-ppyy-4rvt-gydv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:25:58.452980+00:00 Debian Importer Fixing VCID-f76c-qhke-3bag https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:25:46.897205+00:00 Debian Importer Fixing VCID-bfjx-x5b3-53bg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:25:10.192876+00:00 Debian Importer Fixing VCID-wnh7-18vz-vbgn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:24:56.219022+00:00 Debian Importer Fixing VCID-a2jn-1xhp-9fg3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:23:25.996312+00:00 Debian Importer Fixing VCID-d131-p16m-jqhd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:23:13.633366+00:00 Debian Importer Fixing VCID-g34c-hwct-tqb1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:23:07.296486+00:00 Debian Importer Fixing VCID-99f9-ne8p-d7c5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:22:52.707426+00:00 Debian Importer Fixing VCID-sxyp-anqf-z3hq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:22:36.276207+00:00 Debian Importer Fixing VCID-mp87-833h-4uag https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:21:20.513449+00:00 Debian Importer Fixing VCID-1g53-791b-8fd7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:21:01.557434+00:00 Debian Importer Fixing VCID-sne8-13hq-mqan https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:20:52.609540+00:00 Debian Importer Fixing VCID-ruxz-24k9-sbcf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:20:35.680786+00:00 Debian Importer Fixing VCID-kcca-um99-4ugp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:20:34.541023+00:00 Debian Importer Fixing VCID-2kk2-cj4m-6ucm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:20:33.580820+00:00 Debian Importer Fixing VCID-9kuz-7fag-4qhv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:20:32.162991+00:00 Debian Importer Fixing VCID-aj3p-9trr-87cz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:20:21.151086+00:00 Debian Importer Fixing VCID-7hxb-dbmf-nufr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:19:56.801892+00:00 Debian Importer Fixing VCID-fx2q-84en-qyah https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:19:23.256767+00:00 Debian Importer Fixing VCID-4vs9-vhrd-zfgn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:19:03.795922+00:00 Debian Importer Fixing VCID-xqpe-25bd-vygx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:19:03.138003+00:00 Debian Importer Fixing VCID-xb4p-ngcu-m3by https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:18:56.568497+00:00 Debian Importer Fixing VCID-pnfa-xm28-w3bk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:18:36.678088+00:00 Debian Importer Fixing VCID-m6yv-nu11-ayg2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:18:28.338704+00:00 Debian Importer Fixing VCID-ug16-p9vj-57e7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:18:03.878601+00:00 Debian Importer Fixing VCID-dqe1-cf2v-myes https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:17:53.607057+00:00 Debian Importer Fixing VCID-qa1s-pr21-cycs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:17:47.842781+00:00 Debian Importer Fixing VCID-tyvp-9xvj-7uax https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:17:39.820905+00:00 Debian Importer Fixing VCID-64g2-43qf-5qg1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:17:35.388331+00:00 Debian Importer Fixing VCID-8sv6-72c2-kybe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:17:18.087074+00:00 Debian Importer Fixing VCID-a6ke-6716-fker https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:16:55.744852+00:00 Debian Importer Fixing VCID-25ja-vd4z-3ffc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:15:43.081268+00:00 Debian Importer Fixing VCID-1ajk-6gxr-efgp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:15:37.632572+00:00 Debian Importer Fixing VCID-94k1-ja9w-2fd2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:15:33.610702+00:00 Debian Importer Fixing VCID-htyr-jnu7-e3gf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:15:06.733103+00:00 Debian Importer Fixing VCID-gv7r-71cz-e3cz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:14:52.227010+00:00 Debian Importer Fixing VCID-c2y9-myfb-s3f6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:14:48.093245+00:00 Debian Importer Fixing VCID-apfq-mqch-jkgr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:14:25.587163+00:00 Debian Importer Fixing VCID-5agv-svfz-pqcv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:13:50.764498+00:00 Debian Importer Fixing VCID-8ama-833x-xuh5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:13:10.868191+00:00 Debian Importer Fixing VCID-qje4-3svy-5kg8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:13:05.726090+00:00 Debian Importer Fixing VCID-wanj-gu4w-2qaz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:12:51.034191+00:00 Debian Importer Fixing VCID-kpyj-qqha-1udx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:12:46.551882+00:00 Debian Importer Fixing VCID-5v5u-d5mg-53bv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:12:18.102920+00:00 Debian Importer Fixing VCID-a29y-u4f3-nkfk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:12:13.437750+00:00 Debian Importer Fixing VCID-huh6-94c8-rkad https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:12:08.072656+00:00 Debian Importer Fixing VCID-cfms-gd2h-v7gd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:11:49.607049+00:00 Debian Importer Fixing VCID-n127-8kq6-1kb6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:11:40.183989+00:00 Debian Importer Fixing VCID-9dfd-an6h-67gp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:11:35.770578+00:00 Debian Importer Fixing VCID-ytcn-fxjj-efhj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:11:25.179622+00:00 Debian Importer Fixing VCID-ytfc-yqtw-4yhb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:11:10.313131+00:00 Debian Importer Fixing VCID-tfg7-cn7k-ffaj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:10:55.160184+00:00 Debian Importer Fixing VCID-b9uq-ggy1-eyan https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:10:44.295876+00:00 Debian Importer Fixing VCID-9t5k-1w4u-8kep https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:10:19.893163+00:00 Debian Importer Fixing VCID-texr-5weq-v3dw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:10:15.193452+00:00 Debian Importer Fixing VCID-wq4h-q7vt-23ex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:10:12.008744+00:00 Debian Importer Fixing VCID-142k-7wgv-pfh6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:10:09.316560+00:00 Debian Importer Fixing VCID-zamd-w45x-e3g5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:09:35.896758+00:00 Debian Importer Fixing VCID-mrh8-akgh-ybby https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:09:13.478627+00:00 Debian Importer Fixing VCID-u892-96zg-9ke6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:09:10.853800+00:00 Debian Importer Fixing VCID-y6kc-guf2-bqdz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:09:07.722280+00:00 Debian Importer Fixing VCID-ehtx-jr8g-vbgb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:51.798029+00:00 Debian Importer Fixing VCID-uhng-dru9-7yht https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:49.931494+00:00 Debian Importer Fixing VCID-3yzs-sjd2-53d7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:44.995027+00:00 Debian Importer Fixing VCID-wzkm-rtcg-cbdu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:33.205757+00:00 Debian Importer Fixing VCID-7v66-8w2u-duf9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:22.269003+00:00 Debian Importer Fixing VCID-c3wk-9gm2-fkeq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:18.012970+00:00 Debian Importer Fixing VCID-nv6q-r1kv-c7e3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:09.371210+00:00 Debian Importer Fixing VCID-x9wt-jmne-vudk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:08:02.773078+00:00 Debian Importer Fixing VCID-94kq-ycmm-3bgn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:07:55.298028+00:00 Debian Importer Fixing VCID-8b4z-nus3-c7h8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:07:37.848449+00:00 Debian Importer Fixing VCID-qucs-qaj4-q7cf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:07:25.776762+00:00 Debian Importer Fixing VCID-93h7-cr4j-sbfn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:07:25.047102+00:00 Debian Importer Fixing VCID-yr96-2nha-xbed https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:06:05.919378+00:00 Debian Importer Fixing VCID-p31e-jzac-8kbe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:06:02.737827+00:00 Debian Importer Fixing VCID-jbyd-zxvz-mkf2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:05:53.417072+00:00 Debian Importer Fixing VCID-5vkh-dbsm-vbgu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:05:46.893981+00:00 Debian Importer Fixing VCID-zvp5-zhsh-9qap https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:05:28.455055+00:00 Debian Importer Fixing VCID-3ng4-wb1y-wyem https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:05:18.733983+00:00 Debian Importer Fixing VCID-hu4f-e8qk-8fbz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:05:00.073714+00:00 Debian Importer Fixing VCID-73mg-3qys-3ubr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:04:55.902354+00:00 Debian Importer Fixing VCID-b4ct-fnbp-43a3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:04:16.854330+00:00 Debian Importer Fixing VCID-z9yn-4b8y-t3er https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:03:55.691352+00:00 Debian Importer Fixing VCID-4s4m-bf1u-tyht https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:03:19.196607+00:00 Debian Importer Fixing VCID-g75p-x4da-efdt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:03:16.624997+00:00 Debian Importer Fixing VCID-31cj-5nhu-4qa9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:02:54.670597+00:00 Debian Importer Fixing VCID-a1rd-xu94-9bad https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:02:48.505401+00:00 Debian Importer Fixing VCID-brwq-qcbd-c3ep https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:02:44.877203+00:00 Debian Importer Fixing VCID-wc4k-86v7-ykh7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:02:20.182783+00:00 Debian Importer Fixing VCID-m8n7-j86u-7ugj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:02:01.841761+00:00 Debian Importer Fixing VCID-7vdf-qwa1-ubeg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:01:22.993666+00:00 Debian Importer Fixing VCID-mtxh-7f6h-t3g4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:01:12.901864+00:00 Debian Importer Fixing VCID-f1r5-rt1y-jkd4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:01:08.759285+00:00 Debian Importer Fixing VCID-4v3t-8s2w-rfbg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:00:56.591454+00:00 Debian Importer Fixing VCID-p4p8-hzzp-ake1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:00:35.702176+00:00 Debian Importer Fixing VCID-yrgr-2c4c-3fgq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:00:19.759413+00:00 Debian Importer Fixing VCID-ey68-cc97-duhz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:00:17.752573+00:00 Debian Importer Fixing VCID-348f-73cd-37h6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:00:16.775323+00:00 Debian Importer Fixing VCID-wkqf-ex7a-73ft https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:00:13.474854+00:00 Debian Importer Fixing VCID-ncy9-6whk-ckep https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:00:10.438627+00:00 Debian Importer Fixing VCID-vfxs-5p9x-5kcx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:59:40.142236+00:00 Debian Importer Fixing VCID-qmuk-1txu-z3da https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:59:24.621779+00:00 Debian Importer Fixing VCID-akq2-c6hp-tfda https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:59:22.153023+00:00 Debian Importer Fixing VCID-nsa2-qgf5-xffq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:58:58.330770+00:00 Debian Importer Fixing VCID-qsdm-cyzs-aufy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:58:40.649970+00:00 Debian Importer Fixing VCID-mmsk-j6bt-wuh1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:58:39.696058+00:00 Debian Importer Fixing VCID-ds3w-wph8-7kam https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:58:37.460628+00:00 Debian Importer Fixing VCID-vmvf-81ex-yug4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:58:35.294470+00:00 Debian Importer Fixing VCID-tnur-avf1-sybe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:58:23.738543+00:00 Debian Importer Fixing VCID-7b27-phbd-fqbq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:58:04.079487+00:00 Debian Importer Fixing VCID-aawx-4bwq-5ubw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:57:56.126348+00:00 Debian Importer Fixing VCID-7fke-ahd3-e7ac https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:57:50.751176+00:00 Debian Importer Fixing VCID-hnt8-m1yy-3fec https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:57:32.246097+00:00 Debian Importer Fixing VCID-j9s4-1dar-7qdb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:57:18.920847+00:00 Debian Importer Fixing VCID-61t7-s6qz-mfcf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:56:38.485549+00:00 Debian Importer Fixing VCID-5kq4-sz23-ekey https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:56:23.482846+00:00 Debian Importer Fixing VCID-kns4-65da-v3bc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:55:18.604049+00:00 Debian Importer Fixing VCID-zh6a-z135-ayeg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:55:12.345095+00:00 Debian Importer Fixing VCID-w4u7-5ke3-57a7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:55:01.300970+00:00 Debian Importer Fixing VCID-gqbd-ybcp-jybq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:52.692480+00:00 Debian Importer Fixing VCID-jset-t9qq-xfah https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:40.642829+00:00 Debian Importer Fixing VCID-e4jw-y3k8-r7ec https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:33.384364+00:00 Debian Importer Fixing VCID-madz-x835-s7cy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:21.614229+00:00 Debian Importer Fixing VCID-6c3x-q991-5uh7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:15.602575+00:00 Debian Importer Fixing VCID-a1ez-xh2w-7ba6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:09.942179+00:00 Debian Importer Fixing VCID-j87e-taah-ubbv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:04.366959+00:00 Debian Importer Fixing VCID-wd2z-jnpt-3bd3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:51.947235+00:00 Debian Importer Fixing VCID-c86j-dzs8-nuem https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:45.494840+00:00 Debian Importer Fixing VCID-m7cd-jefr-4ydy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:40.841986+00:00 Debian Importer Fixing VCID-c2me-ar1y-y7dw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:38.598913+00:00 Debian Importer Fixing VCID-kpkx-qwue-bff4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:36.820192+00:00 Debian Importer Fixing VCID-p1cz-e94f-57c2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:30.536445+00:00 Debian Importer Fixing VCID-pd3f-rmqx-cya3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:25.900259+00:00 Debian Importer Fixing VCID-xf8w-1v5k-nyf7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:20.538382+00:00 Debian Importer Fixing VCID-wk3t-3jvn-quf1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:53:10.091063+00:00 Debian Importer Fixing VCID-szdg-jd74-r7g1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:52:54.634003+00:00 Debian Importer Fixing VCID-upcd-ngpy-ekeu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:52.060120+00:00 Debian Importer Fixing VCID-mzw8-vbmv-6yay https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:48.525793+00:00 Debian Importer Fixing VCID-7gw9-7kbs-2uh2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:42.634953+00:00 Debian Importer Fixing VCID-umyr-w4sv-gkgd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:25.396935+00:00 Debian Importer Fixing VCID-bq5a-jeg3-9ua7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:19.782609+00:00 Debian Importer Fixing VCID-h5ks-h7t7-rqcz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:18.603025+00:00 Debian Importer Fixing VCID-vrz9-k2a3-4uep https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:04.074420+00:00 Debian Importer Fixing VCID-98y4-8sve-mfbz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:51:00.469810+00:00 Debian Importer Fixing VCID-vmts-4etq-hqh7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:50:47.545901+00:00 Debian Importer Fixing VCID-f2ce-pung-aqgw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:50:41.318814+00:00 Debian Importer Fixing VCID-3pv5-s5r1-vkdg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:50:40.104638+00:00 Debian Importer Fixing VCID-yj28-va7b-3ug8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:50:34.067702+00:00 Debian Importer Fixing VCID-5nsy-fndc-7ka8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:50:25.413005+00:00 Debian Importer Fixing VCID-wstb-4k78-gufv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:49:49.602432+00:00 Debian Importer Fixing VCID-fsjs-fmwz-x3bd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:49:30.910430+00:00 Debian Importer Fixing VCID-724j-jc6b-5uba https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:49:03.706525+00:00 Debian Importer Fixing VCID-a8u6-m3s1-5fdx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:59.610184+00:00 Debian Importer Fixing VCID-hxj2-cvvc-tqec https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:57.020004+00:00 Debian Importer Fixing VCID-mgjc-55mm-kffq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:54.785572+00:00 Debian Importer Fixing VCID-buyh-2d37-rqb1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:54.045896+00:00 Debian Importer Fixing VCID-k9e5-ykzu-qyew https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:23.194283+00:00 Debian Importer Fixing VCID-82py-ut98-qfb3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:19.872232+00:00 Debian Importer Fixing VCID-6r1j-pnmx-mkdm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:17.145540+00:00 Debian Importer Fixing VCID-vt3e-tx5j-b7aq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:48:10.376343+00:00 Debian Importer Fixing VCID-5yp2-meun-zbas https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:47:32.107814+00:00 Debian Importer Fixing VCID-2198-cz4u-87hu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:47:19.495338+00:00 Debian Importer Fixing VCID-7hpf-k162-1ubu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:47:09.227518+00:00 Debian Importer Fixing VCID-rrxa-r3j8-ubh3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:56.768987+00:00 Debian Importer Fixing VCID-etb2-844u-jfdu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:48.297254+00:00 Debian Importer Fixing VCID-y7wh-qssq-cbg1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:47.431365+00:00 Debian Importer Fixing VCID-dwes-ct77-juc8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:42.159347+00:00 Debian Importer Fixing VCID-ecc5-64vs-ekgr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:40.193292+00:00 Debian Importer Fixing VCID-nw3c-5apn-zfhv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:37.096233+00:00 Debian Importer Fixing VCID-emnd-q69n-a3fe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:24.442981+00:00 Debian Importer Fixing VCID-ma9f-puuw-bfge https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:23.526896+00:00 Debian Importer Fixing VCID-p4nk-v455-puaf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:46:09.586187+00:00 Debian Importer Fixing VCID-21jy-g45u-c7gp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:45:58.202607+00:00 Debian Importer Fixing VCID-h8sj-qvv2-rydf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:45:32.743779+00:00 Debian Importer Fixing VCID-dyun-rd3c-rke6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:45:14.311455+00:00 Debian Importer Fixing VCID-tafy-p8yj-ukdv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:45:07.687894+00:00 Debian Importer Fixing VCID-7892-zv3s-xqhu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:44:58.948917+00:00 Debian Importer Fixing VCID-n5aj-87mh-hbbd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:44:34.423556+00:00 Debian Importer Fixing VCID-7v4n-4x85-dygx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:44:28.768015+00:00 Debian Importer Fixing VCID-8ud8-f75a-jyew https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:44:27.680712+00:00 Debian Importer Fixing VCID-3r34-452w-skc2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:44:20.241459+00:00 Debian Importer Fixing VCID-ubuz-ts2u-ufem https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:44:17.969542+00:00 Debian Importer Fixing VCID-susc-ysbn-eqbn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:44:15.338711+00:00 Debian Importer Fixing VCID-kj4q-41ch-2bdx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:43:53.717575+00:00 Debian Importer Fixing VCID-cs7h-d7vk-73ab https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:43:34.846909+00:00 Debian Importer Fixing VCID-fvam-jks7-jkbt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:43:32.090095+00:00 Debian Importer Fixing VCID-kkmc-f6mq-xkfv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:43:13.390909+00:00 Debian Importer Fixing VCID-ntqj-fmmb-b3g8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:43:04.929156+00:00 Debian Importer Fixing VCID-1hvg-tmga-nfhm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:42:36.866374+00:00 Debian Importer Fixing VCID-3p2d-np1n-p3gv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:42:34.938358+00:00 Debian Importer Fixing VCID-1fca-q7wb-u3cx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:42:19.651177+00:00 Debian Importer Fixing VCID-gcqh-ytsa-f7g1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:42:08.634712+00:00 Debian Importer Fixing VCID-z4xx-msk4-k7bz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:42:00.162550+00:00 Debian Importer Fixing VCID-mkjm-756w-5ygt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:41:50.445438+00:00 Debian Importer Fixing VCID-eyg8-qhra-ukcj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:41:22.872021+00:00 Debian Importer Fixing VCID-y439-52f2-rfck https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:41:12.001072+00:00 Debian Importer Fixing VCID-4kbk-38g4-6kb7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:40:49.448557+00:00 Debian Importer Fixing VCID-ktsr-nq3s-33gt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:40:34.507578+00:00 Debian Importer Fixing VCID-g9zj-fsa9-vkca https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:53.504667+00:00 Debian Importer Fixing VCID-e965-zevp-rqgd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:50.912228+00:00 Debian Importer Fixing VCID-tc63-4q6e-nker https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:38.490036+00:00 Debian Importer Fixing VCID-6ejs-59g2-xkgg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:33.277064+00:00 Debian Importer Fixing VCID-kx5p-87fs-9kgw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:30.770811+00:00 Debian Importer Fixing VCID-cqrs-uu2s-affj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:29.644903+00:00 Debian Importer Fixing VCID-21fx-6crx-ske2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:25.004333+00:00 Debian Importer Fixing VCID-gr5s-rjhv-3kdw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:39:08.563196+00:00 Debian Importer Fixing VCID-98mp-5h68-73eg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:38:54.665678+00:00 Debian Importer Fixing VCID-vzkt-5648-ukh7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:38:50.585180+00:00 Debian Importer Fixing VCID-an5c-5rea-u3aq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:38:42.759635+00:00 Debian Importer Fixing VCID-bcd9-e6dd-r3cf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:38:21.121102+00:00 Debian Importer Fixing VCID-p1cj-v8rw-rqf4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:38:06.622148+00:00 Debian Importer Fixing VCID-z423-786s-hyd2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:37:13.328539+00:00 Debian Importer Fixing VCID-cwnm-um2n-17cw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:37:11.433800+00:00 Debian Importer Fixing VCID-vdnv-8h83-7kfs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:36:34.310360+00:00 Debian Importer Fixing VCID-z6xa-pf4r-4kbm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:36:14.182908+00:00 Debian Importer Fixing VCID-2xhv-1gcg-y3cs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:53.410134+00:00 Debian Importer Fixing VCID-gvya-5wgk-j3cv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:52.412304+00:00 Debian Importer Fixing VCID-4t4h-a2xy-h7bg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:48.040615+00:00 Debian Importer Fixing VCID-3fpy-fq8u-r3gb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:46.955482+00:00 Debian Importer Fixing VCID-xbra-jtwd-6bhf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:44.016076+00:00 Debian Importer Fixing VCID-xc83-2865-7bgz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:42.849750+00:00 Debian Importer Fixing VCID-x6kd-y436-nbaw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:28.239034+00:00 Debian Importer Fixing VCID-kn32-aqhq-k7c5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:22.294126+00:00 Debian Importer Fixing VCID-nfg3-jgk3-z7bk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:20.182612+00:00 Debian Importer Fixing VCID-t5z7-w31u-j7gs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:35:07.047656+00:00 Debian Importer Fixing VCID-37t1-1qg2-hqc4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:34:54.631994+00:00 Debian Importer Fixing VCID-vtwb-e5mq-6bgq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:34:01.434128+00:00 Debian Importer Fixing VCID-x1m4-hf24-27hq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:33:53.607701+00:00 Debian Importer Fixing VCID-k27q-9kcv-3fgh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:33:49.450733+00:00 Debian Importer Fixing VCID-nrff-k45r-y7bj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:33:10.582701+00:00 Debian Importer Fixing VCID-hmmv-61tn-nkc2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:32:56.460434+00:00 Debian Importer Fixing VCID-3yg6-7zfv-gkaq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:32:41.644142+00:00 Debian Importer Fixing VCID-87gw-ezjs-cqcs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:32:04.629251+00:00 Debian Importer Fixing VCID-hh8s-8fc8-pkgq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:31:58.795339+00:00 Debian Importer Fixing VCID-wwax-w4gg-cuhy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:31:44.200889+00:00 Debian Importer Fixing VCID-ewj3-dyq9-r7f2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:31:38.600946+00:00 Debian Importer Fixing VCID-jgke-4yqg-s7g7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:31:18.223349+00:00 Debian Importer Fixing VCID-dktw-mrn7-kbh4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:31:13.800287+00:00 Debian Importer Fixing VCID-ub6v-8wt6-5fbg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:31:08.734793+00:00 Debian Importer Fixing VCID-gkhm-29a6-7uc6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:57.172700+00:00 Debian Importer Fixing VCID-fmjc-a468-fffw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:41.874708+00:00 Debian Importer Fixing VCID-gmun-zz47-suap https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:35.068616+00:00 Debian Importer Fixing VCID-awuq-scq3-fuev https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:25.015592+00:00 Debian Importer Fixing VCID-q3hg-ug68-cffr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:12.753969+00:00 Debian Importer Fixing VCID-25at-2je8-2ufj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:09.533810+00:00 Debian Importer Fixing VCID-366p-rhcz-8kb6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:06.413378+00:00 Debian Importer Fixing VCID-gtjv-ut7g-hqhv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:30:05.583906+00:00 Debian Importer Fixing VCID-e42z-ac66-gye3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:29:41.228232+00:00 Debian Importer Fixing VCID-gtzq-1g5y-tkh5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:29:33.190661+00:00 Debian Importer Fixing VCID-dx7t-sub8-zffq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:29:04.052522+00:00 Debian Importer Fixing VCID-vsyg-x46t-ayhz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:29:00.099797+00:00 Debian Importer Fixing VCID-z24p-wtzg-a3gh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:28:58.090287+00:00 Debian Importer Fixing VCID-nv5d-ux4k-gbck https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:28:52.616299+00:00 Debian Importer Fixing VCID-tusw-jz3p-y3d5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:28:36.369298+00:00 Debian Importer Fixing VCID-gkap-5jhj-tbff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:28:34.098610+00:00 Debian Importer Fixing VCID-asy4-m48b-xydu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:28:28.408670+00:00 Debian Importer Fixing VCID-qyxy-uh9d-fqhr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:28:14.293275+00:00 Debian Importer Fixing VCID-mg8e-fpwg-rbg2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:28:00.881597+00:00 Debian Importer Fixing VCID-4qwu-fw8y-t7et https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:54.375588+00:00 Debian Importer Fixing VCID-w53c-hafw-6kbb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:50.679256+00:00 Debian Importer Fixing VCID-d1gu-5q4s-p7eq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:40.457539+00:00 Debian Importer Fixing VCID-3mhu-519z-pbck https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:38.491268+00:00 Debian Importer Fixing VCID-1x2r-t2gj-akgf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:36.128840+00:00 Debian Importer Fixing VCID-jhe1-2e3s-nkht https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:22.963455+00:00 Debian Importer Fixing VCID-93fb-qqv8-wyeb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:21.121979+00:00 Debian Importer Fixing VCID-m5bk-s7pe-cbd8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:10.506415+00:00 Debian Importer Fixing VCID-puhc-5h95-13ff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:27:05.682866+00:00 Debian Importer Fixing VCID-pg2a-j1hc-83hr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:26:59.009380+00:00 Debian Importer Fixing VCID-rsz5-e5fc-syh2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:26:25.101955+00:00 Debian Importer Fixing VCID-5eks-kg2z-5ye1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:26:03.345851+00:00 Debian Importer Fixing VCID-tt18-fh9r-57c9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:25:56.907911+00:00 Debian Importer Fixing VCID-rayk-m71k-pkd5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:25:48.728620+00:00 Debian Importer Fixing VCID-ubtn-8mb7-huef https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:25:35.704218+00:00 Debian Importer Fixing VCID-xxe5-3ae2-vygt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:25:31.234577+00:00 Debian Importer Fixing VCID-f5xt-m6qt-43ep https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:25:22.240014+00:00 Debian Importer Fixing VCID-tsp7-ggzj-gud7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:25:13.936766+00:00 Debian Importer Fixing VCID-yve9-y9ec-cycs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:25:10.447521+00:00 Debian Importer Fixing VCID-kv4f-h7zy-2yhd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:58.842190+00:00 Debian Importer Fixing VCID-st59-ndz1-1yc5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:25.073292+00:00 Debian Importer Fixing VCID-a1xg-dyn3-skb6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:19.884700+00:00 Debian Importer Fixing VCID-a3d8-8qvy-ykdr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:19.176917+00:00 Debian Importer Fixing VCID-pbby-yjrv-23hc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:17.202274+00:00 Debian Importer Fixing VCID-34nt-cv4x-qbg4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:14.745573+00:00 Debian Importer Fixing VCID-9tbh-mrhu-v3am https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:00.795441+00:00 Debian Importer Fixing VCID-nwn5-d5f1-rkbr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:46.348637+00:00 Debian Importer Fixing VCID-g162-81ms-93g7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:42.183034+00:00 Debian Importer Fixing VCID-6n32-z9u6-gfch https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:38.549230+00:00 Debian Importer Fixing VCID-s9mp-wsn8-cycf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:36.320506+00:00 Debian Importer Fixing VCID-rffh-vskt-b7ga https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:31.851154+00:00 Debian Importer Fixing VCID-qxd4-7ack-dkaf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:26.313799+00:00 Debian Importer Fixing VCID-214g-9hfm-wqbk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:22.001972+00:00 Debian Importer Fixing VCID-5g2a-qj5r-uub4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:08.687671+00:00 Debian Importer Fixing VCID-ttde-y49k-eqdw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:07.750361+00:00 Debian Importer Fixing VCID-jfhv-6svu-x3f6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:23:04.891560+00:00 Debian Importer Fixing VCID-t644-dxrr-2qhp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:22:59.984412+00:00 Debian Importer Fixing VCID-k3bt-ws28-e3ex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:22:19.588156+00:00 Debian Importer Fixing VCID-vqmu-xn3y-e3gc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:22:17.794581+00:00 Debian Importer Fixing VCID-nsbf-fkcw-cbed https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:22:04.590441+00:00 Debian Importer Fixing VCID-n8y5-74xq-f7ft https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:21:58.588793+00:00 Debian Importer Fixing VCID-pk74-dafk-e3gj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:21:54.455504+00:00 Debian Importer Fixing VCID-qk2m-qzes-qfhu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:21:45.053618+00:00 Debian Importer Fixing VCID-q5ky-7fqu-efcs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:21:31.625062+00:00 Debian Importer Fixing VCID-hpqq-mr4h-gbcj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:21:15.084476+00:00 Debian Importer Fixing VCID-2nz8-mxwk-dyfk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:21:03.974492+00:00 Debian Importer Fixing VCID-j9tf-d5qg-6fgq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:56.818888+00:00 Debian Importer Fixing VCID-e57d-cw7e-73an https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:53.502298+00:00 Debian Importer Fixing VCID-p2ng-3bek-d3b6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:46.451668+00:00 Debian Importer Fixing VCID-p4by-fm53-yybk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:42.800574+00:00 Debian Importer Fixing VCID-1n41-qg8u-r7d5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:39.076727+00:00 Debian Importer Fixing VCID-a51v-ajen-u7et https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:37.094902+00:00 Debian Importer Fixing VCID-dav4-474s-33hg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:25.523796+00:00 Debian Importer Fixing VCID-y5ds-5mpf-u3hz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:20:16.175902+00:00 Debian Importer Fixing VCID-k48g-n4ka-fugh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:19:59.129899+00:00 Debian Importer Fixing VCID-nfcw-pgwv-37dr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:19:54.372271+00:00 Debian Importer Fixing VCID-v1ka-ynm7-q3cw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:19:51.243924+00:00 Debian Importer Fixing VCID-3aa5-4rp5-g7h3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:19:27.678525+00:00 Debian Importer Fixing VCID-f892-ybkq-kbd7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:19:14.386508+00:00 Debian Importer Fixing VCID-bnbm-zhck-yfex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:19:03.870528+00:00 Debian Importer Fixing VCID-mwv3-k49q-tfeu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:18:52.635979+00:00 Debian Importer Fixing VCID-fvvb-p7r7-zkbk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:18:49.490279+00:00 Debian Importer Fixing VCID-8edx-kmgw-jue5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:18:33.542723+00:00 Debian Importer Fixing VCID-b2kt-hmz5-yuhb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:18:21.877001+00:00 Debian Importer Fixing VCID-x5jd-ruv2-1qac https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:18:07.699295+00:00 Debian Importer Fixing VCID-ppgp-v6th-y3ar https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:52.265397+00:00 Debian Importer Fixing VCID-c49r-knse-6bc5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:48.343732+00:00 Debian Importer Fixing VCID-beg3-c4a1-cfay https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:41.249303+00:00 Debian Importer Fixing VCID-jupy-x3sh-vqcp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:39.653168+00:00 Debian Importer Fixing VCID-cjnk-7asz-zuhp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:31.356362+00:00 Debian Importer Fixing VCID-v893-rr8x-nyay https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:29.482786+00:00 Debian Importer Fixing VCID-v4ds-msgy-m3bv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:27.815799+00:00 Debian Importer Fixing VCID-7ey4-wrhk-zfce https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:24.051898+00:00 Debian Importer Fixing VCID-dcd5-4y9y-euf5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:21.462302+00:00 Debian Importer Fixing VCID-6cqc-um2d-1kfk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:18.889441+00:00 Debian Importer Fixing VCID-rzvj-774t-cqf8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:14.485965+00:00 Debian Importer Fixing VCID-e7ae-83vq-auf1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:11.686288+00:00 Debian Importer Fixing VCID-v8xr-k446-8uar https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:10.930073+00:00 Debian Importer Fixing VCID-6vtw-v3u5-buce https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:16:51.710425+00:00 Debian Importer Fixing VCID-e6th-hujj-6bby https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:16:46.698570+00:00 Debian Importer Fixing VCID-yr2z-pe4g-8yhu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:16:44.917467+00:00 Debian Importer Fixing VCID-k1eg-sz6t-skg8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:16:30.793293+00:00 Debian Importer Fixing VCID-vwnc-y4ve-nkhv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:15:58.408799+00:00 Debian Importer Fixing VCID-vm3p-zgmr-13gw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:15:30.920414+00:00 Debian Importer Fixing VCID-rudf-s931-1qct https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:15:23.817518+00:00 Debian Importer Fixing VCID-9hnv-7gae-2kc8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:15:13.197941+00:00 Debian Importer Fixing VCID-ub6v-vb3r-83eh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:15:09.352810+00:00 Debian Importer Fixing VCID-tpyv-xst5-vyd6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:15:07.073000+00:00 Debian Importer Fixing VCID-2cux-cw1j-43hw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:49.870183+00:00 Debian Importer Fixing VCID-n4p8-dgkk-3bfr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:46.800185+00:00 Debian Importer Fixing VCID-1yba-pq6x-qkh3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:44.327710+00:00 Debian Importer Fixing VCID-71m1-rn5c-k3hm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:41.709377+00:00 Debian Importer Fixing VCID-qg8t-cx91-c7e3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:26.979708+00:00 Debian Importer Fixing VCID-d8tr-usd8-6yca https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:24.314990+00:00 Debian Importer Fixing VCID-ex4p-ftap-h7fe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:16.466003+00:00 Debian Importer Fixing VCID-wcu7-me4d-bugc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:14:11.417454+00:00 Debian Importer Fixing VCID-z711-tvkz-9qa4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:58.571032+00:00 Debian Importer Fixing VCID-np3t-m158-k7he https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:52.629199+00:00 Debian Importer Fixing VCID-4n9m-77qv-fuaa https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:43.766859+00:00 Debian Importer Fixing VCID-gr5a-eqvx-n3ha https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:39.899602+00:00 Debian Importer Fixing VCID-ng2z-3hcf-9uh8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:35.227684+00:00 Debian Importer Fixing VCID-uh94-5nuu-w7fd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:31.190624+00:00 Debian Importer Fixing VCID-898p-crnv-w7cb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:23.019620+00:00 Debian Importer Fixing VCID-a5tz-dm6g-zqch https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:16.596999+00:00 Debian Importer Fixing VCID-kn25-f6gk-93fd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:06.986037+00:00 Debian Importer Fixing VCID-c9h3-3nm5-jqcq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:13:02.915965+00:00 Debian Importer Fixing VCID-ka7q-cx4u-rkar https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:12:58.344946+00:00 Debian Importer Fixing VCID-76zh-5x51-kffx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:12:57.423746+00:00 Debian Importer Fixing VCID-3eb4-ca4c-5qf7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:12:51.030047+00:00 Debian Importer Fixing VCID-qweq-8dcb-x7eb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:12:45.697777+00:00 Debian Importer Fixing VCID-k1v3-945q-47eh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:12:31.179936+00:00 Debian Importer Fixing VCID-1n5v-auw6-wbcd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:12:02.935215+00:00 Debian Importer Fixing VCID-kg8v-183b-33ce https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:47.453178+00:00 Debian Importer Fixing VCID-w71f-nskm-nyau https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:45.619049+00:00 Debian Importer Fixing VCID-v2rb-s1g7-1ub4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:43.990477+00:00 Debian Importer Fixing VCID-1m9j-m8xz-zqav https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:38.908163+00:00 Debian Importer Fixing VCID-n7w6-5y7w-gbcd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:34.883682+00:00 Debian Importer Fixing VCID-2fsz-wcjz-9yer https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:24.770536+00:00 Debian Importer Fixing VCID-xyds-k35a-2yf2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:18.108321+00:00 Debian Importer Fixing VCID-gn82-9qs1-37hs https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:11.874132+00:00 Debian Importer Fixing VCID-hv12-tgt6-rub5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:08.806342+00:00 Debian Importer Fixing VCID-c8t3-zakp-jqe2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:11:03.421890+00:00 Debian Importer Fixing VCID-9qfp-tkn1-uqa8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:10:58.080672+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:10:26.215110+00:00 Debian Importer Fixing VCID-93ay-73z5-h7er https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:10:21.239827+00:00 Debian Importer Fixing VCID-enyv-k9c5-bfe4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:10:20.447426+00:00 Debian Importer Fixing VCID-ubyx-g9qc-x7dk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:09:55.807751+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:09:09.976020+00:00 Debian Importer Fixing VCID-rup3-z1qu-j3hr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:09:05.670180+00:00 Debian Importer Fixing VCID-z767-vnpz-37g8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:08:52.583786+00:00 Debian Importer Fixing VCID-1n7k-a7ve-8qcr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:08:36.756945+00:00 Debian Importer Fixing VCID-4g8h-bz4a-uydk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:08:13.168333+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:08:12.071440+00:00 Debian Importer Fixing VCID-5wr6-yach-7fbf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:07:33.706277+00:00 Debian Importer Fixing VCID-chgp-ama8-5ycb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:07:29.501716+00:00 Debian Importer Fixing VCID-rjuh-7kkv-3qch https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:07:05.494809+00:00 Debian Importer Fixing VCID-ah9v-pkq9-uqek https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:07:01.308862+00:00 Debian Importer Fixing VCID-rbua-nn9a-kfb9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:06:59.982657+00:00 Debian Importer Fixing VCID-fe76-s8g9-zuar https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:06:48.512621+00:00 Debian Importer Fixing VCID-ba6k-mvxj-8udm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:06:43.698288+00:00 Debian Importer Fixing VCID-dfj9-5xtt-qba4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:06:42.958380+00:00 Debian Importer Fixing VCID-ns6g-c2p2-myf5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:06:29.810079+00:00 Debian Importer Fixing VCID-tgch-ns3e-qkhc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:06:14.666753+00:00 Debian Importer Fixing VCID-zx9u-zu1f-gbf2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:05:58.314721+00:00 Debian Importer Fixing VCID-mm1u-nfnt-nkaf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:05:46.975043+00:00 Debian Importer Fixing VCID-zrf8-efng-gfd9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:05:28.407818+00:00 Debian Importer Fixing VCID-qjup-fvr1-xybc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:05:16.463604+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:05:15.142433+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:05:10.547339+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:04:48.057323+00:00 Debian Importer Fixing VCID-j1um-9nym-muh4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:04:30.185453+00:00 Debian Importer Fixing VCID-jmqw-ffjj-fqb7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:04:08.591129+00:00 Debian Importer Fixing VCID-x226-2yqa-uuhv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:03:59.876742+00:00 Debian Importer Fixing VCID-bq18-jcph-kkhh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:03:48.473078+00:00 Debian Importer Fixing VCID-4wyy-uw7z-5be9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:03:34.333258+00:00 Debian Importer Fixing VCID-edhy-ptjn-1kbx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:03:32.094032+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:03:23.063548+00:00 Debian Importer Fixing VCID-d2xf-68nr-rqe2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:03:08.884978+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:56.005581+00:00 Debian Importer Fixing VCID-f968-vrzv-8ke5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:48.108535+00:00 Debian Importer Fixing VCID-6r4x-xaaf-b7ft https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:44.913909+00:00 Debian Importer Fixing VCID-bens-aw9k-xka2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:39.483498+00:00 Debian Importer Fixing VCID-cbrz-vaxe-b3dt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:35.036771+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:30.947138+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:21.096202+00:00 Debian Importer Fixing VCID-g2gb-t5zm-1qb1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:02:02.914011+00:00 Debian Importer Fixing VCID-rwfc-mzfg-akft https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:44.096595+00:00 Debian Importer Fixing VCID-ahvx-mjgn-5fa8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:39.756721+00:00 Debian Importer Fixing VCID-n2t8-afcr-sffj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:38.608940+00:00 Debian Importer Fixing VCID-ex9p-euhg-aybf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:30.456229+00:00 Debian Importer Fixing VCID-qdxg-kymb-mqdb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:19.662423+00:00 Debian Importer Fixing VCID-rdch-b3ck-qugc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:11.233756+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:07.729356+00:00 Debian Importer Fixing VCID-651u-f45c-57de https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:01:06.896070+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:56.816655+00:00 Debian Importer Fixing VCID-9fn1-ytny-vke1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:51.488580+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:43.949694+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:42.587414+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:37.158169+00:00 Debian Importer Fixing VCID-7ejt-hdra-93ez https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:33.212298+00:00 Debian Importer Fixing VCID-udny-3t6r-fyhn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:30.884201+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:18.709160+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:16.775522+00:00 Debian Importer Fixing VCID-2s7e-4bym-cbe1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:00:10.769001+00:00 Debian Importer Fixing VCID-gm3e-d4pv-53aq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:57.210181+00:00 Debian Importer Fixing VCID-tsfh-mjd5-cuch https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:53.202009+00:00 Debian Importer Fixing VCID-wax6-n8k7-9fab https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:52.060331+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:48.497073+00:00 Debian Importer Fixing VCID-dgr2-7fpq-4bgv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:34.989865+00:00 Debian Importer Fixing VCID-9sqm-1ubb-zqhr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:27.625158+00:00 Debian Importer Fixing VCID-sk93-hxg5-yffv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:25.127997+00:00 Debian Importer Fixing VCID-ug5j-gaab-kuag https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:13.544503+00:00 Debian Importer Fixing VCID-dtzb-vs94-3ygt https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:59:05.255214+00:00 Debian Importer Fixing VCID-798e-hc82-7qcv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:56.203308+00:00 Debian Importer Fixing VCID-dzye-v1vd-gybq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:55.483582+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:46.697247+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:43.377893+00:00 Debian Importer Fixing VCID-93jq-59ak-xygv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:40.649808+00:00 Debian Importer Fixing VCID-x9a9-thjn-yya5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:35.641327+00:00 Debian Importer Fixing VCID-a8cp-9ykt-xbdx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:28.780993+00:00 Debian Importer Fixing VCID-k29n-spa9-uqdz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:23.995216+00:00 Debian Importer Fixing VCID-cvw6-a674-zfa9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:20.453995+00:00 Debian Importer Fixing VCID-qzb2-2zd9-5kf4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:07.654644+00:00 Debian Importer Fixing VCID-2e99-ge3p-13eq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:04.193786+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:58:01.624690+00:00 Debian Importer Fixing VCID-5gz4-1ysh-2qf7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:57:54.078844+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:57:50.420394+00:00 Debian Importer Fixing VCID-887n-3662-zfba https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:57:40.119067+00:00 Debian Importer Fixing VCID-vaaz-21uq-gbc8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:57:33.759488+00:00 Debian Importer Fixing VCID-3km6-xsxg-4bcr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:57:27.754170+00:00 Debian Importer Fixing VCID-dykz-252m-jkcu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:57:24.302351+00:00 Debian Importer Fixing VCID-zyme-v3xf-3kah https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:57:00.661439+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:59.735505+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:58.974617+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:52.695839+00:00 Debian Importer Fixing VCID-nnnt-9vn7-rfc1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:50.782772+00:00 Debian Importer Fixing VCID-g4qj-az94-83c6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:49.945683+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:38.103625+00:00 Debian Importer Fixing VCID-vysr-bztb-yugx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:24.046779+00:00 Debian Importer Fixing VCID-uzsb-9yx8-kua1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:21.543785+00:00 Debian Importer Fixing VCID-45qm-naju-pycn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:10.578752+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:09.872642+00:00 Debian Importer Fixing VCID-vwmn-w6tb-sudq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:56:04.337246+00:00 Debian Importer Fixing VCID-cxtx-363a-ufhd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:55:20.475484+00:00 Debian Importer Fixing VCID-bf5y-rqaa-afc9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:58.261923+00:00 Debian Importer Fixing VCID-g82z-3144-u3d2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:57.541105+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:48.982759+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:43.780457+00:00 Debian Importer Fixing VCID-3tns-khmb-aqbn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:35.970498+00:00 Debian Importer Fixing VCID-4nrq-2zch-8uct https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:33.420195+00:00 Debian Importer Fixing VCID-d8ad-6vw9-b7f2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:32.514992+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:20.943070+00:00 Debian Importer Fixing VCID-72pd-9p33-9qhg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:20.159935+00:00 Debian Importer Fixing VCID-kptu-sm1d-kuae https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:54:04.506560+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:58.544687+00:00 Debian Importer Fixing VCID-hfq2-r9mw-p3cp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:57.836469+00:00 Debian Importer Fixing VCID-kdf1-9mq7-2ue6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:46.114387+00:00 Debian Importer Fixing VCID-z18v-yptf-7fhp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:40.947922+00:00 Debian Importer Fixing VCID-e9d9-jb9v-jufv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:38.916974+00:00 Debian Importer Fixing VCID-9dms-q8x2-a3em https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:36.673990+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:27.956314+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:24.096684+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:19.332208+00:00 Debian Importer Fixing VCID-4fhj-v5ut-eubv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:15.226396+00:00 Debian Importer Fixing VCID-fhxv-d8du-rbgk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:53:11.322712+00:00 Debian Importer Fixing VCID-xawd-7qp7-uben https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:52:42.880397+00:00 Debian Importer Fixing VCID-u58e-6ztz-5bcx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:52:41.656209+00:00 Debian Importer Fixing VCID-rw71-ued5-jfg4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:52:39.835281+00:00 Debian Importer Fixing VCID-z4yz-sjm9-3ke4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:52:35.392781+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:52:15.116653+00:00 Debian Importer Fixing VCID-5ehk-s7ww-vfc7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:52:14.437902+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:51:55.475216+00:00 Debian Importer Fixing VCID-b13x-ysdt-jbc9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:51:52.819118+00:00 Debian Importer Fixing VCID-pj46-9jp7-33ha https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:51:37.923408+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:51:25.873676+00:00 Debian Importer Fixing VCID-6pmw-nqja-affb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:51:16.760048+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:51:06.903019+00:00 Debian Importer Fixing VCID-r99q-4cst-dbem https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:51:01.340746+00:00 Debian Importer Fixing VCID-dp4x-6duw-8yeh https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:53.886114+00:00 Debian Importer Fixing VCID-6hf1-vsj3-a3h5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:48.056487+00:00 Debian Importer Fixing VCID-8zy9-cpzf-q3be https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:46.502078+00:00 Debian Importer Fixing VCID-u2dn-mnr7-m3hy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:37.274422+00:00 Debian Importer Fixing VCID-9ns9-s6pf-d7hr https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:35.947123+00:00 Debian Importer Fixing VCID-nhry-edgk-sbd6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:28.090187+00:00 Debian Importer Fixing VCID-d3x6-8uek-qkgn https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:19.759976+00:00 Debian Importer Fixing VCID-fz9m-axm1-4kcb https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:14.899673+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:50:14.050666+00:00 Debian Importer Fixing VCID-t8we-jmxu-k3bf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:57.631278+00:00 Debian Importer Fixing VCID-1rd4-nsvv-6bfy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:55.302787+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:53.726941+00:00 Debian Importer Fixing VCID-8859-uavn-xygj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:52.136042+00:00 Debian Importer Fixing VCID-c2ee-9r7y-9qfw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:45.301987+00:00 Debian Importer Fixing VCID-7r8h-rr9v-7qht https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:43.807706+00:00 Debian Importer Fixing VCID-aywj-7j4w-z3au https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:34.843360+00:00 Debian Importer Fixing VCID-j843-2qbk-tkcz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:32.670696+00:00 Debian Importer Fixing VCID-4mqx-42ea-53c3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:22.891415+00:00 Debian Importer Fixing VCID-a3yj-v3tu-d7ga https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:49:07.952577+00:00 Debian Importer Fixing VCID-yhft-bm7y-jfde https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:46.991281+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:40.532636+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:37.896931+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:36.213767+00:00 Debian Importer Fixing VCID-z3qs-q6ce-aqbc https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:25.709913+00:00 Debian Importer Fixing VCID-d14h-dr7c-c3d9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:24.228607+00:00 Debian Importer Fixing VCID-v41b-jva8-u7at https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:19.160822+00:00 Debian Importer Fixing VCID-7kxd-yjnx-m7f2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:17.555660+00:00 Debian Importer Fixing VCID-6jzb-qp5p-47ex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:12.630311+00:00 Debian Importer Fixing VCID-5hrr-xvrw-ebd9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:08.799131+00:00 Debian Importer Fixing VCID-xd76-s5yw-fyaq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:04.931472+00:00 Debian Importer Fixing VCID-q36y-yr48-k3ex https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:48:02.918954+00:00 Debian Importer Fixing VCID-aze6-wgfm-3ycv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:56.368462+00:00 Debian Importer Fixing VCID-x245-d866-nkff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:47.857990+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:30.056811+00:00 Debian Importer Fixing VCID-kzsr-8hjr-gkf1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:23.706329+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:17.446986+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:13.513755+00:00 Debian Importer Fixing VCID-f2u9-7eeg-e7cg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:04.608557+00:00 Debian Importer Fixing VCID-xxhg-up2k-yyhv https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:47:03.094329+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:51.175459+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:49.087240+00:00 Debian Importer Fixing VCID-5gv4-c26w-gube https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:37.060321+00:00 Debian Importer Fixing VCID-yzsh-2rk2-5yhq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:31.028421+00:00 Debian Importer Fixing VCID-q8p1-em5q-wuhw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:30.325054+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:23.684802+00:00 Debian Importer Fixing VCID-tb3q-ndrt-mkg3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:22.115328+00:00 Debian Importer Fixing VCID-uem4-47we-qua4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:17.668968+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:10.191826+00:00 Debian Importer Fixing VCID-9zgh-r671-7ufw https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:05.564243+00:00 Debian Importer Fixing VCID-yq9b-dpsh-cuhy https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:46:03.116348+00:00 Debian Importer Fixing VCID-rsny-tzcn-nbhu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:59.278176+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:47.267734+00:00 Debian Importer Fixing VCID-868a-udb4-qfbm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:43.507295+00:00 Debian Importer Fixing VCID-m773-z76s-8qad https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:42.180065+00:00 Debian Importer Fixing VCID-j5zr-w83u-q7ds https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:34.225306+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:21.781126+00:00 Debian Importer Fixing VCID-2bay-kzph-yya3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:10.913332+00:00 Debian Importer Fixing VCID-w8r5-decj-vkem https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:05.856436+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:49.575607+00:00 Debian Importer Fixing VCID-gqr9-19jt-qfds https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:48.288208+00:00 Debian Importer Fixing VCID-jvv4-j5x1-dbd6 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:44.210512+00:00 Debian Importer Fixing VCID-r4zk-9j6t-uyhg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:35.758200+00:00 Debian Importer Fixing VCID-ahsf-n2te-bfa2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:32.285305+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:13.026005+00:00 Debian Importer Fixing VCID-kbc5-2ek1-gfbd https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:04.566116+00:00 Debian Importer Fixing VCID-kjn8-9h7n-dfab https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:44:02.724665+00:00 Debian Importer Fixing VCID-vrfu-1kn8-x3be https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:59.158919+00:00 Debian Importer Fixing VCID-c9br-38nh-sfg4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:57.805081+00:00 Debian Importer Fixing VCID-jfrf-qe3s-gbax https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:50.674405+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:43.851875+00:00 Debian Importer Fixing VCID-msbv-kmj8-b7e8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:37.926713+00:00 Debian Importer Fixing VCID-t9de-4jgf-wuc7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:35.984405+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:35.225060+00:00 Debian Importer Fixing VCID-4ghv-w1sg-77hu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:34.388185+00:00 Debian Importer Fixing VCID-a8ja-eegd-yqhk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:26.321340+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:20.482074+00:00 Debian Importer Fixing VCID-hx57-qb6n-bfba https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:14.900402+00:00 Debian Importer Fixing VCID-q2nc-hdcj-gfdm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:12.496465+00:00 Debian Importer Fixing VCID-hbnp-yx9t-bbfj https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:09.454445+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:43:03.704213+00:00 Debian Importer Fixing VCID-y13n-jhsr-ryd2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:42:58.564736+00:00 Debian Importer Fixing VCID-p47c-bn8d-6ka7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:42:51.397160+00:00 Debian Importer Fixing VCID-vzyy-16xe-qkgm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:42:44.031494+00:00 Debian Importer Fixing VCID-stma-rnkr-c3ef https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:42:25.148685+00:00 Debian Importer Fixing VCID-fvhu-1xqw-fkbk https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:42:17.669728+00:00 Debian Importer Fixing VCID-y5bm-2fr5-8bbp https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-04-29T12:56:12.000105+00:00 Debian Importer Fixing VCID-xyds-k35a-2yf2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:56:06.897441+00:00 Debian Importer Fixing VCID-gn82-9qs1-37hs https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:56:01.672486+00:00 Debian Importer Fixing VCID-hv12-tgt6-rub5 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:55:58.816054+00:00 Debian Importer Fixing VCID-c8t3-zakp-jqe2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:55:53.812809+00:00 Debian Importer Fixing VCID-9qfp-tkn1-uqa8 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:55:49.915633+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:55:25.823594+00:00 Debian Importer Fixing VCID-93ay-73z5-h7er https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:55:22.097921+00:00 Debian Importer Fixing VCID-enyv-k9c5-bfe4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:55:21.313527+00:00 Debian Importer Fixing VCID-ubyx-g9qc-x7dk https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:55:03.555159+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:54:30.113210+00:00 Debian Importer Fixing VCID-rup3-z1qu-j3hr https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:54:26.694956+00:00 Debian Importer Fixing VCID-z767-vnpz-37g8 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:54:16.423536+00:00 Debian Importer Fixing VCID-1n7k-a7ve-8qcr https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:54:03.930028+00:00 Debian Importer Fixing VCID-4g8h-bz4a-uydk https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:53:48.455693+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:53:47.593170+00:00 Debian Importer Fixing VCID-5wr6-yach-7fbf https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:53:20.746911+00:00 Debian Importer Fixing VCID-chgp-ama8-5ycb https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:53:17.682712+00:00 Debian Importer Fixing VCID-rjuh-7kkv-3qch https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:53:01.870819+00:00 Debian Importer Fixing VCID-ah9v-pkq9-uqek https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:59.284315+00:00 Debian Importer Fixing VCID-rbua-nn9a-kfb9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:58.347622+00:00 Debian Importer Fixing VCID-fe76-s8g9-zuar https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:50.506984+00:00 Debian Importer Fixing VCID-ba6k-mvxj-8udm https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:47.759722+00:00 Debian Importer Fixing VCID-dfj9-5xtt-qba4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:47.106721+00:00 Debian Importer Fixing VCID-ns6g-c2p2-myf5 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:37.651587+00:00 Debian Importer Fixing VCID-tgch-ns3e-qkhc https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:27.919141+00:00 Debian Importer Fixing VCID-zx9u-zu1f-gbf2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:15.580343+00:00 Debian Importer Fixing VCID-mm1u-nfnt-nkaf https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:52:07.921575+00:00 Debian Importer Fixing VCID-zrf8-efng-gfd9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:51:55.107918+00:00 Debian Importer Fixing VCID-qjup-fvr1-xybc https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:51:45.673652+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:51:44.618897+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:51:41.214775+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:51:26.671998+00:00 Debian Importer Fixing VCID-j1um-9nym-muh4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:51:14.749114+00:00 Debian Importer Fixing VCID-jmqw-ffjj-fqb7 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:51:00.736321+00:00 Debian Importer Fixing VCID-x226-2yqa-uuhv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:55.247679+00:00 Debian Importer Fixing VCID-bq18-jcph-kkhh https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:48.192929+00:00 Debian Importer Fixing VCID-4wyy-uw7z-5be9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:38.069524+00:00 Debian Importer Fixing VCID-edhy-ptjn-1kbx https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:36.697249+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:30.478006+00:00 Debian Importer Fixing VCID-d2xf-68nr-rqe2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:21.242034+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:11.626046+00:00 Debian Importer Fixing VCID-f968-vrzv-8ke5 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:05.513911+00:00 Debian Importer Fixing VCID-6r4x-xaaf-b7ft https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:03.449485+00:00 Debian Importer Fixing VCID-bens-aw9k-xka2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:50:00.052164+00:00 Debian Importer Fixing VCID-cbrz-vaxe-b3dt https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:56.592988+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:54.091707+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:46.911427+00:00 Debian Importer Fixing VCID-g2gb-t5zm-1qb1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:34.604790+00:00 Debian Importer Fixing VCID-rwfc-mzfg-akft https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:20.899122+00:00 Debian Importer Fixing VCID-ahvx-mjgn-5fa8 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:18.231011+00:00 Debian Importer Fixing VCID-n2t8-afcr-sffj https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:17.410219+00:00 Debian Importer Fixing VCID-ex9p-euhg-aybf https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:12.080313+00:00 Debian Importer Fixing VCID-qdxg-kymb-mqdb https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:49:05.696887+00:00 Debian Importer Fixing VCID-rdch-b3ck-qugc https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:58.584452+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:56.550836+00:00 Debian Importer Fixing VCID-651u-f45c-57de https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:55.764298+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:48.028762+00:00 Debian Importer Fixing VCID-9fn1-ytny-vke1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:44.302041+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:38.753071+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:37.852098+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:33.728710+00:00 Debian Importer Fixing VCID-7ejt-hdra-93ez https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:30.446891+00:00 Debian Importer Fixing VCID-udny-3t6r-fyhn https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:28.709855+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:19.308890+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:17.748072+00:00 Debian Importer Fixing VCID-2s7e-4bym-cbe1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:13.302199+00:00 Debian Importer Fixing VCID-gm3e-d4pv-53aq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:03.919267+00:00 Debian Importer Fixing VCID-tsfh-mjd5-cuch https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:01.013238+00:00 Debian Importer Fixing VCID-wax6-n8k7-9fab https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:48:00.172780+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:57.554077+00:00 Debian Importer Fixing VCID-dgr2-7fpq-4bgv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:47.472272+00:00 Debian Importer Fixing VCID-9sqm-1ubb-zqhr https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:41.869823+00:00 Debian Importer Fixing VCID-sk93-hxg5-yffv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:40.089200+00:00 Debian Importer Fixing VCID-ug5j-gaab-kuag https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:29.970328+00:00 Debian Importer Fixing VCID-dtzb-vs94-3ygt https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:24.315442+00:00 Debian Importer Fixing VCID-798e-hc82-7qcv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:17.809290+00:00 Debian Importer Fixing VCID-dzye-v1vd-gybq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:17.111405+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:10.360315+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:07.766636+00:00 Debian Importer Fixing VCID-93jq-59ak-xygv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:05.485030+00:00 Debian Importer Fixing VCID-x9a9-thjn-yya5 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:47:01.740231+00:00 Debian Importer Fixing VCID-a8cp-9ykt-xbdx https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:57.056474+00:00 Debian Importer Fixing VCID-k29n-spa9-uqdz https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:53.192051+00:00 Debian Importer Fixing VCID-cvw6-a674-zfa9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:50.620258+00:00 Debian Importer Fixing VCID-qzb2-2zd9-5kf4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:41.607492+00:00 Debian Importer Fixing VCID-2e99-ge3p-13eq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:40.005257+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:38.505170+00:00 Debian Importer Fixing VCID-5gz4-1ysh-2qf7 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:32.640215+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:30.009644+00:00 Debian Importer Fixing VCID-887n-3662-zfba https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:22.805549+00:00 Debian Importer Fixing VCID-vaaz-21uq-gbc8 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:19.813623+00:00 Debian Importer Fixing VCID-3km6-xsxg-4bcr https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:14.980666+00:00 Debian Importer Fixing VCID-dykz-252m-jkcu https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:46:12.211544+00:00 Debian Importer Fixing VCID-zyme-v3xf-3kah https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:55.630123+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:54.779393+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:54.059550+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:50.333694+00:00 Debian Importer Fixing VCID-nnnt-9vn7-rfc1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:48.824586+00:00 Debian Importer Fixing VCID-g4qj-az94-83c6 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:48.047294+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:40.102705+00:00 Debian Importer Fixing VCID-vysr-bztb-yugx https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:30.832682+00:00 Debian Importer Fixing VCID-uzsb-9yx8-kua1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:29.401357+00:00 Debian Importer Fixing VCID-45qm-naju-pycn https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:21.984928+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:21.307112+00:00 Debian Importer Fixing VCID-vwmn-w6tb-sudq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:45:17.591383+00:00 Debian Importer Fixing VCID-cxtx-363a-ufhd https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:46.591018+00:00 Debian Importer Fixing VCID-bf5y-rqaa-afc9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:31.655743+00:00 Debian Importer Fixing VCID-g82z-3144-u3d2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:30.978543+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:25.258144+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:21.962231+00:00 Debian Importer Fixing VCID-3tns-khmb-aqbn https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:16.056568+00:00 Debian Importer Fixing VCID-4nrq-2zch-8uct https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:14.230432+00:00 Debian Importer Fixing VCID-d8ad-6vw9-b7f2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:13.443378+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:05.908401+00:00 Debian Importer Fixing VCID-72pd-9p33-9qhg https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:05.198612+00:00 Debian Importer Fixing VCID-kptu-sm1d-kuae https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:53.024525+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:48.439385+00:00 Debian Importer Fixing VCID-hfq2-r9mw-p3cp https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:47.762461+00:00 Debian Importer Fixing VCID-kdf1-9mq7-2ue6 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:38.632575+00:00 Debian Importer Fixing VCID-z18v-yptf-7fhp https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:34.951462+00:00 Debian Importer Fixing VCID-e9d9-jb9v-jufv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:33.280522+00:00 Debian Importer Fixing VCID-9dms-q8x2-a3em https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:31.565920+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:26.032683+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:22.967328+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:19.700113+00:00 Debian Importer Fixing VCID-4fhj-v5ut-eubv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:17.280211+00:00 Debian Importer Fixing VCID-fhxv-d8du-rbgk https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:43:14.155966+00:00 Debian Importer Fixing VCID-xawd-7qp7-uben https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:53.452275+00:00 Debian Importer Fixing VCID-u58e-6ztz-5bcx https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:52.593299+00:00 Debian Importer Fixing VCID-rw71-ued5-jfg4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:51.089291+00:00 Debian Importer Fixing VCID-z4yz-sjm9-3ke4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:48.476596+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:34.005895+00:00 Debian Importer Fixing VCID-5ehk-s7ww-vfc7 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:33.278729+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:19.687981+00:00 Debian Importer Fixing VCID-b13x-ysdt-jbc9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:17.352765+00:00 Debian Importer Fixing VCID-pj46-9jp7-33ha https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:42:06.675623+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:59.923485+00:00 Debian Importer Fixing VCID-6pmw-nqja-affb https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:53.438382+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:47.218405+00:00 Debian Importer Fixing VCID-r99q-4cst-dbem https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:42.922084+00:00 Debian Importer Fixing VCID-dp4x-6duw-8yeh https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:37.532665+00:00 Debian Importer Fixing VCID-6hf1-vsj3-a3h5 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:33.596842+00:00 Debian Importer Fixing VCID-8zy9-cpzf-q3be https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:32.088746+00:00 Debian Importer Fixing VCID-u2dn-mnr7-m3hy https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:24.629132+00:00 Debian Importer Fixing VCID-9ns9-s6pf-d7hr https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:23.706607+00:00 Debian Importer Fixing VCID-nhry-edgk-sbd6 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:17.755089+00:00 Debian Importer Fixing VCID-d3x6-8uek-qkgn https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:10.929451+00:00 Debian Importer Fixing VCID-fz9m-axm1-4kcb https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:07.078069+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:41:06.312554+00:00 Debian Importer Fixing VCID-t8we-jmxu-k3bf https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:55.094725+00:00 Debian Importer Fixing VCID-1rd4-nsvv-6bfy https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:53.661352+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:52.642650+00:00 Debian Importer Fixing VCID-8859-uavn-xygj https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:51.677410+00:00 Debian Importer Fixing VCID-c2ee-9r7y-9qfw https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:46.202959+00:00 Debian Importer Fixing VCID-7r8h-rr9v-7qht https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:44.839547+00:00 Debian Importer Fixing VCID-aywj-7j4w-z3au https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:38.810897+00:00 Debian Importer Fixing VCID-j843-2qbk-tkcz https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:37.784096+00:00 Debian Importer Fixing VCID-4mqx-42ea-53c3 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:30.984701+00:00 Debian Importer Fixing VCID-a3yj-v3tu-d7ga https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:22.088504+00:00 Debian Importer Fixing VCID-yhft-bm7y-jfde https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:08.736969+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:03.707856+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:01.817879+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:40:00.292654+00:00 Debian Importer Fixing VCID-z3qs-q6ce-aqbc https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:52.716756+00:00 Debian Importer Fixing VCID-d14h-dr7c-c3d9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:51.316653+00:00 Debian Importer Fixing VCID-v41b-jva8-u7at https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:47.214289+00:00 Debian Importer Fixing VCID-7kxd-yjnx-m7f2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:45.775048+00:00 Debian Importer Fixing VCID-6jzb-qp5p-47ex https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:42.089873+00:00 Debian Importer Fixing VCID-5hrr-xvrw-ebd9 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:39.839355+00:00 Debian Importer Fixing VCID-xd76-s5yw-fyaq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:36.788014+00:00 Debian Importer Fixing VCID-q36y-yr48-k3ex https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:34.959831+00:00 Debian Importer Fixing VCID-aze6-wgfm-3ycv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:29.895592+00:00 Debian Importer Fixing VCID-x245-d866-nkff https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:24.050643+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:13.214268+00:00 Debian Importer Fixing VCID-kzsr-8hjr-gkf1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:08.869230+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:05.331581+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:39:02.402050+00:00 Debian Importer Fixing VCID-f2u9-7eeg-e7cg https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:55.470465+00:00 Debian Importer Fixing VCID-xxhg-up2k-yyhv https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:54.071496+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:44.516737+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:42.874712+00:00 Debian Importer Fixing VCID-5gv4-c26w-gube https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:34.960230+00:00 Debian Importer Fixing VCID-yzsh-2rk2-5yhq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:30.553230+00:00 Debian Importer Fixing VCID-q8p1-em5q-wuhw https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:29.879139+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:24.634195+00:00 Debian Importer Fixing VCID-tb3q-ndrt-mkg3 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:23.205520+00:00 Debian Importer Fixing VCID-uem4-47we-qua4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:20.279455+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:14.445899+00:00 Debian Importer Fixing VCID-9zgh-r671-7ufw https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:10.971795+00:00 Debian Importer Fixing VCID-yq9b-dpsh-cuhy https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:08.695162+00:00 Debian Importer Fixing VCID-rsny-tzcn-nbhu https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:38:05.546957+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:58.333700+00:00 Debian Importer Fixing VCID-868a-udb4-qfbm https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:56.323535+00:00 Debian Importer Fixing VCID-m773-z76s-8qad https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:55.389881+00:00 Debian Importer Fixing VCID-j5zr-w83u-q7ds https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:50.521087+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:43.127388+00:00 Debian Importer Fixing VCID-2bay-kzph-yya3 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:35.577601+00:00 Debian Importer Fixing VCID-w8r5-decj-vkem https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:31.867352+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:19.964611+00:00 Debian Importer Fixing VCID-gqr9-19jt-qfds https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:19.070894+00:00 Debian Importer Fixing VCID-jvv4-j5x1-dbd6 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:16.245277+00:00 Debian Importer Fixing VCID-r4zk-9j6t-uyhg https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:11.205821+00:00 Debian Importer Fixing VCID-ahsf-n2te-bfa2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:08.657505+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:56.438272+00:00 Debian Importer Fixing VCID-kbc5-2ek1-gfbd https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:50.263367+00:00 Debian Importer Fixing VCID-kjn8-9h7n-dfab https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:48.687905+00:00 Debian Importer Fixing VCID-vrfu-1kn8-x3be https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:46.420564+00:00 Debian Importer Fixing VCID-c9br-38nh-sfg4 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:45.482642+00:00 Debian Importer Fixing VCID-jfrf-qe3s-gbax https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:41.019255+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:35.339808+00:00 Debian Importer Fixing VCID-msbv-kmj8-b7e8 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:31.443153+00:00 Debian Importer Fixing VCID-t9de-4jgf-wuc7 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:29.778398+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:29.104693+00:00 Debian Importer Fixing VCID-4ghv-w1sg-77hu https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:28.348134+00:00 Debian Importer Fixing VCID-a8ja-eegd-yqhk https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:22.683023+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:17.813746+00:00 Debian Importer Fixing VCID-hx57-qb6n-bfba https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:13.914316+00:00 Debian Importer Fixing VCID-q2nc-hdcj-gfdm https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:12.207812+00:00 Debian Importer Fixing VCID-hbnp-yx9t-bbfj https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:10.293730+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:07.615280+00:00 Debian Importer Fixing VCID-y13n-jhsr-ryd2 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:36:03.942678+00:00 Debian Importer Fixing VCID-p47c-bn8d-6ka7 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:35:58.756233+00:00 Debian Importer Fixing VCID-vzyy-16xe-qkgm https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:35:53.634089+00:00 Debian Importer Fixing VCID-stma-rnkr-c3ef https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:35:40.007337+00:00 Debian Importer Fixing VCID-fvhu-1xqw-fkbk https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:35:33.015907+00:00 Debian Importer Fixing VCID-y5bm-2fr5-8bbp https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-27T07:03:46.388517+00:00 Debian Importer Fixing VCID-n99v-8wyx-a3cr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:57:56.362620+00:00 Debian Importer Fixing VCID-yvk3-2upk-pkem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:57:45.832925+00:00 Debian Importer Fixing VCID-yvab-budx-47ec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:53:44.959703+00:00 Debian Importer Fixing VCID-g9zj-fsa9-vkca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:51:48.753664+00:00 Debian Importer Fixing VCID-cyy8-6pff-vyf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:44:39.690487+00:00 Debian Importer Fixing VCID-f5xb-v8j6-nye2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:40:46.700622+00:00 Debian Importer Fixing VCID-w8d1-9zry-wydv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:39:55.755339+00:00 Debian Importer Fixing VCID-sqkd-cwbk-tkec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:39:49.079100+00:00 Debian Importer Fixing VCID-dqu3-2d1w-bked https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:39:23.713071+00:00 Debian Importer Fixing VCID-ht2j-bafp-eudq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:21:26.088902+00:00 Debian Importer Fixing VCID-kvq6-38sd-77h7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:16:00.967757+00:00 Debian Importer Fixing VCID-dx7t-sub8-zffq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:14:02.792829+00:00 Debian Importer Fixing VCID-14u5-h6vv-p7c3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:13:26.324961+00:00 Debian Importer Fixing VCID-pgrh-f1dv-27dh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:12:47.135763+00:00 Debian Importer Fixing VCID-95pv-sezn-6qhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T06:11:32.518485+00:00 Debian Importer Fixing VCID-cfrh-y31w-r7de https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:56:24.770584+00:00 Debian Importer Fixing VCID-25at-2je8-2ufj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:54:03.650169+00:00 Debian Importer Fixing VCID-purc-p6w1-1fhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:53:27.093395+00:00 Debian Importer Fixing VCID-xnee-wpbs-7bc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:51:42.513677+00:00 Debian Importer Fixing VCID-euxu-gjpw-8yhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:48:45.744569+00:00 Debian Importer Fixing VCID-11nd-2f5c-ybe1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:48:05.063135+00:00 Debian Importer Fixing VCID-9rrq-d3g4-jyfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:45:50.402901+00:00 Debian Importer Fixing VCID-fhfz-6h5m-hbed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:42:43.722905+00:00 Debian Importer Fixing VCID-tz5h-hd3e-rbbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:42:23.247799+00:00 Debian Importer Fixing VCID-a454-61sh-j7ay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:42:14.748377+00:00 Debian Importer Fixing VCID-pj46-9jp7-33ha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:41:53.602111+00:00 Debian Importer Fixing VCID-p2gz-4gyx-ebbu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:37:53.454434+00:00 Debian Importer Fixing VCID-wvu1-rfc1-zya9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:35:42.298892+00:00 Debian Importer Fixing VCID-9bru-3rtm-sfey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:34:33.985768+00:00 Debian Importer Fixing VCID-zey3-3zvc-tkhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:31:21.358786+00:00 Debian Importer Fixing VCID-sx8s-kw5x-myea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:21:10.310096+00:00 Debian Importer Fixing VCID-jyxp-bjx8-kfbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:18:43.882503+00:00 Debian Importer Fixing VCID-kw1q-k8cm-j7dj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:17:32.637230+00:00 Debian Importer Fixing VCID-7fmr-tj7p-4uap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:16:00.619006+00:00 Debian Importer Fixing VCID-uvrh-s5dy-puc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:14:29.140629+00:00 Debian Importer Fixing VCID-46pr-2cfb-mbhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:12:10.941050+00:00 Debian Importer Fixing VCID-kgnw-n75c-mqe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:09:32.817325+00:00 Debian Importer Fixing VCID-txtu-9qtr-13bj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:06:38.147510+00:00 Debian Importer Fixing VCID-dwp4-mc1w-4bcw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:04:31.853891+00:00 Debian Importer Fixing VCID-jhe1-2e3s-nkht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:58:15.903995+00:00 Debian Importer Fixing VCID-aw15-85yp-e7b6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:52:42.768182+00:00 Debian Importer Fixing VCID-2dp8-mmkf-w7dx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:47:52.181539+00:00 Debian Importer Fixing VCID-656s-tkaz-m7bj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:45:28.955020+00:00 Debian Importer Fixing VCID-cc41-mkuk-2fgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:41:44.682001+00:00 Debian Importer Fixing VCID-6xv7-46du-f7ha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:35:00.271712+00:00 Debian Importer Fixing VCID-zs38-9m63-xfh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:34:02.037914+00:00 Debian Importer Fixing VCID-8v51-tdqe-tbcp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:25:35.388027+00:00 Debian Importer Fixing VCID-ppa4-r2pf-v7a2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:19:51.224834+00:00 Debian Importer Fixing VCID-9wsp-xbm7-yfb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:19:08.944494+00:00 Debian Importer Fixing VCID-tafy-p8yj-ukdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:17:42.563712+00:00 Debian Importer Fixing VCID-4e1f-qvnx-87fc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:16:17.016525+00:00 Debian Importer Fixing VCID-xbbw-gd21-sfgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:11:58.077952+00:00 Debian Importer Fixing VCID-1k5n-pxpr-4bc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:02:42.777695+00:00 Debian Importer Fixing VCID-31cj-5nhu-4qa9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T04:01:19.608587+00:00 Debian Importer Fixing VCID-4v3t-8s2w-rfbg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:58:12.512752+00:00 Debian Importer Fixing VCID-hnt8-m1yy-3fec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:56:08.320211+00:00 Debian Importer Fixing VCID-vg82-2bbq-q7ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:45:26.787140+00:00 Debian Importer Fixing VCID-fs2g-g159-guhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:38:00.770735+00:00 Debian Importer Fixing VCID-5kq4-sz23-ekey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:26:30.740484+00:00 Debian Importer Fixing VCID-tb98-2sh1-67d4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:04:32.953543+00:00 Debian Importer Fixing VCID-p1xn-hbgr-efby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:54:45.654138+00:00 Debian Importer Fixing VCID-ma9f-puuw-bfge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:50:38.234050+00:00 Debian Importer Fixing VCID-22zu-qy6y-aub1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:49:16.766452+00:00 Debian Importer Fixing VCID-uyug-vjrw-87h6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:44:44.008658+00:00 Debian Importer Fixing VCID-pest-xjma-sfbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:33:13.452154+00:00 Debian Importer Fixing VCID-fp52-xjc8-s3bw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:30:34.273323+00:00 Debian Importer Fixing VCID-4gup-x2rj-w3bq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:16:42.734954+00:00 Debian Importer Fixing VCID-hhxy-swz4-eqfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:15:53.670361+00:00 Debian Importer Fixing VCID-vx8c-nssy-ubaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:15:06.317576+00:00 Debian Importer Fixing VCID-r4kz-m7m8-c3b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:11:49.138740+00:00 Debian Importer Fixing VCID-3mhu-519z-pbck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:00:32.916661+00:00 Debian Importer Fixing VCID-6uka-tgq1-gfb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:52:09.435725+00:00 Debian Importer Fixing VCID-3qmn-b1w4-jkg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:51:21.386158+00:00 Debian Importer Fixing VCID-y54q-e569-p7cx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:48:22.590046+00:00 Debian Importer Fixing VCID-3z2m-anud-zubb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:47:55.193106+00:00 Debian Importer Fixing VCID-8ama-833x-xuh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:46:47.937142+00:00 Debian Importer Fixing VCID-vekd-9q54-b7bg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:45:40.964666+00:00 Debian Importer Fixing VCID-dzvh-zq3w-r7ah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:44:05.066868+00:00 Debian Importer Fixing VCID-vzyy-16xe-qkgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:37:52.326646+00:00 Debian Importer Fixing VCID-5agv-svfz-pqcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:31:08.462571+00:00 Debian Importer Fixing VCID-tp92-5gfk-1qb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:30:27.461585+00:00 Debian Importer Fixing VCID-uzrt-axb3-qfcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:29:29.035211+00:00 Debian Importer Fixing VCID-jq8m-nxpa-p3hy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:25:47.140450+00:00 Debian Importer Fixing VCID-j3rb-57kd-rfd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:25:22.148161+00:00 Debian Importer Fixing VCID-s3mt-8hwh-xkgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:22:40.730662+00:00 Debian Importer Fixing VCID-than-1kz8-yucx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:20:12.460564+00:00 Debian Importer Fixing VCID-2cky-e16g-yqgf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:14:43.555255+00:00 Debian Importer Fixing VCID-878n-d9ss-rugc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:12:12.338210+00:00 Debian Importer Fixing VCID-yj9c-fda5-57g2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T01:08:47.467525+00:00 Debian Importer Fixing VCID-nw2n-9b59-gbdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:59:21.401068+00:00 Debian Importer Fixing VCID-34nt-cv4x-qbg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:57:20.786421+00:00 Debian Importer Fixing VCID-jset-t9qq-xfah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:55:42.621863+00:00 Debian Importer Fixing VCID-dy8y-by76-1ufm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:53:23.648287+00:00 Debian Importer Fixing VCID-vg98-dpfg-u7g8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:51:31.013026+00:00 Debian Importer Fixing VCID-szq9-t587-83h2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:46:34.740056+00:00 Debian Importer Fixing VCID-gekz-p7dw-cbb1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:46:12.146833+00:00 Debian Importer Fixing VCID-ka1g-skuq-gqcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:41:45.429053+00:00 Debian Importer Fixing VCID-sxyp-anqf-z3hq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:40:16.745974+00:00 Debian Importer Fixing VCID-ruxz-24k9-sbcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:31:04.926824+00:00 Debian Importer Fixing VCID-x9wt-jmne-vudk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:29:38.094808+00:00 Debian Importer Fixing VCID-5vkh-dbsm-vbgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:16:08.149676+00:00 Debian Importer Fixing VCID-emnd-q69n-a3fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:14:34.612354+00:00 Debian Importer Fixing VCID-3r34-452w-skc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:05:39.061393+00:00 Debian Importer Fixing VCID-dktw-mrn7-kbh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:01:19.833363+00:00 Debian Importer Fixing VCID-yve9-y9ec-cycs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:55:47.030533+00:00 Debian Importer Fixing VCID-6vtw-v3u5-buce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:53:17.799853+00:00 Debian Importer Fixing VCID-gr5a-eqvx-n3ha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:43:42.084807+00:00 Debian Importer Fixing VCID-q36y-yr48-k3ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:38:23.166609+00:00 Debian Importer Fixing VCID-xawd-7qp7-uben https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:37:24.595026+00:00 Debian Importer Fixing VCID-b13x-ysdt-jbc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:37:16.516111+00:00 Debian Importer Fixing VCID-rsny-tzcn-nbhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:31:25.787251+00:00 Debian Importer Fixing VCID-hbnp-yx9t-bbfj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:18:06.191183+00:00 Debian Importer Fixing VCID-7kxd-yjnx-m7f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:12:59.699134+00:00 Debian Importer Fixing VCID-hpqq-mr4h-gbcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:04:34.593046+00:00 Debian Importer Fixing VCID-179u-b611-z7hc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T12:02:38.078953+00:00 Debian Importer Fixing VCID-pytf-9ehq-ykc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:59:31.961473+00:00 Debian Importer Fixing VCID-wv35-ucjn-3bb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:54:17.300888+00:00 Debian Importer Fixing VCID-e8ky-fyhz-dqhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:49:45.248683+00:00 Debian Importer Fixing VCID-z6xa-pf4r-4kbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:42:12.014093+00:00 Debian Importer Fixing VCID-f892-ybkq-kbd7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:36:58.251780+00:00 Debian Importer Fixing VCID-188w-9sxd-5khx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:31:38.256055+00:00 Debian Importer Fixing VCID-x5y6-u3c8-3qbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:30:15.469752+00:00 Debian Importer Fixing VCID-cwk5-n1mq-kkd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:27:40.891311+00:00 Debian Importer Fixing VCID-gmun-zz47-suap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:26:51.841135+00:00 Debian Importer Fixing VCID-7b27-phbd-fqbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:25:51.564086+00:00 Debian Importer Fixing VCID-udny-3t6r-fyhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:23:54.925172+00:00 Debian Importer Fixing VCID-fs73-5ucn-qke1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T11:06:20.686174+00:00 Debian Importer Fixing VCID-xh1w-u484-dbet https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:59:57.972702+00:00 Debian Importer Fixing VCID-r89h-js19-77dr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:38:38.006068+00:00 Debian Importer Fixing VCID-u892-96zg-9ke6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:33:18.336810+00:00 Debian Importer Fixing VCID-cv97-j139-vbfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:28:14.340089+00:00 Debian Importer Fixing VCID-brte-gqy3-r3ax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:22:27.025494+00:00 Debian Importer Fixing VCID-beg3-c4a1-cfay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T10:16:56.685288+00:00 Debian Importer Fixing VCID-mzg4-exh3-pugu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:51:16.018549+00:00 Debian Importer Fixing VCID-n88t-yc67-r3f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:45:02.614304+00:00 Debian Importer Fixing VCID-g2yr-d1ta-93g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:37:46.784932+00:00 Debian Importer Fixing VCID-uvyu-va81-wbgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:28:13.181398+00:00 Debian Importer Fixing VCID-93h7-cr4j-sbfn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:25:35.475902+00:00 Debian Importer Fixing VCID-651u-f45c-57de https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:23:15.781924+00:00 Debian Importer Fixing VCID-a1ez-xh2w-7ba6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:21:48.157494+00:00 Debian Importer Fixing VCID-chgp-ama8-5ycb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:10:03.988058+00:00 Debian Importer Fixing VCID-3ay8-sdv3-3ydv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T09:04:41.080391+00:00 Debian Importer Fixing VCID-rv7g-3bjt-qkgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:39:09.203646+00:00 Debian Importer Fixing VCID-dgr2-7fpq-4bgv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:30:14.803115+00:00 Debian Importer Fixing VCID-xzc2-9tmc-7qey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:28:00.879129+00:00 Debian Importer Fixing VCID-yx1f-r3sr-rues https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:25:16.022081+00:00 Debian Importer Fixing VCID-1s26-havx-dkey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:22:16.432177+00:00 Debian Importer Fixing VCID-pmn9-t8by-myhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:10:36.797697+00:00 Debian Importer Fixing VCID-m6h1-8erq-dqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:04:28.896948+00:00 Debian Importer Fixing VCID-tu5g-jnzs-33d4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T08:00:28.182718+00:00 Debian Importer Fixing VCID-wtcb-jzbu-fkcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:49:32.827958+00:00 Debian Importer Fixing VCID-hq39-2qnw-v3dw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:45:10.575793+00:00 Debian Importer Fixing VCID-14ey-bdy6-5qe9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:43:38.419277+00:00 Debian Importer Fixing VCID-2bbj-94mj-rfa7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:43:18.549875+00:00 Debian Importer Fixing VCID-x9a9-thjn-yya5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:28:54.138627+00:00 Debian Importer Fixing VCID-7t89-3m8t-1ydq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:24:58.771281+00:00 Debian Importer Fixing VCID-3ans-72mm-sfh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:24:48.665096+00:00 Debian Importer Fixing VCID-p1cj-v8rw-rqf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:24:37.139873+00:00 Debian Importer Fixing VCID-m3ch-q8dr-xkay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:17:08.454764+00:00 Debian Importer Fixing VCID-5kdh-vgcu-kkf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:16:02.975026+00:00 Debian Importer Fixing VCID-8xay-cepn-vfdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:14:16.452952+00:00 Debian Importer Fixing VCID-kk4c-najx-kyhq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:06:56.417541+00:00 Debian Importer Fixing VCID-g8k1-wwq1-yka2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T07:00:40.183152+00:00 Debian Importer Fixing VCID-3tns-khmb-aqbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:55:32.909773+00:00 Debian Importer Fixing VCID-8q1z-p2qp-nkbf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:52:51.753863+00:00 Debian Importer Fixing VCID-g82z-3144-u3d2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:32:18.117504+00:00 Debian Importer Fixing VCID-madz-x835-s7cy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:27:58.191639+00:00 Debian Importer Fixing VCID-rrxa-r3j8-ubh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:11:35.633916+00:00 Debian Importer Fixing VCID-tpyv-xst5-vyd6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:08:04.411810+00:00 Debian Importer Fixing VCID-898p-crnv-w7cb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T06:04:50.638388+00:00 Debian Importer Fixing VCID-4g8h-bz4a-uydk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-24T05:58:05.435584+00:00 Debian Importer Fixing VCID-dykz-252m-jkcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-21T18:54:04.607529+00:00 Debian Importer Fixing VCID-gbkk-anun-a3ce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:25.835251+00:00 Debian Importer Fixing VCID-4jvb-unxd-3qg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:59:28.042789+00:00 Debian Importer Fixing VCID-1kgs-19ue-wbe1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:57:17.775650+00:00 Debian Importer Fixing VCID-94k1-ja9w-2fd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:54.776490+00:00 Debian Importer Fixing VCID-yj3z-hvs9-47hj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:40:34.846795+00:00 Debian Importer Fixing VCID-v9bm-48ec-9fc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:26:03.480587+00:00 Debian Importer Fixing VCID-5ahq-saw1-suf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:06.125903+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:19:06.825243+00:00 Debian Importer Fixing VCID-8qua-yr2x-s7fd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:08.202175+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:53.421845+00:00 Debian Importer Fixing VCID-7v66-8w2u-duf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:05.429803+00:00 Debian Importer Fixing VCID-p31e-jzac-8kbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:13:54.255425+00:00 Debian Importer Fixing VCID-vzkt-5648-ukh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:10:35.880761+00:00 Debian Importer Fixing VCID-uzfu-ke47-1qaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:11.472932+00:00 Debian Importer Fixing VCID-1g77-qwuy-nkg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:34.789390+00:00 Debian Importer Fixing VCID-psqs-wgmf-57d8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:50.475889+00:00 Debian Importer Fixing VCID-c7xf-x7d5-87gn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:27.678618+00:00 Debian Importer Fixing VCID-x5jd-ruv2-1qac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:05:22.946427+00:00 Debian Importer Fixing VCID-82f7-2axv-jbbf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:37.621743+00:00 Debian Importer Fixing VCID-3jmx-jfhk-yqh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:50.544235+00:00 Debian Importer Fixing VCID-995q-6nn5-ykgg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:53.171545+00:00 Debian Importer Fixing VCID-1s77-djzb-xffp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:56:24.313046+00:00 Debian Importer Fixing VCID-ya16-qrwm-kkfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:40.881049+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:56.628515+00:00 Debian Importer Fixing VCID-9axt-c2hy-63eb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:36.429498+00:00 Debian Importer Fixing VCID-texr-5weq-v3dw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:52:00.227520+00:00 Debian Importer Fixing VCID-cvcu-khre-3bc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:54.023470+00:00 Debian Importer Fixing VCID-p9x5-syxd-fufc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:49:26.922359+00:00 Debian Importer Fixing VCID-m8n7-j86u-7ugj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:38.936625+00:00 Debian Importer Fixing VCID-jbs2-t7yr-rqh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:14.507806+00:00 Debian Importer Fixing VCID-p4by-fm53-yybk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:45:46.348097+00:00 Debian Importer Fixing VCID-ddm7-5p27-3khg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:44:07.695361+00:00 Debian Importer Fixing VCID-e1pe-znzp-jqhx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:03.842420+00:00 Debian Importer Fixing VCID-aj3p-9trr-87cz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:41.243734+00:00 Debian Importer Fixing VCID-3p2d-np1n-p3gv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:09.821226+00:00 Debian Importer Fixing VCID-6jzb-qp5p-47ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:56.247047+00:00 Debian Importer Fixing VCID-nnnt-9vn7-rfc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:57.505420+00:00 Debian Importer Fixing VCID-47k1-5vw2-97hy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:48.086339+00:00 Debian Importer Fixing VCID-v3ba-uvsy-ybfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:33:20.752947+00:00 Debian Importer Fixing VCID-kns4-65da-v3bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:33:06.437183+00:00 Debian Importer Fixing VCID-zvp5-zhsh-9qap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:30:33.948502+00:00 Debian Importer Fixing VCID-kvbv-df49-gyaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:02.031740+00:00 Debian Importer Fixing VCID-h7pm-dyef-1fan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:28:55.904295+00:00 Debian Importer Fixing VCID-kdmz-w6db-7ue2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:22.908936+00:00 Debian Importer Fixing VCID-7892-zv3s-xqhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:52.605108+00:00 Debian Importer Fixing VCID-jxkv-jbh3-9fhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:14.515621+00:00 Debian Importer Fixing VCID-z24p-wtzg-a3gh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:24:44.948082+00:00 Debian Importer Fixing VCID-zxmw-r6pn-6fdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:24:31.957341+00:00 Debian Importer Fixing VCID-j7c3-n2w7-fbg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:24:18.462992+00:00 Debian Importer Fixing VCID-c8qb-kbef-8qg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:48.133134+00:00 Debian Importer Fixing VCID-v2rb-s1g7-1ub4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:34.069070+00:00 Debian Importer Fixing VCID-y3wu-za9p-yub1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:06.230838+00:00 Debian Importer Fixing VCID-qyu2-kw7b-1kg1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:17:48.876434+00:00 Debian Importer Fixing VCID-qucs-qaj4-q7cf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:46.897072+00:00 Debian Importer Fixing VCID-5yp2-meun-zbas https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:24.165568+00:00 Debian Importer Fixing VCID-ex8u-z3r8-cycq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:15:38.518073+00:00 Debian Importer Fixing VCID-2wmk-4bjz-bbhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:25.658651+00:00 Debian Importer Fixing VCID-g34c-hwct-tqb1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:23.334090+00:00 Debian Importer Fixing VCID-uhng-dru9-7yht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:44.528177+00:00 Debian Importer Fixing VCID-khrd-ya2n-rygv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:01.231164+00:00 Debian Importer Fixing VCID-6r1j-pnmx-mkdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:48.671797+00:00 Debian Importer Fixing VCID-np3t-m158-k7he https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:42.135302+00:00 Debian Importer Fixing VCID-rwfc-mzfg-akft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:38.708699+00:00 Debian Importer Fixing VCID-bg8h-jw13-8yhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:15.444928+00:00 Debian Importer Fixing VCID-drqe-npyk-5yfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:48.178824+00:00 Debian Importer Fixing VCID-jx72-vpup-p3gk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:07.945213+00:00 Debian Importer Fixing VCID-yqcj-27j2-tqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:04:35.833120+00:00 Debian Importer Fixing VCID-9zxp-tyb1-ubg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:49.847728+00:00 Debian Importer Fixing VCID-kgv3-f25s-ckd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:46.155957+00:00 Debian Importer Fixing VCID-t2sv-vqq2-q7av https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:35.388480+00:00 Debian Importer Fixing VCID-3d8r-1n1k-skff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:20.434749+00:00 Debian Importer Fixing VCID-9m2t-y1zb-hfar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:09.841133+00:00 Debian Importer Fixing VCID-5gv4-c26w-gube https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:00.940241+00:00 Debian Importer Fixing VCID-vz1n-7fbk-kyag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:32.340146+00:00 Debian Importer Fixing VCID-qjqb-cqc9-17e1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:29.656897+00:00 Debian Importer Fixing VCID-b1an-t4b8-4bd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:15.950645+00:00 Debian Importer Fixing VCID-9jq2-6zek-rqh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:17.109538+00:00 Debian Importer Fixing VCID-w53c-hafw-6kbb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:42.883599+00:00 Debian Importer Fixing VCID-sm3v-84rs-nyem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:32.151668+00:00 Debian Importer Fixing VCID-wjeh-m3f2-tkbg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:20.546180+00:00 Debian Importer Fixing VCID-3ktq-cbhp-8fhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:56.291521+00:00 Debian Importer Fixing VCID-tc63-4q6e-nker https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:19.004335+00:00 Debian Importer Fixing VCID-mgjc-55mm-kffq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:56.677012+00:00 Debian Importer Fixing VCID-vtwb-e5mq-6bgq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:42.649031+00:00 Debian Importer Fixing VCID-hjf7-23wz-1qeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:37.546826+00:00 Debian Importer Fixing VCID-k1eg-sz6t-skg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:34.481936+00:00 Debian Importer Fixing VCID-xdde-euh1-dqfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:14.234815+00:00 Debian Importer Fixing VCID-6n32-z9u6-gfch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:21.797624+00:00 Debian Importer Fixing VCID-kj4q-41ch-2bdx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:57.603010+00:00 Debian Importer Fixing VCID-ete6-ycnw-7kgg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:38.686994+00:00 Debian Importer Fixing VCID-gkap-5jhj-tbff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:32.959248+00:00 Debian Importer Fixing VCID-k1v3-945q-47eh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:18.562529+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:44:00.608742+00:00 Debian Importer Fixing VCID-7ejt-hdra-93ez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:57.283411+00:00 Debian Importer Fixing VCID-zs1j-hpbv-7qbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:55.129919+00:00 Debian Importer Fixing VCID-y6kc-guf2-bqdz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:39.077670+00:00 Debian Importer Fixing VCID-8e38-5bq1-8be9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:28.230466+00:00 Debian Importer Fixing VCID-buyh-2d37-rqb1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:16.542593+00:00 Debian Importer Fixing VCID-4bsb-hypz-5bav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:01.943765+00:00 Debian Importer Fixing VCID-brwq-qcbd-c3ep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:01.112762+00:00 Debian Importer Fixing VCID-fhme-yjgr-suep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:58.696264+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:15.588773+00:00 Debian Importer Fixing VCID-6hf1-vsj3-a3h5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:35.138819+00:00 Debian Importer Fixing VCID-sqf7-4e8r-7ken https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:24.152538+00:00 Debian Importer Fixing VCID-ky32-n1qj-nydf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:26.559065+00:00 Debian Importer Fixing VCID-3yg6-7zfv-gkaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:45.245899+00:00 Debian Importer Fixing VCID-sy3c-f5q7-qygm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:37.763412+00:00 Debian Importer Fixing VCID-es8r-wvmz-gfe6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:43.868537+00:00 Debian Importer Fixing VCID-czue-c27z-bkgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:41.471862+00:00 Debian Importer Fixing VCID-d4u6-bzuu-dubz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:37:30.914405+00:00 Debian Importer Fixing VCID-ba6k-mvxj-8udm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:43.565356+00:00 Debian Importer Fixing VCID-mu3y-rdt2-x3g1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:06.216416+00:00 Debian Importer Fixing VCID-padk-1w3h-7bfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:48.141584+00:00 Debian Importer Fixing VCID-mp87-833h-4uag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:39.349279+00:00 Debian Importer Fixing VCID-xd76-s5yw-fyaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:01.207137+00:00 Debian Importer Fixing VCID-6syp-3js8-qudn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:33:18.584639+00:00 Debian Importer Fixing VCID-2s7e-4bym-cbe1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:45.737270+00:00 Debian Importer Fixing VCID-c8xs-q7hr-uua8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:28.439972+00:00 Debian Importer Fixing VCID-ed3p-sm1w-33am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:18.332039+00:00 Debian Importer Fixing VCID-214g-9hfm-wqbk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:51.378922+00:00 Debian Importer Fixing VCID-4eg9-yh2g-a7gc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:34.833906+00:00 Debian Importer Fixing VCID-1g53-791b-8fd7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:15.703842+00:00 Debian Importer Fixing VCID-d1ke-rn87-f7ec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:41.723864+00:00 Debian Importer Fixing VCID-qffu-7n92-bbhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:40.196995+00:00 Debian Importer Fixing VCID-xh6y-ja9y-u3es https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:09.411970+00:00 Debian Importer Fixing VCID-g7k7-e2h7-a7f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:47.135476+00:00 Debian Importer Fixing VCID-ahvx-mjgn-5fa8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:41.582915+00:00 Debian Importer Fixing VCID-cs7h-d7vk-73ab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:29.178641+00:00 Debian Importer Fixing VCID-cvw6-a674-zfa9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:08.641907+00:00 Debian Importer Fixing VCID-jz2j-4jqz-8fdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:36.851370+00:00 Debian Importer Fixing VCID-g162-81ms-93g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:00.244703+00:00 Debian Importer Fixing VCID-syxu-a4az-qfe4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:53.965367+00:00 Debian Importer Fixing VCID-emdc-7k4g-67e5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:52.846528+00:00 Debian Importer Fixing VCID-v1ka-ynm7-q3cw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:25.189867+00:00 Debian Importer Fixing VCID-q7a3-cm2m-ayga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:20.856960+00:00 Debian Importer Fixing VCID-9sm6-shj5-cqh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:18.975769+00:00 Debian Importer Fixing VCID-ezwh-qc41-pugn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:03.822245+00:00 Debian Importer Fixing VCID-5ehk-s7ww-vfc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:00.892610+00:00 Debian Importer Fixing VCID-a7fz-5z23-17ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:48.858222+00:00 Debian Importer Fixing VCID-b51x-3ss2-67ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:35.421761+00:00 Debian Importer Fixing VCID-bens-aw9k-xka2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:31.950653+00:00 Debian Importer Fixing VCID-p1cz-e94f-57c2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:19.378998+00:00 Debian Importer Fixing VCID-yeww-6ybr-qye8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:46.233988+00:00 Debian Importer Fixing VCID-nr6b-wdnx-k7e6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:35.033349+00:00 Debian Importer Fixing VCID-h31q-rcq3-7ud3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:16.291374+00:00 Debian Importer Fixing VCID-ypt7-tc1u-p3ev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:06.579426+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:34.050895+00:00 Debian Importer Fixing VCID-25nt-fa4m-97fm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:05.362194+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:58.405008+00:00 Debian Importer Fixing VCID-d9ty-7748-33a7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:48.904109+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:45.375928+00:00 Debian Importer Fixing VCID-abcd-nfuq-2kc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:12.327649+00:00 Debian Importer Fixing VCID-21z5-p9ct-p7g2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:08.983602+00:00 Debian Importer Fixing VCID-hv12-tgt6-rub5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:20.601917+00:00 Debian Importer Fixing VCID-mjbb-q1nx-8fgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:45.751835+00:00 Debian Importer Fixing VCID-xhfy-gkwq-afbr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:31.910918+00:00 Debian Importer Fixing VCID-rkqz-erqh-dfh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:16.384016+00:00 Debian Importer Fixing VCID-tspb-2q9s-u3d6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:12.713508+00:00 Debian Importer Fixing VCID-45qm-naju-pycn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:08.446759+00:00 Debian Importer Fixing VCID-dyun-rd3c-rke6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:56.553954+00:00 Debian Importer Fixing VCID-qxth-4ftd-s3ac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:50.800888+00:00 Debian Importer Fixing VCID-7r8h-rr9v-7qht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:31.180933+00:00 Debian Importer Fixing VCID-bq18-jcph-kkhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:57.421095+00:00 Debian Importer Fixing VCID-nw3c-5apn-zfhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:49.756776+00:00 Debian Importer Fixing VCID-4399-j8sn-t3b1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:26.243472+00:00 Debian Importer Fixing VCID-pepq-cqcb-dkdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:20.930293+00:00 Debian Importer Fixing VCID-2vqp-wpcw-pfbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:13.957615+00:00 Debian Importer Fixing VCID-vmvf-81ex-yug4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:06.452047+00:00 Debian Importer Fixing VCID-t5z7-w31u-j7gs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:50.705426+00:00 Debian Importer Fixing VCID-v2y7-vmt3-w3dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:42.271275+00:00 Debian Importer Fixing VCID-t644-dxrr-2qhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:21.263260+00:00 Debian Importer Fixing VCID-e495-c57w-tkft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:15.671023+00:00 Debian Importer Fixing VCID-zamd-w45x-e3g5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:11.543678+00:00 Debian Importer Fixing VCID-1hvg-tmga-nfhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:00.070851+00:00 Debian Importer Fixing VCID-3km6-xsxg-4bcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:51.518204+00:00 Debian Importer Fixing VCID-p472-z1xz-r3cj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:44.662343+00:00 Debian Importer Fixing VCID-6ejs-59g2-xkgg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:36.366039+00:00 Debian Importer Fixing VCID-y439-52f2-rfck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:32.018905+00:00 Debian Importer Fixing VCID-vck1-emav-93gc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:00.447066+00:00 Debian Importer Fixing VCID-qjup-fvr1-xybc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:10.013950+00:00 Debian Importer Fixing VCID-jgaw-mgbm-sfaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:08:22.742898+00:00 Debian Importer Fixing VCID-4mqx-42ea-53c3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:08:05.602472+00:00 Debian Importer Fixing VCID-8ssr-76q5-6kf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:06.075227+00:00 Debian Importer Fixing VCID-m995-b8rn-tkgk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:28.757586+00:00 Debian Importer Fixing VCID-qxd4-7ack-dkaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:27.843334+00:00 Debian Importer Fixing VCID-dzye-v1vd-gybq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:25.608912+00:00 Debian Importer Fixing VCID-rjdd-dk1r-subd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:54.302967+00:00 Debian Importer Fixing VCID-1dxt-yy4z-y7cs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:11.292346+00:00 Debian Importer Fixing VCID-vz73-y2va-5kbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:01.154756+00:00 Debian Importer Fixing VCID-9axb-sz3w-ubcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:57.083890+00:00 Debian Importer Fixing VCID-8q49-pygk-33d1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:52.106303+00:00 Debian Importer Fixing VCID-7hpf-k162-1ubu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:41.941715+00:00 Debian Importer Fixing VCID-6hur-ug1s-83am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:33.099879+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:31.199245+00:00 Debian Importer Fixing VCID-qwre-yeev-uya8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:28.360772+00:00 Debian Importer Fixing VCID-eetb-e929-77bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:44.611680+00:00 Debian Importer Fixing VCID-t5y5-2hne-7keh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:27.572366+00:00 Debian Importer Fixing VCID-xs4a-ha3z-2bej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:08.457913+00:00 Debian Importer Fixing VCID-dwes-ct77-juc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:02.512051+00:00 Debian Importer Fixing VCID-687u-nzmt-n7a6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:38.193702+00:00 Debian Importer Fixing VCID-esup-2y63-afa4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:27.062350+00:00 Debian Importer Fixing VCID-38ja-dsj5-qyfc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:21.357764+00:00 Debian Importer Fixing VCID-e57d-cw7e-73an https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:04.400177+00:00 Debian Importer Fixing VCID-rq73-h79m-hqhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:57.584290+00:00 Debian Importer Fixing VCID-xncx-nvr7-k7d8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:35.073280+00:00 Debian Importer Fixing VCID-9cuj-t2sc-bbdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:25.128703+00:00 Debian Importer Fixing VCID-b4ct-fnbp-43a3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:15.089704+00:00 Debian Importer Fixing VCID-3a8a-ns8q-wbgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:13.465118+00:00 Debian Importer Fixing VCID-yf6e-3aw3-tqeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:03.105097+00:00 Debian Importer Fixing VCID-kptu-sm1d-kuae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:01.494557+00:00 Debian Importer Fixing VCID-92j7-p476-97ca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:46.336985+00:00 Debian Importer Fixing VCID-33re-7rh6-2bg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:30.102198+00:00 Debian Importer Fixing VCID-asy4-m48b-xydu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:20.462286+00:00 Debian Importer Fixing VCID-hucp-gu2u-97e1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:07.051506+00:00 Debian Importer Fixing VCID-8d9a-bf6e-dkga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:03.243974+00:00 Debian Importer Fixing VCID-p72b-szhh-wyd6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:55.687554+00:00 Debian Importer Fixing VCID-k68k-tnns-mkga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:50.045757+00:00 Debian Importer Fixing VCID-724j-jc6b-5uba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:30.803031+00:00 Debian Importer Fixing VCID-1zbm-pnj5-xqb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:24.238392+00:00 Debian Importer Fixing VCID-9qhe-6xhk-hfhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:15.980961+00:00 Debian Importer Fixing VCID-d5cu-m235-x3gr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:59.222806+00:00 Debian Importer Fixing VCID-5j3a-r6pk-2kdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:38.517656+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:21.682629+00:00 Debian Importer Fixing VCID-w4d7-nppw-pye9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:16.480420+00:00 Debian Importer Fixing VCID-x245-d866-nkff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:52.599822+00:00 Debian Importer Fixing VCID-2cux-cw1j-43hw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:35.623651+00:00 Debian Importer Fixing VCID-5zuy-q1p8-hqex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:11.282829+00:00 Debian Importer Fixing VCID-mzw8-vbmv-6yay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:08.080038+00:00 Debian Importer Fixing VCID-f2m2-u9j3-3ba9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:02.199827+00:00 Debian Importer Fixing VCID-sne8-13hq-mqan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:57.757601+00:00 Debian Importer Fixing VCID-kbc5-2ek1-gfbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:26.567477+00:00 Debian Importer Fixing VCID-s5k9-u1uk-3be8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:24.661291+00:00 Debian Importer Fixing VCID-gyzx-musu-83c4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:08.507248+00:00 Debian Importer Fixing VCID-3aa5-4rp5-g7h3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:49.959496+00:00 Debian Importer Fixing VCID-r7fp-rb7m-b7gs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:37.682646+00:00 Debian Importer Fixing VCID-qje4-3svy-5kg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:12.156256+00:00 Debian Importer Fixing VCID-nrff-k45r-y7bj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:56.205078+00:00 Debian Importer Fixing VCID-v9p4-t339-t3g4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:35.128015+00:00 Debian Importer Fixing VCID-mt8z-wdzf-kugb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:29.404759+00:00 Debian Importer Fixing VCID-pnfa-xm28-w3bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:26.346357+00:00 Debian Importer Fixing VCID-5nsy-fndc-7ka8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:19.481146+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:43.943758+00:00 Debian Importer Fixing VCID-fvhu-1xqw-fkbk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:42.571732+00:00 Debian Importer Fixing VCID-341t-wy9a-p7fz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:41.747670+00:00 Debian Importer Fixing VCID-jbyd-zxvz-mkf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:30.007325+00:00 Debian Importer Fixing VCID-cwnm-um2n-17cw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:19.304287+00:00 Debian Importer Fixing VCID-yp8m-zttt-ffdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:18.523899+00:00 Debian Importer Fixing VCID-sv8j-57vx-9ubs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:03.918050+00:00 Debian Importer Fixing VCID-apfq-mqch-jkgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:52.897355+00:00 Debian Importer Fixing VCID-tb3q-ndrt-mkg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:32.230713+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:18.084074+00:00 Debian Importer Fixing VCID-16bv-9gad-pkat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:07.578228+00:00 Debian Importer Fixing VCID-ttde-y49k-eqdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:04.349428+00:00 Debian Importer Fixing VCID-mkw6-9tye-x3fb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:55.907434+00:00 Debian Importer Fixing VCID-hwat-fnmq-vydn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:52.276543+00:00 Debian Importer Fixing VCID-xag6-3jdm-bqha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:39.865244+00:00 Debian Importer Fixing VCID-dp4x-6duw-8yeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:39.047140+00:00 Debian Importer Fixing VCID-94kq-ycmm-3bgn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:34.131230+00:00 Debian Importer Fixing VCID-f3sv-pbfs-cqcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:33.303552+00:00 Debian Importer Fixing VCID-etb2-844u-jfdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:30.527472+00:00 Debian Importer Fixing VCID-9tb7-5mp1-pkhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:23.057058+00:00 Debian Importer Fixing VCID-bkp8-m2yc-qub7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:58.199683+00:00 Debian Importer Fixing VCID-sdwv-6ycc-9ubh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:57.516179+00:00 Debian Importer Fixing VCID-d83g-5tdr-7fd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:55.831090+00:00 Debian Importer Fixing VCID-ucab-wj54-hyey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:36.959011+00:00 Debian Importer Fixing VCID-tnur-avf1-sybe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:31.751820+00:00 Debian Importer Fixing VCID-n8y5-74xq-f7ft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:19.183551+00:00 Debian Importer Fixing VCID-fvam-jks7-jkbt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:13.645267+00:00 Debian Importer Fixing VCID-exkc-gh4x-p3bh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:00.596699+00:00 Debian Importer Fixing VCID-j8yy-3tn1-63b5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:58.694476+00:00 Debian Importer Fixing VCID-dda8-c6rr-sqgq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:55.266379+00:00 Debian Importer Fixing VCID-cp52-z8dw-gfhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:46.813100+00:00 Debian Importer Fixing VCID-2369-8134-y3ck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:02.685318+00:00 Debian Importer Fixing VCID-9sqm-1ubb-zqhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:25.628976+00:00 Debian Importer Fixing VCID-ds3w-wph8-7kam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:20.713163+00:00 Debian Importer Fixing VCID-2kk2-cj4m-6ucm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:16.577699+00:00 Debian Importer Fixing VCID-wvp8-cst3-cuhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:54.709108+00:00 Debian Importer Fixing VCID-xxhg-up2k-yyhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:35.724118+00:00 Debian Importer Fixing VCID-ex4p-ftap-h7fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:26.944415+00:00 Debian Importer Fixing VCID-gtzq-1g5y-tkh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:10.236107+00:00 Debian Importer Fixing VCID-31hs-1pwx-7uak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:49.004443+00:00 Debian Importer Fixing VCID-rxej-y11f-tbca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:36.709563+00:00 Debian Importer Fixing VCID-r99q-4cst-dbem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:21.601297+00:00 Debian Importer Fixing VCID-z18v-yptf-7fhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:17.156081+00:00 Debian Importer Fixing VCID-87gw-ezjs-cqcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:54.055865+00:00 Debian Importer Fixing VCID-skjn-kete-x7e1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:46.886215+00:00 Debian Importer Fixing VCID-4s4m-bf1u-tyht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:37.834311+00:00 Debian Importer Fixing VCID-8ud8-f75a-jyew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:06.320083+00:00 Debian Importer Fixing VCID-17tu-a4wu-b3hv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:03.762730+00:00 Debian Importer Fixing VCID-a89e-bca3-1qfg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:57.623073+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:52.130775+00:00 Debian Importer Fixing VCID-qsdm-cyzs-aufy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:48.816851+00:00 Debian Importer Fixing VCID-j843-2qbk-tkcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:45.424609+00:00 Debian Importer Fixing VCID-94ha-pwzk-dbdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:35.566513+00:00 Debian Importer Fixing VCID-qa1s-pr21-cycs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:26.005522+00:00 Debian Importer Fixing VCID-rjuh-7kkv-3qch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:24.291573+00:00 Debian Importer Fixing VCID-p6sm-vcng-mubd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:20.239843+00:00 Debian Importer Fixing VCID-142k-7wgv-pfh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:15.249612+00:00 Debian Importer Fixing VCID-n5aj-87mh-hbbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:48.018745+00:00 Debian Importer Fixing VCID-q8p1-em5q-wuhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:40.017613+00:00 Debian Importer Fixing VCID-q7ty-xfyp-cbff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:19.268286+00:00 Debian Importer Fixing VCID-2kan-b4em-f3fg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:13.604073+00:00 Debian Importer Fixing VCID-nuhs-4sjq-dkcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:05.264033+00:00 Debian Importer Fixing VCID-j1um-9nym-muh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:02.692581+00:00 Debian Importer Fixing VCID-fqzh-sckm-a3ff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:26.133478+00:00 Debian Importer Fixing VCID-4spt-a3n7-z7fu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:01.796235+00:00 Debian Importer Fixing VCID-fufn-uqtv-wkas https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:55.092168+00:00 Debian Importer Fixing VCID-3ng4-wb1y-wyem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:39.024588+00:00 Debian Importer Fixing VCID-3vk2-4sx1-aybu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:37.254865+00:00 Debian Importer Fixing VCID-wcu7-me4d-bugc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:34.395820+00:00 Debian Importer Fixing VCID-5hrr-xvrw-ebd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:23.699925+00:00 Debian Importer Fixing VCID-5hdv-pgsr-cfbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:21.264643+00:00 Debian Importer Fixing VCID-7fcn-v6b9-yber https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:00.434644+00:00 Debian Importer Fixing VCID-2e99-ge3p-13eq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:46.965391+00:00 Debian Importer Fixing VCID-m4v3-xfhr-rbgt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:22.323312+00:00 Debian Importer Fixing VCID-vejg-5n4z-c7e8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:07.768153+00:00 Debian Importer Fixing VCID-rjgp-ta5t-vqge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:40.034404+00:00 Debian Importer Fixing VCID-4qx6-ysye-efhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:29.388053+00:00 Debian Importer Fixing VCID-yj28-va7b-3ug8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:18.878054+00:00 Debian Importer Fixing VCID-xp23-rfjr-2ydv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:12.559841+00:00 Debian Importer Fixing VCID-h7tb-d7q2-pqcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:56.090971+00:00 Debian Importer Fixing VCID-exhn-kypt-2fbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:48.135396+00:00 Debian Importer Fixing VCID-73mg-3qys-3ubr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:42.363815+00:00 Debian Importer Fixing VCID-mwv3-k49q-tfeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:31.695139+00:00 Debian Importer Fixing VCID-yx9t-1w27-akec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:27.918638+00:00 Debian Importer Fixing VCID-cqrs-uu2s-affj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:20.437724+00:00 Debian Importer Fixing VCID-9azr-qrcs-k7by https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:17.432014+00:00 Debian Importer Fixing VCID-u8gh-ber8-q3dw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:13.402317+00:00 Debian Importer Fixing VCID-vt3e-tx5j-b7aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:04.685814+00:00 Debian Importer Fixing VCID-ehtx-jr8g-vbgb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:00.046885+00:00 Debian Importer Fixing VCID-4fhj-v5ut-eubv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:56.134865+00:00 Debian Importer Fixing VCID-mmsk-j6bt-wuh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:44.094784+00:00 Debian Importer Fixing VCID-e2vy-prvw-xkhq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:42.930171+00:00 Debian Importer Fixing VCID-u6nn-wr8u-qqdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:40.766534+00:00 Debian Importer Fixing VCID-24gw-73zd-3khc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:39.912922+00:00 Debian Importer Fixing VCID-eyg8-qhra-ukcj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:36.106853+00:00 Debian Importer Fixing VCID-vwnc-y4ve-nkhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:30.481945+00:00 Debian Importer Fixing VCID-jhz4-z9f5-4ka3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:29.513209+00:00 Debian Importer Fixing VCID-n7kt-3rsy-rkg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:24.740918+00:00 Debian Importer Fixing VCID-ew57-csay-bube https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:09.392233+00:00 Debian Importer Fixing VCID-ajfm-hpzg-uqck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:04.946709+00:00 Debian Importer Fixing VCID-82py-ut98-qfb3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:24.966349+00:00 Debian Importer Fixing VCID-ea36-7v42-fyfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:57.271648+00:00 Debian Importer Fixing VCID-9n5j-cp2p-qkhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:16.595409+00:00 Debian Importer Fixing VCID-nbnz-q819-f7g8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:14.251105+00:00 Debian Importer Fixing VCID-8edx-kmgw-jue5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:44.835382+00:00 Debian Importer Fixing VCID-72pd-9p33-9qhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:31.995848+00:00 Debian Importer Fixing VCID-21jy-g45u-c7gp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:26.959229+00:00 Debian Importer Fixing VCID-4uvy-ga5j-a7g3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:23.460532+00:00 Debian Importer Fixing VCID-bxaj-dwje-sbhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:19.100627+00:00 Debian Importer Fixing VCID-4ebq-x7rk-4ya3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:08.250615+00:00 Debian Importer Fixing VCID-e2wu-3vmz-3yae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:26.996949+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:17.227647+00:00 Debian Importer Fixing VCID-vxys-jj3n-n7gz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:16.352767+00:00 Debian Importer Fixing VCID-m4y2-16uk-wkdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:07.245773+00:00 Debian Importer Fixing VCID-9t5k-1w4u-8kep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:34.377325+00:00 Debian Importer Fixing VCID-1zkc-5ucw-e3et https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:33.538739+00:00 Debian Importer Fixing VCID-cn7e-8bbs-rubj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:31.160715+00:00 Debian Importer Fixing VCID-64g2-43qf-5qg1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:24.097484+00:00 Debian Importer Fixing VCID-3ccs-8xaf-wfgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:13.478096+00:00 Debian Importer Fixing VCID-r23v-vjat-6qdk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:45.043113+00:00 Debian Importer Fixing VCID-gyhz-a9pm-zqav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:35.888467+00:00 Debian Importer Fixing VCID-kye7-8mwh-eyc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:31.308928+00:00 Debian Importer Fixing VCID-wxx7-3a43-h7gh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:27.013629+00:00 Debian Importer Fixing VCID-93ay-73z5-h7er https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:20.437294+00:00 Debian Importer Fixing VCID-dqe1-cf2v-myes https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:06.148712+00:00 Debian Importer Fixing VCID-c2me-ar1y-y7dw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:04.954648+00:00 Debian Importer Fixing VCID-cqye-p3y7-bfdp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:04.250992+00:00 Debian Importer Fixing VCID-u28n-uwtv-tyaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:02.713619+00:00 Debian Importer Fixing VCID-3bwh-381p-6qbh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:01.510715+00:00 Debian Importer Fixing VCID-cvps-1xf8-kqb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:36.720711+00:00 Debian Importer Fixing VCID-atux-q6hk-hfau https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:18.890276+00:00 Debian Importer Fixing VCID-rdch-b3ck-qugc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:01.634173+00:00 Debian Importer Fixing VCID-cecv-w1gr-qkbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:55.621887+00:00 Debian Importer Fixing VCID-av2k-qrby-suhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:50.932672+00:00 Debian Importer Fixing VCID-cear-n94a-jqdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:46.691544+00:00 Debian Importer Fixing VCID-p2ng-3bek-d3b6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:45.091009+00:00 Debian Importer Fixing VCID-v893-rr8x-nyay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:35.841533+00:00 Debian Importer Fixing VCID-m35k-ahnu-abh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:33.304183+00:00 Debian Importer Fixing VCID-ner2-8g1r-6bh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:04.727526+00:00 Debian Importer Fixing VCID-pd3f-rmqx-cya3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:03.054279+00:00 Debian Importer Fixing VCID-dqp6-k3du-n3ep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:55.363231+00:00 Debian Importer Fixing VCID-e965-zevp-rqgd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:54.657586+00:00 Debian Importer Fixing VCID-hbzk-b7gn-9bgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:50.974508+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:46.517682+00:00 Debian Importer Fixing VCID-8xdj-ys7r-rffm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:38.515920+00:00 Debian Importer Fixing VCID-e4jw-y3k8-r7ec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:36.824992+00:00 Debian Importer Fixing VCID-98y4-8sve-mfbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:32.334577+00:00 Debian Importer Fixing VCID-ka7q-cx4u-rkar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:30.862421+00:00 Debian Importer Fixing VCID-76zh-5x51-kffx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:01.882553+00:00 Debian Importer Fixing VCID-8bmx-4nbw-6qcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:46.371650+00:00 Debian Importer Fixing VCID-zufu-pwxh-eqbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:45.130193+00:00 Debian Importer Fixing VCID-wanj-gu4w-2qaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:09.710935+00:00 Debian Importer Fixing VCID-ptyj-1y6d-dud1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:56.939721+00:00 Debian Importer Fixing VCID-6wrr-yr71-xuhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:50.558959+00:00 Debian Importer Fixing VCID-st59-ndz1-1yc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:39.149003+00:00 Debian Importer Fixing VCID-hh8s-8fc8-pkgq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:24.605344+00:00 Debian Importer Fixing VCID-p4as-tvvw-ubcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:22.644032+00:00 Debian Importer Fixing VCID-q1ts-48c2-xkgb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:10.713458+00:00 Debian Importer Fixing VCID-xafq-y8ca-hkhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:45.227150+00:00 Debian Importer Fixing VCID-ans1-wmuz-e3bw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:42.076077+00:00 Debian Importer Fixing VCID-w1sf-m294-jke8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:27.838506+00:00 Debian Importer Fixing VCID-sq9c-y7kc-1yga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:21.303064+00:00 Debian Importer Fixing VCID-a2jn-1xhp-9fg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:11.456785+00:00 Debian Importer Fixing VCID-6tb9-nnj3-57gv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:57.053378+00:00 Debian Importer Fixing VCID-pbby-yjrv-23hc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:45.995136+00:00 Debian Importer Fixing VCID-93yj-3vbb-3ub5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:44.399652+00:00 Debian Importer Fixing VCID-v4ds-msgy-m3bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:42.809280+00:00 Debian Importer Fixing VCID-2cxv-ay17-4kh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:41.693892+00:00 Debian Importer Fixing VCID-v3m5-xj2s-5yef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:31.109239+00:00 Debian Importer Fixing VCID-n1tb-u9us-57bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:18.714811+00:00 Debian Importer Fixing VCID-ppyy-4rvt-gydv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:12.893016+00:00 Debian Importer Fixing VCID-f76c-qhke-3bag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:09.966309+00:00 Debian Importer Fixing VCID-bfjx-x5b3-53bg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:06.943479+00:00 Debian Importer Fixing VCID-ecc5-64vs-ekgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:02.350156+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:48.949492+00:00 Debian Importer Fixing VCID-wnh7-18vz-vbgn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:47.420043+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:43.722739+00:00 Debian Importer Fixing VCID-j9tf-d5qg-6fgq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:30.751016+00:00 Debian Importer Fixing VCID-wzkm-rtcg-cbdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:19.000401+00:00 Debian Importer Fixing VCID-3yzs-sjd2-53d7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:06.916159+00:00 Debian Importer Fixing VCID-d131-p16m-jqhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:01.137824+00:00 Debian Importer Fixing VCID-99f9-ne8p-d7c5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:53.859470+00:00 Debian Importer Fixing VCID-gqbd-ybcp-jybq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:48.693387+00:00 Debian Importer Fixing VCID-rzvj-774t-cqf8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:38.800302+00:00 Debian Importer Fixing VCID-c8t3-zakp-jqe2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:22.793002+00:00 Debian Importer Fixing VCID-rffh-vskt-b7ga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:00.767466+00:00 Debian Importer Fixing VCID-ey68-cc97-duhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:54.337267+00:00 Debian Importer Fixing VCID-kcca-um99-4ugp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:53.274530+00:00 Debian Importer Fixing VCID-9kuz-7fag-4qhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:48.161032+00:00 Debian Importer Fixing VCID-kn25-f6gk-93fd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:47.463651+00:00 Debian Importer Fixing VCID-7hxb-dbmf-nufr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:39.280867+00:00 Debian Importer Fixing VCID-366p-rhcz-8kb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:35.300315+00:00 Debian Importer Fixing VCID-fx2q-84en-qyah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:31.307101+00:00 Debian Importer Fixing VCID-kv4f-h7zy-2yhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:24.661482+00:00 Debian Importer Fixing VCID-25ja-vd4z-3ffc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:19.436535+00:00 Debian Importer Fixing VCID-4vs9-vhrd-zfgn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:10.030969+00:00 Debian Importer Fixing VCID-xqpe-25bd-vygx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:09.382556+00:00 Debian Importer Fixing VCID-xb4p-ngcu-m3by https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:08.664221+00:00 Debian Importer Fixing VCID-y5ds-5mpf-u3hz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:00.056108+00:00 Debian Importer Fixing VCID-tfg7-cn7k-ffaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:56.433967+00:00 Debian Importer Fixing VCID-m6yv-nu11-ayg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:55.466428+00:00 Debian Importer Fixing VCID-aawx-4bwq-5ubw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:52.673215+00:00 Debian Importer Fixing VCID-ug16-p9vj-57e7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:50.073511+00:00 Debian Importer Fixing VCID-z3qs-q6ce-aqbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:32.770980+00:00 Debian Importer Fixing VCID-tyvp-9xvj-7uax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:27.431386+00:00 Debian Importer Fixing VCID-8sv6-72c2-kybe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:22.291628+00:00 Debian Importer Fixing VCID-qzb2-2zd9-5kf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:20.341922+00:00 Debian Importer Fixing VCID-a6ke-6716-fker https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:36.936140+00:00 Debian Importer Fixing VCID-1ajk-6gxr-efgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:31.466212+00:00 Debian Importer Fixing VCID-htyr-jnu7-e3gf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:20.600623+00:00 Debian Importer Fixing VCID-gv7r-71cz-e3cz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:13.498269+00:00 Debian Importer Fixing VCID-c2y9-myfb-s3f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:02.611365+00:00 Debian Importer Fixing VCID-awuq-scq3-fuev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:39.721571+00:00 Debian Importer Fixing VCID-wq4h-q7vt-23ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:27.560461+00:00 Debian Importer Fixing VCID-kpyj-qqha-1udx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:24.900346+00:00 Debian Importer Fixing VCID-5v5u-d5mg-53bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:23.992212+00:00 Debian Importer Fixing VCID-z4yz-sjm9-3ke4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:14.892105+00:00 Debian Importer Fixing VCID-bcd9-e6dd-r3cf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:10.334922+00:00 Debian Importer Fixing VCID-a29y-u4f3-nkfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:06.700545+00:00 Debian Importer Fixing VCID-huh6-94c8-rkad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:06.009375+00:00 Debian Importer Fixing VCID-qyxy-uh9d-fqhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:03.639203+00:00 Debian Importer Fixing VCID-cfms-gd2h-v7gd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:56.847272+00:00 Debian Importer Fixing VCID-n127-8kq6-1kb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:53.406796+00:00 Debian Importer Fixing VCID-9dfd-an6h-67gp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:50.159075+00:00 Debian Importer Fixing VCID-ytcn-fxjj-efhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:45.930561+00:00 Debian Importer Fixing VCID-ytfc-yqtw-4yhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:32.542088+00:00 Debian Importer Fixing VCID-nwn5-d5f1-rkbr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:28.744268+00:00 Debian Importer Fixing VCID-b9uq-ggy1-eyan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:54.001475+00:00 Debian Importer Fixing VCID-ppgp-v6th-y3ar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:53.161420+00:00 Debian Importer Fixing VCID-mrh8-akgh-ybby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:34.878590+00:00 Debian Importer Fixing VCID-rbua-nn9a-kfb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:22.574568+00:00 Debian Importer Fixing VCID-c3wk-9gm2-fkeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:20.539770+00:00 Debian Importer Fixing VCID-nv6q-r1kv-c7e3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:08.963157+00:00 Debian Importer Fixing VCID-8b4z-nus3-c7h8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:56.931673+00:00 Debian Importer Fixing VCID-yr96-2nha-xbed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:44.709634+00:00 Debian Importer Fixing VCID-f2ce-pung-aqgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:08.578088+00:00 Debian Importer Fixing VCID-hu4f-e8qk-8fbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:40.517589+00:00 Debian Importer Fixing VCID-4nrq-2zch-8uct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:39.820079+00:00 Debian Importer Fixing VCID-z9yn-4b8y-t3er https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:26.656233+00:00 Debian Importer Fixing VCID-fe76-s8g9-zuar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:24.049537+00:00 Debian Importer Fixing VCID-j9s4-1dar-7qdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:13.884500+00:00 Debian Importer Fixing VCID-g75p-x4da-efdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:03.826248+00:00 Debian Importer Fixing VCID-kzsr-8hjr-gkf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:01.298240+00:00 Debian Importer Fixing VCID-a1rd-xu94-9bad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:57.650240+00:00 Debian Importer Fixing VCID-wc4k-86v7-ykh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:37.233898+00:00 Debian Importer Fixing VCID-7vdf-qwa1-ubeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:33.743924+00:00 Debian Importer Fixing VCID-bq5a-jeg3-9ua7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:19.038186+00:00 Debian Importer Fixing VCID-mtxh-7f6h-t3g4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:14.212144+00:00 Debian Importer Fixing VCID-f1r5-rt1y-jkd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:06.742522+00:00 Debian Importer Fixing VCID-p4p8-hzzp-ake1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:56.560100+00:00 Debian Importer Fixing VCID-yrgr-2c4c-3fgq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:48.830451+00:00 Debian Importer Fixing VCID-348f-73cd-37h6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:48.007098+00:00 Debian Importer Fixing VCID-wkqf-ex7a-73ft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:45.804402+00:00 Debian Importer Fixing VCID-ncy9-6whk-ckep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:44.387210+00:00 Debian Importer Fixing VCID-vfxs-5p9x-5kcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:31.617705+00:00 Debian Importer Fixing VCID-qmuk-1txu-z3da https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:24.278401+00:00 Debian Importer Fixing VCID-akq2-c6hp-tfda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:22.594649+00:00 Debian Importer Fixing VCID-nsa2-qgf5-xffq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:02.148515+00:00 Debian Importer Fixing VCID-wwax-w4gg-cuhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:46.601296+00:00 Debian Importer Fixing VCID-gvya-5wgk-j3cv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:45.770026+00:00 Debian Importer Fixing VCID-7fke-ahd3-e7ac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:32.030666+00:00 Debian Importer Fixing VCID-61t7-s6qz-mfcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:10.067083+00:00 Debian Importer Fixing VCID-jupy-x3sh-vqcp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:05.451377+00:00 Debian Importer Fixing VCID-fz9m-axm1-4kcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:58.369938+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:36.710412+00:00 Debian Importer Fixing VCID-zh6a-z135-ayeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:34.087520+00:00 Debian Importer Fixing VCID-w4u7-5ke3-57a7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:33.229745+00:00 Debian Importer Fixing VCID-1rd4-nsvv-6bfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:20.204531+00:00 Debian Importer Fixing VCID-n2t8-afcr-sffj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:11.117609+00:00 Debian Importer Fixing VCID-6c3x-q991-5uh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:07.799228+00:00 Debian Importer Fixing VCID-j87e-taah-ubbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:03.745479+00:00 Debian Importer Fixing VCID-wd2z-jnpt-3bd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:56.597920+00:00 Debian Importer Fixing VCID-c86j-dzs8-nuem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:53.398333+00:00 Debian Importer Fixing VCID-m7cd-jefr-4ydy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:50.879323+00:00 Debian Importer Fixing VCID-kpkx-qwue-bff4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:49.903264+00:00 Debian Importer Fixing VCID-93fb-qqv8-wyeb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:45.352336+00:00 Debian Importer Fixing VCID-xf8w-1v5k-nyf7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:41.748214+00:00 Debian Importer Fixing VCID-wk3t-3jvn-quf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:38.785569+00:00 Debian Importer Fixing VCID-szdg-jd74-r7g1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:31.152014+00:00 Debian Importer Fixing VCID-upcd-ngpy-ekeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:30.469118+00:00 Debian Importer Fixing VCID-1n5v-auw6-wbcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:02.774881+00:00 Debian Importer Fixing VCID-nfg3-jgk3-z7bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:58.281548+00:00 Debian Importer Fixing VCID-7gw9-7kbs-2uh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:54.775579+00:00 Debian Importer Fixing VCID-umyr-w4sv-gkgd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:46.657397+00:00 Debian Importer Fixing VCID-h5ks-h7t7-rqcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:45.795762+00:00 Debian Importer Fixing VCID-vrz9-k2a3-4uep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:38.552400+00:00 Debian Importer Fixing VCID-vmts-4etq-hqh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:27.325275+00:00 Debian Importer Fixing VCID-3pv5-s5r1-vkdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:25.098042+00:00 Debian Importer Fixing VCID-qweq-8dcb-x7eb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:20.456464+00:00 Debian Importer Fixing VCID-wstb-4k78-gufv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:04.596447+00:00 Debian Importer Fixing VCID-fsjs-fmwz-x3bd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:52.213477+00:00 Debian Importer Fixing VCID-1yba-pq6x-qkh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:46.076747+00:00 Debian Importer Fixing VCID-a8u6-m3s1-5fdx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:44.638326+00:00 Debian Importer Fixing VCID-hxj2-cvvc-tqec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:42.773264+00:00 Debian Importer Fixing VCID-k9e5-ykzu-qyew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:27.678095+00:00 Debian Importer Fixing VCID-a8cp-9ykt-xbdx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:10.205111+00:00 Debian Importer Fixing VCID-2198-cz4u-87hu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:53.215156+00:00 Debian Importer Fixing VCID-y7wh-qssq-cbg1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:43.403201+00:00 Debian Importer Fixing VCID-p4nk-v455-puaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:30.272837+00:00 Debian Importer Fixing VCID-h8sj-qvv2-rydf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:23.772671+00:00 Debian Importer Fixing VCID-gm3e-d4pv-53aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:07.449812+00:00 Debian Importer Fixing VCID-kx5p-87fs-9kgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:56.767864+00:00 Debian Importer Fixing VCID-7v4n-4x85-dygx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:51.633831+00:00 Debian Importer Fixing VCID-4t4h-a2xy-h7bg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:50.899097+00:00 Debian Importer Fixing VCID-ubuz-ts2u-ufem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:49.776816+00:00 Debian Importer Fixing VCID-susc-ysbn-eqbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:46.786039+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:28.629838+00:00 Debian Importer Fixing VCID-kkmc-f6mq-xkfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:21.716829+00:00 Debian Importer Fixing VCID-ntqj-fmmb-b3g8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:08.364243+00:00 Debian Importer Fixing VCID-9hnv-7gae-2kc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:06.406970+00:00 Debian Importer Fixing VCID-1fca-q7wb-u3cx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:59.764016+00:00 Debian Importer Fixing VCID-gcqh-ytsa-f7g1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:53.899424+00:00 Debian Importer Fixing VCID-z4xx-msk4-k7bz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:50.651027+00:00 Debian Importer Fixing VCID-mkjm-756w-5ygt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:29.253030+00:00 Debian Importer Fixing VCID-4kbk-38g4-6kb7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:26.965019+00:00 Debian Importer Fixing VCID-pk74-dafk-e3gj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:21.419910+00:00 Debian Importer Fixing VCID-ktsr-nq3s-33gt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:20.611186+00:00 Debian Importer Fixing VCID-k3bt-ws28-e3ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:48.976643+00:00 Debian Importer Fixing VCID-21fx-6crx-ske2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:46.848138+00:00 Debian Importer Fixing VCID-gr5s-rjhv-3kdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:45.640514+00:00 Debian Importer Fixing VCID-jfrf-qe3s-gbax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:39.661663+00:00 Debian Importer Fixing VCID-98mp-5h68-73eg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:31.889859+00:00 Debian Importer Fixing VCID-an5c-5rea-u3aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:13.569013+00:00 Debian Importer Fixing VCID-z423-786s-hyd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:50.145272+00:00 Debian Importer Fixing VCID-vdnv-8h83-7kfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:26.041618+00:00 Debian Importer Fixing VCID-2xhv-1gcg-y3cs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:19.224230+00:00 Debian Importer Fixing VCID-37t1-1qg2-hqc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:14.721540+00:00 Debian Importer Fixing VCID-3fpy-fq8u-r3gb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:13.896576+00:00 Debian Importer Fixing VCID-xbra-jtwd-6bhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:13.091883+00:00 Debian Importer Fixing VCID-xc83-2865-7bgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:12.172761+00:00 Debian Importer Fixing VCID-x6kd-y436-nbaw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:11.477471+00:00 Debian Importer Fixing VCID-s9mp-wsn8-cycf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:06.460706+00:00 Debian Importer Fixing VCID-kn32-aqhq-k7c5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:52.412332+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:27.901457+00:00 Debian Importer Fixing VCID-x1m4-hf24-27hq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:24.241104+00:00 Debian Importer Fixing VCID-k27q-9kcv-3fgh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:05.991417+00:00 Debian Importer Fixing VCID-hmmv-61tn-nkc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:29.265025+00:00 Debian Importer Fixing VCID-ewj3-dyq9-r7f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:28.557761+00:00 Debian Importer Fixing VCID-e9d9-jb9v-jufv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:25.919356+00:00 Debian Importer Fixing VCID-jgke-4yqg-s7g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:14.036631+00:00 Debian Importer Fixing VCID-ub6v-8wt6-5fbg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:11.091633+00:00 Debian Importer Fixing VCID-gkhm-29a6-7uc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:05.542592+00:00 Debian Importer Fixing VCID-fmjc-a468-fffw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:59.595445+00:00 Debian Importer Fixing VCID-qk2m-qzes-qfhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:54.167521+00:00 Debian Importer Fixing VCID-q3hg-ug68-cffr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:46.148260+00:00 Debian Importer Fixing VCID-gtjv-ut7g-hqhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:45.399060+00:00 Debian Importer Fixing VCID-e42z-ac66-gye3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:20.786732+00:00 Debian Importer Fixing VCID-vsyg-x46t-ayhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:18.609696+00:00 Debian Importer Fixing VCID-nv5d-ux4k-gbck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:16.123436+00:00 Debian Importer Fixing VCID-tusw-jz3p-y3d5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:13.105171+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:57.930759+00:00 Debian Importer Fixing VCID-mg8e-fpwg-rbg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:52.758012+00:00 Debian Importer Fixing VCID-4qwu-fw8y-t7et https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:47.734933+00:00 Debian Importer Fixing VCID-d1gu-5q4s-p7eq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:42.412637+00:00 Debian Importer Fixing VCID-1x2r-t2gj-akgf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:36.971135+00:00 Debian Importer Fixing VCID-xyds-k35a-2yf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:34.209032+00:00 Debian Importer Fixing VCID-m5bk-s7pe-cbd8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:30.183896+00:00 Debian Importer Fixing VCID-puhc-5h95-13ff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:28.345021+00:00 Debian Importer Fixing VCID-t9de-4jgf-wuc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:27.688745+00:00 Debian Importer Fixing VCID-pg2a-j1hc-83hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:24.640499+00:00 Debian Importer Fixing VCID-rsz5-e5fc-syh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:21.626538+00:00 Debian Importer Fixing VCID-dav4-474s-33hg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:08.474519+00:00 Debian Importer Fixing VCID-5eks-kg2z-5ye1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:56.825307+00:00 Debian Importer Fixing VCID-tt18-fh9r-57c9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:53.492890+00:00 Debian Importer Fixing VCID-rayk-m71k-pkd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:48.167226+00:00 Debian Importer Fixing VCID-ubtn-8mb7-huef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:41.751901+00:00 Debian Importer Fixing VCID-xxe5-3ae2-vygt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:38.935177+00:00 Debian Importer Fixing VCID-f5xt-m6qt-43ep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:34.720016+00:00 Debian Importer Fixing VCID-tsp7-ggzj-gud7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:11.769725+00:00 Debian Importer Fixing VCID-a1xg-dyn3-skb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:09.698837+00:00 Debian Importer Fixing VCID-a3d8-8qvy-ykdr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:08.039160+00:00 Debian Importer Fixing VCID-9tbh-mrhu-v3am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:47.668782+00:00 Debian Importer Fixing VCID-5g2a-qj5r-uub4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:43.048974+00:00 Debian Importer Fixing VCID-jfhv-6svu-x3f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:24.059408+00:00 Debian Importer Fixing VCID-vqmu-xn3y-e3gc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:22.786636+00:00 Debian Importer Fixing VCID-nsbf-fkcw-cbed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:08.733512+00:00 Debian Importer Fixing VCID-q5ky-7fqu-efcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:55.777801+00:00 Debian Importer Fixing VCID-2nz8-mxwk-dyfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:42.716297+00:00 Debian Importer Fixing VCID-a51v-ajen-u7et https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:34.795565+00:00 Debian Importer Fixing VCID-k48g-n4ka-fugh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:27.705814+00:00 Debian Importer Fixing VCID-nfcw-pgwv-37dr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:23.589678+00:00 Debian Importer Fixing VCID-d14h-dr7c-c3d9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:11.013333+00:00 Debian Importer Fixing VCID-bnbm-zhck-yfex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:01.491603+00:00 Debian Importer Fixing VCID-fvvb-p7r7-zkbk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:53.905202+00:00 Debian Importer Fixing VCID-b2kt-hmz5-yuhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:50.570781+00:00 Debian Importer Fixing VCID-e7ae-83vq-auf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:35.613787+00:00 Debian Importer Fixing VCID-c49r-knse-6bc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:31.769036+00:00 Debian Importer Fixing VCID-cjnk-7asz-zuhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:27.292386+00:00 Debian Importer Fixing VCID-7ey4-wrhk-zfce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:25.387666+00:00 Debian Importer Fixing VCID-dcd5-4y9y-euf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:24.439292+00:00 Debian Importer Fixing VCID-6cqc-um2d-1kfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:19.528115+00:00 Debian Importer Fixing VCID-v8xr-k446-8uar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:10.691686+00:00 Debian Importer Fixing VCID-e6th-hujj-6bby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:08.034302+00:00 Debian Importer Fixing VCID-yr2z-pe4g-8yhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:45.793958+00:00 Debian Importer Fixing VCID-vm3p-zgmr-13gw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:32.706600+00:00 Debian Importer Fixing VCID-rudf-s931-1qct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:26.407141+00:00 Debian Importer Fixing VCID-yq9b-dpsh-cuhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:24.313086+00:00 Debian Importer Fixing VCID-ub6v-vb3r-83eh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:14.066506+00:00 Debian Importer Fixing VCID-n4p8-dgkk-3bfr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:10.971638+00:00 Debian Importer Fixing VCID-71m1-rn5c-k3hm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:09.323380+00:00 Debian Importer Fixing VCID-qg8t-cx91-c7e3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:03.351261+00:00 Debian Importer Fixing VCID-d8tr-usd8-6yca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:57.825264+00:00 Debian Importer Fixing VCID-z711-tvkz-9qa4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:49.336108+00:00 Debian Importer Fixing VCID-4n9m-77qv-fuaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:44.598894+00:00 Debian Importer Fixing VCID-ng2z-3hcf-9uh8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:42.427640+00:00 Debian Importer Fixing VCID-uh94-5nuu-w7fd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:36.681359+00:00 Debian Importer Fixing VCID-a5tz-dm6g-zqch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:27.456531+00:00 Debian Importer Fixing VCID-c9h3-3nm5-jqcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:23.189753+00:00 Debian Importer Fixing VCID-3eb4-ca4c-5qf7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:57.985876+00:00 Debian Importer Fixing VCID-kg8v-183b-33ce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:52.139984+00:00 Debian Importer Fixing VCID-w71f-nskm-nyau https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:50.240013+00:00 Debian Importer Fixing VCID-1m9j-m8xz-zqav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:47.163057+00:00 Debian Importer Fixing VCID-n7w6-5y7w-gbcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:45.584397+00:00 Debian Importer Fixing VCID-2fsz-wcjz-9yer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:35.668002+00:00 Debian Importer Fixing VCID-gn82-9qs1-37hs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:29.264852+00:00 Debian Importer Fixing VCID-9qfp-tkn1-uqa8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:26.798282+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:19.947603+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:07.624435+00:00 Debian Importer Fixing VCID-enyv-k9c5-bfe4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:06.791909+00:00 Debian Importer Fixing VCID-ubyx-g9qc-x7dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:54.588083+00:00 Debian Importer Fixing VCID-ns6g-c2p2-myf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:38.102101+00:00 Debian Importer Fixing VCID-rup3-z1qu-j3hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:35.674348+00:00 Debian Importer Fixing VCID-z767-vnpz-37g8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:33.976420+00:00 Debian Importer Fixing VCID-w8r5-decj-vkem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:30.694426+00:00 Debian Importer Fixing VCID-1n7k-a7ve-8qcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:20.778537+00:00 Debian Importer Fixing VCID-m773-z76s-8qad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:15.092303+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:14.343468+00:00 Debian Importer Fixing VCID-5wr6-yach-7fbf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:53.462905+00:00 Debian Importer Fixing VCID-ah9v-pkq9-uqek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:47.705074+00:00 Debian Importer Fixing VCID-dfj9-5xtt-qba4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:42.956071+00:00 Debian Importer Fixing VCID-tgch-ns3e-qkhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:38.964574+00:00 Debian Importer Fixing VCID-zx9u-zu1f-gbf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:31.215939+00:00 Debian Importer Fixing VCID-mm1u-nfnt-nkaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:27.817883+00:00 Debian Importer Fixing VCID-zrf8-efng-gfd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:19.867830+00:00 Debian Importer Fixing VCID-6r4x-xaaf-b7ft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:14.875486+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:01.421040+00:00 Debian Importer Fixing VCID-jmqw-ffjj-fqb7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:53.739984+00:00 Debian Importer Fixing VCID-x226-2yqa-uuhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:45.776514+00:00 Debian Importer Fixing VCID-4wyy-uw7z-5be9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:39.828614+00:00 Debian Importer Fixing VCID-edhy-ptjn-1kbx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:35.800122+00:00 Debian Importer Fixing VCID-d2xf-68nr-rqe2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:31.327914+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:26.075278+00:00 Debian Importer Fixing VCID-f968-vrzv-8ke5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:19.025390+00:00 Debian Importer Fixing VCID-cbrz-vaxe-b3dt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:09.327163+00:00 Debian Importer Fixing VCID-g2gb-t5zm-1qb1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:51.014896+00:00 Debian Importer Fixing VCID-ex9p-euhg-aybf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:46.249345+00:00 Debian Importer Fixing VCID-qdxg-kymb-mqdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:39.191038+00:00 Debian Importer Fixing VCID-9ns9-s6pf-d7hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:37.375612+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:32.221317+00:00 Debian Importer Fixing VCID-9fn1-ytny-vke1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:29.834131+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:25.835785+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:24.825116+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:20.334895+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:15.343175+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:03.975855+00:00 Debian Importer Fixing VCID-tsfh-mjd5-cuch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:01.226736+00:00 Debian Importer Fixing VCID-wax6-n8k7-9fab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:50.766366+00:00 Debian Importer Fixing VCID-sk93-hxg5-yffv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:49.670992+00:00 Debian Importer Fixing VCID-ug5j-gaab-kuag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:44.677338+00:00 Debian Importer Fixing VCID-dtzb-vs94-3ygt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:41.187725+00:00 Debian Importer Fixing VCID-798e-hc82-7qcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:34.924233+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:33.836850+00:00 Debian Importer Fixing VCID-93jq-59ak-xygv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:28.514407+00:00 Debian Importer Fixing VCID-k29n-spa9-uqdz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:22.037175+00:00 Debian Importer Fixing VCID-rw71-ued5-jfg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:20.224465+00:00 Debian Importer Fixing VCID-ahsf-n2te-bfa2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:18.281486+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:17.203278+00:00 Debian Importer Fixing VCID-5gz4-1ysh-2qf7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:14.510364+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:11.701715+00:00 Debian Importer Fixing VCID-887n-3662-zfba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:07.013087+00:00 Debian Importer Fixing VCID-vaaz-21uq-gbc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:02.531816+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:59.882850+00:00 Debian Importer Fixing VCID-zyme-v3xf-3kah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:47.871189+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:47.113247+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:43.131587+00:00 Debian Importer Fixing VCID-g4qj-az94-83c6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:42.395199+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:35.413446+00:00 Debian Importer Fixing VCID-vysr-bztb-yugx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:28.601570+00:00 Debian Importer Fixing VCID-uzsb-9yx8-kua1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:20.515022+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:19.830471+00:00 Debian Importer Fixing VCID-vwmn-w6tb-sudq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:17.499857+00:00 Debian Importer Fixing VCID-cxtx-363a-ufhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:12.374969+00:00 Debian Importer Fixing VCID-t8we-jmxu-k3bf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:00.918795+00:00 Debian Importer Fixing VCID-bf5y-rqaa-afc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:53.114769+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:48.622310+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:42.826975+00:00 Debian Importer Fixing VCID-d8ad-6vw9-b7f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:42.079806+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:27.796354+00:00 Debian Importer Fixing VCID-hfq2-r9mw-p3cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:27.116818+00:00 Debian Importer Fixing VCID-kdf1-9mq7-2ue6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:20.603818+00:00 Debian Importer Fixing VCID-9dms-q8x2-a3em https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:18.914648+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:14.042227+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:10.767694+00:00 Debian Importer Fixing VCID-fhxv-d8du-rbgk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:51.923213+00:00 Debian Importer Fixing VCID-u58e-6ztz-5bcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:48.254449+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:26.396780+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:19.924708+00:00 Debian Importer Fixing VCID-6pmw-nqja-affb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:17.291757+00:00 Debian Importer Fixing VCID-8zy9-cpzf-q3be https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:03.346643+00:00 Debian Importer Fixing VCID-u2dn-mnr7-m3hy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:59.194213+00:00 Debian Importer Fixing VCID-nhry-edgk-sbd6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:55.919140+00:00 Debian Importer Fixing VCID-d3x6-8uek-qkgn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:53.162854+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:39.718913+00:00 Debian Importer Fixing VCID-8859-uavn-xygj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:38.792974+00:00 Debian Importer Fixing VCID-c2ee-9r7y-9qfw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:33.067487+00:00 Debian Importer Fixing VCID-aywj-7j4w-z3au https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:25.374948+00:00 Debian Importer Fixing VCID-a3yj-v3tu-d7ga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:17.965230+00:00 Debian Importer Fixing VCID-yhft-bm7y-jfde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:06.438168+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:05.123278+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:59.769659+00:00 Debian Importer Fixing VCID-v41b-jva8-u7at https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:52.316187+00:00 Debian Importer Fixing VCID-aze6-wgfm-3ycv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:47.050555+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:33.799608+00:00 Debian Importer Fixing VCID-f2u9-7eeg-e7cg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:25.756994+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:20.033751+00:00 Debian Importer Fixing VCID-yzsh-2rk2-5yhq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:13.870967+00:00 Debian Importer Fixing VCID-uem4-47we-qua4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:11.325027+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:07.181155+00:00 Debian Importer Fixing VCID-9zgh-r671-7ufw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:03.556035+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:58.072078+00:00 Debian Importer Fixing VCID-868a-udb4-qfbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:56.525764+00:00 Debian Importer Fixing VCID-j5zr-w83u-q7ds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:52.240179+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:48.248225+00:00 Debian Importer Fixing VCID-2bay-kzph-yya3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:41.627321+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:34.502135+00:00 Debian Importer Fixing VCID-gqr9-19jt-qfds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:33.455355+00:00 Debian Importer Fixing VCID-jvv4-j5x1-dbd6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:30.860592+00:00 Debian Importer Fixing VCID-r4zk-9j6t-uyhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:25.590093+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:13.089142+00:00 Debian Importer Fixing VCID-kjn8-9h7n-dfab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:12.063712+00:00 Debian Importer Fixing VCID-vrfu-1kn8-x3be https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:09.756959+00:00 Debian Importer Fixing VCID-c9br-38nh-sfg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:04.965993+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:02.283563+00:00 Debian Importer Fixing VCID-msbv-kmj8-b7e8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:00.173655+00:00 Debian Importer Fixing VCID-4ghv-w1sg-77hu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:59.396086+00:00 Debian Importer Fixing VCID-a8ja-eegd-yqhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:54.273372+00:00 Debian Importer Fixing VCID-hx57-qb6n-bfba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:50.902063+00:00 Debian Importer Fixing VCID-q2nc-hdcj-gfdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:46.435987+00:00 Debian Importer Fixing VCID-y13n-jhsr-ryd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:42.457347+00:00 Debian Importer Fixing VCID-p47c-bn8d-6ka7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:34.979456+00:00 Debian Importer Fixing VCID-stma-rnkr-c3ef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:24.979584+00:00 Debian Importer Fixing VCID-y5bm-2fr5-8bbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:10:30.847648+00:00 Debian Importer Fixing VCID-yj3z-hvs9-47hj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:03:14.841706+00:00 Debian Importer Fixing VCID-kn32-aqhq-k7c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:55:34.230450+00:00 Debian Importer Fixing VCID-1kgs-19ue-wbe1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:54:57.366648+00:00 Debian Importer Fixing VCID-v9bm-48ec-9fc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:23.552640+00:00 Debian Importer Fixing VCID-dwes-ct77-juc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:32.597600+00:00 Debian Importer Fixing VCID-sqf7-4e8r-7ken https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:05.299084+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:02.108623+00:00 Debian Importer Fixing VCID-kdmz-w6db-7ue2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:47.452101+00:00 Debian Importer Fixing VCID-qweq-8dcb-x7eb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:00.802931+00:00 Debian Importer Fixing VCID-9jq2-6zek-rqh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:48.115916+00:00 Debian Importer Fixing VCID-uzfu-ke47-1qaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:51.779808+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:12.948700+00:00 Debian Importer Fixing VCID-995q-6nn5-ykgg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:59.562529+00:00 Debian Importer Fixing VCID-q7ty-xfyp-cbff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:45.651005+00:00 Debian Importer Fixing VCID-m995-b8rn-tkgk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:09.896915+00:00 Debian Importer Fixing VCID-pepq-cqcb-dkdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:31:12.059783+00:00 Debian Importer Fixing VCID-buyh-2d37-rqb1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:14.579473+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:54.068730+00:00 Debian Importer Fixing VCID-ex8u-z3r8-cycq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:33.325025+00:00 Debian Importer Fixing VCID-8qua-yr2x-s7fd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:50.275434+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:00.039021+00:00 Debian Importer Fixing VCID-xxe5-3ae2-vygt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:56.016978+00:00 Debian Importer Fixing VCID-7v66-8w2u-duf9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:24.542112+00:00 Debian Importer Fixing VCID-p31e-jzac-8kbe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:03.427750+00:00 Debian Importer Fixing VCID-f2m2-u9j3-3ba9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:02.490037+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:19:51.312826+00:00 Debian Importer Fixing VCID-h31q-rcq3-7ud3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:52.666524+00:00 Debian Importer Fixing VCID-sm3v-84rs-nyem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:31.177430+00:00 Debian Importer Fixing VCID-psqs-wgmf-57d8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:01.108332+00:00 Debian Importer Fixing VCID-g34c-hwct-tqb1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:16:51.986995+00:00 Debian Importer Fixing VCID-e1pe-znzp-jqhx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:47.222319+00:00 Debian Importer Fixing VCID-82f7-2axv-jbbf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:55.389905+00:00 Debian Importer Fixing VCID-jz2j-4jqz-8fdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:18.909789+00:00 Debian Importer Fixing VCID-ed3p-sm1w-33am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:46.109900+00:00 Debian Importer Fixing VCID-3d8r-1n1k-skff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:40.620557+00:00 Debian Importer Fixing VCID-3jmx-jfhk-yqh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:19.064111+00:00 Debian Importer Fixing VCID-xf8w-1v5k-nyf7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:20.267433+00:00 Debian Importer Fixing VCID-v3ba-uvsy-ybfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:19.858888+00:00 Debian Importer Fixing VCID-mu3y-rdt2-x3g1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:59.257843+00:00 Debian Importer Fixing VCID-ya16-qrwm-kkfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:56.973440+00:00 Debian Importer Fixing VCID-kpyj-qqha-1udx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:28.174521+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:00.149185+00:00 Debian Importer Fixing VCID-9axt-c2hy-63eb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:23.476656+00:00 Debian Importer Fixing VCID-2xhv-1gcg-y3cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:06.189745+00:00 Debian Importer Fixing VCID-cvcu-khre-3bc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:01.325687+00:00 Debian Importer Fixing VCID-p9x5-syxd-fufc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:29.984993+00:00 Debian Importer Fixing VCID-x1m4-hf24-27hq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:04:06.460601+00:00 Debian Importer Fixing VCID-m8n7-j86u-7ugj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:51.752194+00:00 Debian Importer Fixing VCID-jbs2-t7yr-rqh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:44.106586+00:00 Debian Importer Fixing VCID-vxys-jj3n-n7gz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:24.326446+00:00 Debian Importer Fixing VCID-kkmc-f6mq-xkfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:16.963069+00:00 Debian Importer Fixing VCID-ddm7-5p27-3khg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:59.174186+00:00 Debian Importer Fixing VCID-rjdd-dk1r-subd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:12.625130+00:00 Debian Importer Fixing VCID-aj3p-9trr-87cz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:54.582523+00:00 Debian Importer Fixing VCID-3p2d-np1n-p3gv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:39.405506+00:00 Debian Importer Fixing VCID-d131-p16m-jqhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:19.698200+00:00 Debian Importer Fixing VCID-6jzb-qp5p-47ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:54.916783+00:00 Debian Importer Fixing VCID-kns4-65da-v3bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:38.369017+00:00 Debian Importer Fixing VCID-nnnt-9vn7-rfc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:26.220555+00:00 Debian Importer Fixing VCID-sy3c-f5q7-qygm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:59.549402+00:00 Debian Importer Fixing VCID-31hs-1pwx-7uak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:55.387732+00:00 Debian Importer Fixing VCID-skjn-kete-x7e1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:47.043959+00:00 Debian Importer Fixing VCID-47k1-5vw2-97hy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:45.903309+00:00 Debian Importer Fixing VCID-awuq-scq3-fuev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:47.929320+00:00 Debian Importer Fixing VCID-45qm-naju-pycn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:38.406192+00:00 Debian Importer Fixing VCID-jxkv-jbh3-9fhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:28.588232+00:00 Debian Importer Fixing VCID-zvp5-zhsh-9qap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:44.852737+00:00 Debian Importer Fixing VCID-fqzh-sckm-a3ff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:39.810813+00:00 Debian Importer Fixing VCID-kvbv-df49-gyaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:37.882232+00:00 Debian Importer Fixing VCID-np3t-m158-k7he https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:05.716118+00:00 Debian Importer Fixing VCID-j87e-taah-ubbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:33.130482+00:00 Debian Importer Fixing VCID-h7pm-dyef-1fan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:21.302610+00:00 Debian Importer Fixing VCID-7892-zv3s-xqhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:09.223859+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:32.045931+00:00 Debian Importer Fixing VCID-z24p-wtzg-a3gh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:22.563107+00:00 Debian Importer Fixing VCID-d14h-dr7c-c3d9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:26.764454+00:00 Debian Importer Fixing VCID-zxmw-r6pn-6fdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:17.260033+00:00 Debian Importer Fixing VCID-j7c3-n2w7-fbg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:07.495829+00:00 Debian Importer Fixing VCID-c8qb-kbef-8qg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:05.188930+00:00 Debian Importer Fixing VCID-xdde-euh1-dqfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:45.950386+00:00 Debian Importer Fixing VCID-gkap-5jhj-tbff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:32.217817+00:00 Debian Importer Fixing VCID-padk-1w3h-7bfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:17.117144+00:00 Debian Importer Fixing VCID-qxd4-7ack-dkaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:38.639076+00:00 Debian Importer Fixing VCID-v2rb-s1g7-1ub4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:47.708859+00:00 Debian Importer Fixing VCID-qucs-qaj4-q7cf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:43.010891+00:00 Debian Importer Fixing VCID-y3wu-za9p-yub1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:21.391441+00:00 Debian Importer Fixing VCID-qyu2-kw7b-1kg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:23.064034+00:00 Debian Importer Fixing VCID-5yp2-meun-zbas https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:31.499313+00:00 Debian Importer Fixing VCID-2wmk-4bjz-bbhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:35.775989+00:00 Debian Importer Fixing VCID-uhng-dru9-7yht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:33.575486+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:26.635831+00:00 Debian Importer Fixing VCID-6n32-z9u6-gfch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:55.894953+00:00 Debian Importer Fixing VCID-khrd-ya2n-rygv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:29.593812+00:00 Debian Importer Fixing VCID-qffu-7n92-bbhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:21.364022+00:00 Debian Importer Fixing VCID-6r1j-pnmx-mkdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:10.427980+00:00 Debian Importer Fixing VCID-vmvf-81ex-yug4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:06.926877+00:00 Debian Importer Fixing VCID-rwfc-mzfg-akft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:55.845450+00:00 Debian Importer Fixing VCID-g2gb-t5zm-1qb1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:25.044622+00:00 Debian Importer Fixing VCID-ah9v-pkq9-uqek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:37.335932+00:00 Debian Importer Fixing VCID-bg8h-jw13-8yhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:18.263170+00:00 Debian Importer Fixing VCID-drqe-npyk-5yfa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:57.537402+00:00 Debian Importer Fixing VCID-jx72-vpup-p3gk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:42.226958+00:00 Debian Importer Fixing VCID-kv4f-h7zy-2yhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:27.747614+00:00 Debian Importer Fixing VCID-vmts-4etq-hqh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:28.316511+00:00 Debian Importer Fixing VCID-fhme-yjgr-suep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:19.546328+00:00 Debian Importer Fixing VCID-9zxp-tyb1-ubg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:54.122705+00:00 Debian Importer Fixing VCID-nbnz-q819-f7g8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:44.624735+00:00 Debian Importer Fixing VCID-kgv3-f25s-ckd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:41.735963+00:00 Debian Importer Fixing VCID-t2sv-vqq2-q7av https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:10.568829+00:00 Debian Importer Fixing VCID-vz1n-7fbk-kyag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:57.746535+00:00 Debian Importer Fixing VCID-e42z-ac66-gye3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:39.787738+00:00 Debian Importer Fixing VCID-9m2t-y1zb-hfar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:47.689646+00:00 Debian Importer Fixing VCID-5gv4-c26w-gube https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:23.074407+00:00 Debian Importer Fixing VCID-b9uq-ggy1-eyan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:45.799844+00:00 Debian Importer Fixing VCID-x226-2yqa-uuhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:40.873692+00:00 Debian Importer Fixing VCID-bcd9-e6dd-r3cf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:38.113404+00:00 Debian Importer Fixing VCID-3ktq-cbhp-8fhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:31.564347+00:00 Debian Importer Fixing VCID-qjqb-cqc9-17e1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:29.180039+00:00 Debian Importer Fixing VCID-b1an-t4b8-4bd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:46.610161+00:00 Debian Importer Fixing VCID-w53c-hafw-6kbb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:24.114757+00:00 Debian Importer Fixing VCID-wjeh-m3f2-tkbg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:11.589027+00:00 Debian Importer Fixing VCID-j8yy-3tn1-63b5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:55.479605+00:00 Debian Importer Fixing VCID-tc63-4q6e-nker https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:37.396404+00:00 Debian Importer Fixing VCID-mgjc-55mm-kffq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:15.335382+00:00 Debian Importer Fixing VCID-c8xs-q7hr-uua8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:32.532664+00:00 Debian Importer Fixing VCID-vtwb-e5mq-6bgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:21.647225+00:00 Debian Importer Fixing VCID-hjf7-23wz-1qeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:17.212440+00:00 Debian Importer Fixing VCID-k1eg-sz6t-skg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:55.936032+00:00 Debian Importer Fixing VCID-1rd4-nsvv-6bfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:48.156086+00:00 Debian Importer Fixing VCID-xs4a-ha3z-2bej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:01.712401+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:34.768923+00:00 Debian Importer Fixing VCID-kj4q-41ch-2bdx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:33.235025+00:00 Debian Importer Fixing VCID-6pmw-nqja-affb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:20.022423+00:00 Debian Importer Fixing VCID-abcd-nfuq-2kc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:50.215083+00:00 Debian Importer Fixing VCID-w1sf-m294-jke8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:30.977579+00:00 Debian Importer Fixing VCID-ete6-ycnw-7kgg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:03.680893+00:00 Debian Importer Fixing VCID-dcd5-4y9y-euf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:54.817791+00:00 Debian Importer Fixing VCID-72pd-9p33-9qhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:36.977775+00:00 Debian Importer Fixing VCID-k1v3-945q-47eh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:13.345867+00:00 Debian Importer Fixing VCID-zufu-pwxh-eqbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:44.252690+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:28.682322+00:00 Debian Importer Fixing VCID-7ejt-hdra-93ez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:27.108185+00:00 Debian Importer Fixing VCID-zs1j-hpbv-7qbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:25.430304+00:00 Debian Importer Fixing VCID-y6kc-guf2-bqdz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:15.533557+00:00 Debian Importer Fixing VCID-8e38-5bq1-8be9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:01.222235+00:00 Debian Importer Fixing VCID-4bsb-hypz-5bav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:53.616543+00:00 Debian Importer Fixing VCID-brwq-qcbd-c3ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:52.464752+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:49.391435+00:00 Debian Importer Fixing VCID-98y4-8sve-mfbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:25.517041+00:00 Debian Importer Fixing VCID-6hf1-vsj3-a3h5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:23.996522+00:00 Debian Importer Fixing VCID-8xdj-ys7r-rffm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:53.497418+00:00 Debian Importer Fixing VCID-ky32-n1qj-nydf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:10.693164+00:00 Debian Importer Fixing VCID-3yg6-7zfv-gkaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:01.054677+00:00 Debian Importer Fixing VCID-czue-c27z-bkgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:33.657532+00:00 Debian Importer Fixing VCID-fufn-uqtv-wkas https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:32.817489+00:00 Debian Importer Fixing VCID-es8r-wvmz-gfe6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:47.849420+00:00 Debian Importer Fixing VCID-d4u6-bzuu-dubz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:47.080907+00:00 Debian Importer Fixing VCID-sq9c-y7kc-1yga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:11.274324+00:00 Debian Importer Fixing VCID-d5cu-m235-x3gr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:52.885311+00:00 Debian Importer Fixing VCID-ba6k-mvxj-8udm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:37.185989+00:00 Debian Importer Fixing VCID-mp87-833h-4uag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:30.212890+00:00 Debian Importer Fixing VCID-xd76-s5yw-fyaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:12.749389+00:00 Debian Importer Fixing VCID-dp4x-6duw-8yeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:59.233227+00:00 Debian Importer Fixing VCID-6syp-3js8-qudn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:16.620661+00:00 Debian Importer Fixing VCID-4fhj-v5ut-eubv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:39.595416+00:00 Debian Importer Fixing VCID-2s7e-4bym-cbe1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:20.552920+00:00 Debian Importer Fixing VCID-8q49-pygk-33d1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:18.568498+00:00 Debian Importer Fixing VCID-p1cz-e94f-57c2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:02.599428+00:00 Debian Importer Fixing VCID-61t7-s6qz-mfcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:52.258622+00:00 Debian Importer Fixing VCID-m35k-ahnu-abh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:18.707810+00:00 Debian Importer Fixing VCID-c8t3-zakp-jqe2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:58.071604+00:00 Debian Importer Fixing VCID-4qx6-ysye-efhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:29.718752+00:00 Debian Importer Fixing VCID-214g-9hfm-wqbk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:09.296225+00:00 Debian Importer Fixing VCID-4eg9-yh2g-a7gc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:56.428124+00:00 Debian Importer Fixing VCID-1g53-791b-8fd7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:42.089091+00:00 Debian Importer Fixing VCID-d1ke-rn87-f7ec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:13.847733+00:00 Debian Importer Fixing VCID-xh6y-ja9y-u3es https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:52.101266+00:00 Debian Importer Fixing VCID-g7k7-e2h7-a7f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:49.469309+00:00 Debian Importer Fixing VCID-cs7h-d7vk-73ab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:34.682729+00:00 Debian Importer Fixing VCID-ahvx-mjgn-5fa8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:22.184608+00:00 Debian Importer Fixing VCID-cvw6-a674-zfa9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:56.324828+00:00 Debian Importer Fixing VCID-g162-81ms-93g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:29.910552+00:00 Debian Importer Fixing VCID-syxu-a4az-qfe4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:14.513800+00:00 Debian Importer Fixing VCID-wd2z-jnpt-3bd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:40.481065+00:00 Debian Importer Fixing VCID-emdc-7k4g-67e5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:39.684629+00:00 Debian Importer Fixing VCID-v1ka-ynm7-q3cw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:19.383383+00:00 Debian Importer Fixing VCID-q7a3-cm2m-ayga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:16.334435+00:00 Debian Importer Fixing VCID-9sm6-shj5-cqh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:14.620689+00:00 Debian Importer Fixing VCID-ezwh-qc41-pugn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:01.274520+00:00 Debian Importer Fixing VCID-5ehk-s7ww-vfc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:58.687585+00:00 Debian Importer Fixing VCID-a7fz-5z23-17ey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:50.140291+00:00 Debian Importer Fixing VCID-b51x-3ss2-67ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:47.426269+00:00 Debian Importer Fixing VCID-qje4-3svy-5kg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:38.862801+00:00 Debian Importer Fixing VCID-bens-aw9k-xka2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:26.903757+00:00 Debian Importer Fixing VCID-yeww-6ybr-qye8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:00.315312+00:00 Debian Importer Fixing VCID-nr6b-wdnx-k7e6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:38.517446+00:00 Debian Importer Fixing VCID-ypt7-tc1u-p3ev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:30.288827+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:09.783612+00:00 Debian Importer Fixing VCID-tusw-jz3p-y3d5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:04.719022+00:00 Debian Importer Fixing VCID-25nt-fa4m-97fm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:42.235983+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:37.421042+00:00 Debian Importer Fixing VCID-d9ty-7748-33a7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:03.206115+00:00 Debian Importer Fixing VCID-21z5-p9ct-p7g2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:01.021845+00:00 Debian Importer Fixing VCID-hv12-tgt6-rub5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:56.239501+00:00 Debian Importer Fixing VCID-gvya-5wgk-j3cv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:31.036184+00:00 Debian Importer Fixing VCID-qjup-fvr1-xybc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:22.450285+00:00 Debian Importer Fixing VCID-mjbb-q1nx-8fgj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:55.725761+00:00 Debian Importer Fixing VCID-xhfy-gkwq-afbr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:44.268202+00:00 Debian Importer Fixing VCID-rkqz-erqh-dfh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:37.875334+00:00 Debian Importer Fixing VCID-wvp8-cst3-cuhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:32.392477+00:00 Debian Importer Fixing VCID-tspb-2q9s-u3d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:44.725181+00:00 Debian Importer Fixing VCID-dyun-rd3c-rke6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:34.144535+00:00 Debian Importer Fixing VCID-qxth-4ftd-s3ac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:29.561887+00:00 Debian Importer Fixing VCID-7r8h-rr9v-7qht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:12.016550+00:00 Debian Importer Fixing VCID-bq18-jcph-kkhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:08.236338+00:00 Debian Importer Fixing VCID-y13n-jhsr-ryd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:53.648684+00:00 Debian Importer Fixing VCID-38ja-dsj5-qyfc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:49.119270+00:00 Debian Importer Fixing VCID-nw3c-5apn-zfhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:43.344736+00:00 Debian Importer Fixing VCID-4399-j8sn-t3b1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:23.634484+00:00 Debian Importer Fixing VCID-2vqp-wpcw-pfbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:17.177627+00:00 Debian Importer Fixing VCID-dzye-v1vd-gybq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:13.932623+00:00 Debian Importer Fixing VCID-t5z7-w31u-j7gs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:38.681982+00:00 Debian Importer Fixing VCID-ppyy-4rvt-gydv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:29.452426+00:00 Debian Importer Fixing VCID-341t-wy9a-p7fz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:13.216976+00:00 Debian Importer Fixing VCID-v2y7-vmt3-w3dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:05.569970+00:00 Debian Importer Fixing VCID-t644-dxrr-2qhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:49.998491+00:00 Debian Importer Fixing VCID-e495-c57w-tkft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:45.421479+00:00 Debian Importer Fixing VCID-zamd-w45x-e3g5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:41.498295+00:00 Debian Importer Fixing VCID-1hvg-tmga-nfhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:28.087641+00:00 Debian Importer Fixing VCID-p472-z1xz-r3cj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:23.264250+00:00 Debian Importer Fixing VCID-6ejs-59g2-xkgg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:19.324938+00:00 Debian Importer Fixing VCID-p72b-szhh-wyd6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:16.687310+00:00 Debian Importer Fixing VCID-y439-52f2-rfck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:13.249533+00:00 Debian Importer Fixing VCID-vck1-emav-93gc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:27.178179+00:00 Debian Importer Fixing VCID-rq73-h79m-hqhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:14.018465+00:00 Debian Importer Fixing VCID-jgaw-mgbm-sfaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:36.715066+00:00 Debian Importer Fixing VCID-4mqx-42ea-53c3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:24.457811+00:00 Debian Importer Fixing VCID-8ssr-76q5-6kf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:55.067226+00:00 Debian Importer Fixing VCID-bq5a-jeg3-9ua7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:26.894657+00:00 Debian Importer Fixing VCID-u8gh-ber8-q3dw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:15.440590+00:00 Debian Importer Fixing VCID-m7cd-jefr-4ydy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:45.596568+00:00 Debian Importer Fixing VCID-1dxt-yy4z-y7cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:39.730581+00:00 Debian Importer Fixing VCID-3pv5-s5r1-vkdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:09.346973+00:00 Debian Importer Fixing VCID-vz73-y2va-5kbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:01.459427+00:00 Debian Importer Fixing VCID-9axb-sz3w-ubcx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:55.521087+00:00 Debian Importer Fixing VCID-7hpf-k162-1ubu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:46.135498+00:00 Debian Importer Fixing VCID-6hur-ug1s-83am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:39.860266+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:38.175430+00:00 Debian Importer Fixing VCID-qwre-yeev-uya8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:35.628853+00:00 Debian Importer Fixing VCID-eetb-e929-77bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:01.786378+00:00 Debian Importer Fixing VCID-t5y5-2hne-7keh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:46.484041+00:00 Debian Importer Fixing VCID-c86j-dzs8-nuem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:45.740501+00:00 Debian Importer Fixing VCID-5j3a-r6pk-2kdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:47.438116+00:00 Debian Importer Fixing VCID-687u-nzmt-n7a6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:28.240853+00:00 Debian Importer Fixing VCID-esup-2y63-afa4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:14.800151+00:00 Debian Importer Fixing VCID-e57d-cw7e-73an https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:06.011149+00:00 Debian Importer Fixing VCID-v4ds-msgy-m3bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:56.506949+00:00 Debian Importer Fixing VCID-xncx-nvr7-k7d8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:39.925287+00:00 Debian Importer Fixing VCID-9cuj-t2sc-bbdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:31.400052+00:00 Debian Importer Fixing VCID-b4ct-fnbp-43a3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:24.116388+00:00 Debian Importer Fixing VCID-yr2z-pe4g-8yhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:23.421018+00:00 Debian Importer Fixing VCID-3a8a-ns8q-wbgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:21.910427+00:00 Debian Importer Fixing VCID-yf6e-3aw3-tqeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:12.030890+00:00 Debian Importer Fixing VCID-kptu-sm1d-kuae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:10.571603+00:00 Debian Importer Fixing VCID-92j7-p476-97ca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:57.910576+00:00 Debian Importer Fixing VCID-33re-7rh6-2bg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:44.619268+00:00 Debian Importer Fixing VCID-asy4-m48b-xydu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:36.960001+00:00 Debian Importer Fixing VCID-hucp-gu2u-97e1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:33.704952+00:00 Debian Importer Fixing VCID-ds3w-wph8-7kam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:27.329737+00:00 Debian Importer Fixing VCID-8d9a-bf6e-dkga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:18.202788+00:00 Debian Importer Fixing VCID-k68k-tnns-mkga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:13.239480+00:00 Debian Importer Fixing VCID-724j-jc6b-5uba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:56.998615+00:00 Debian Importer Fixing VCID-1zbm-pnj5-xqb4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:52.029560+00:00 Debian Importer Fixing VCID-9qhe-6xhk-hfhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:18.500530+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:05.247286+00:00 Debian Importer Fixing VCID-w4d7-nppw-pye9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:00.734246+00:00 Debian Importer Fixing VCID-x245-d866-nkff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:42.386127+00:00 Debian Importer Fixing VCID-2cux-cw1j-43hw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:30.241748+00:00 Debian Importer Fixing VCID-5zuy-q1p8-hqex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:09.149911+00:00 Debian Importer Fixing VCID-mzw8-vbmv-6yay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:01.993500+00:00 Debian Importer Fixing VCID-sne8-13hq-mqan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:59.547463+00:00 Debian Importer Fixing VCID-upcd-ngpy-ekeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:58.791501+00:00 Debian Importer Fixing VCID-kbc5-2ek1-gfbd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:51.085175+00:00 Debian Importer Fixing VCID-kn25-f6gk-93fd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:33.366360+00:00 Debian Importer Fixing VCID-s5k9-u1uk-3be8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:31.757577+00:00 Debian Importer Fixing VCID-gyzx-musu-83c4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:17.624699+00:00 Debian Importer Fixing VCID-3aa5-4rp5-g7h3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:01.337060+00:00 Debian Importer Fixing VCID-p4nk-v455-puaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:36.858797+00:00 Debian Importer Fixing VCID-nrff-k45r-y7bj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:24.477424+00:00 Debian Importer Fixing VCID-v9p4-t339-t3g4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:17.427377+00:00 Debian Importer Fixing VCID-xbra-jtwd-6bhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:09.049356+00:00 Debian Importer Fixing VCID-6tb9-nnj3-57gv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:07.497356+00:00 Debian Importer Fixing VCID-mt8z-wdzf-kugb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:02.857529+00:00 Debian Importer Fixing VCID-pnfa-xm28-w3bk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:00.249278+00:00 Debian Importer Fixing VCID-5nsy-fndc-7ka8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:54.393086+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:49.038916+00:00 Debian Importer Fixing VCID-cecv-w1gr-qkbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:30.571061+00:00 Debian Importer Fixing VCID-rsz5-e5fc-syh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:26.807300+00:00 Debian Importer Fixing VCID-fvhu-1xqw-fkbk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:25.317215+00:00 Debian Importer Fixing VCID-jbyd-zxvz-mkf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:16.253832+00:00 Debian Importer Fixing VCID-cwnm-um2n-17cw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:15.066378+00:00 Debian Importer Fixing VCID-e4jw-y3k8-r7ec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:07.050141+00:00 Debian Importer Fixing VCID-yp8m-zttt-ffdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:06.294353+00:00 Debian Importer Fixing VCID-sv8j-57vx-9ubs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:54.065595+00:00 Debian Importer Fixing VCID-apfq-mqch-jkgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:44.085030+00:00 Debian Importer Fixing VCID-tb3q-ndrt-mkg3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:30.209126+00:00 Debian Importer Fixing VCID-rup3-z1qu-j3hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:29.353989+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:19.239851+00:00 Debian Importer Fixing VCID-16bv-9gad-pkat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:12.241989+00:00 Debian Importer Fixing VCID-ttde-y49k-eqdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:10.319048+00:00 Debian Importer Fixing VCID-mkw6-9tye-x3fb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:05.680809+00:00 Debian Importer Fixing VCID-3vk2-4sx1-aybu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:03.156297+00:00 Debian Importer Fixing VCID-hwat-fnmq-vydn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:00.034257+00:00 Debian Importer Fixing VCID-xag6-3jdm-bqha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:50.323624+00:00 Debian Importer Fixing VCID-94kq-ycmm-3bgn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:46.711429+00:00 Debian Importer Fixing VCID-f3sv-pbfs-cqcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:45.829669+00:00 Debian Importer Fixing VCID-etb2-844u-jfdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:43.233635+00:00 Debian Importer Fixing VCID-9tb7-5mp1-pkhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:41.882262+00:00 Debian Importer Fixing VCID-fhxv-d8du-rbgk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:39.360000+00:00 Debian Importer Fixing VCID-wkqf-ex7a-73ft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:37.955604+00:00 Debian Importer Fixing VCID-vaaz-21uq-gbc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:36.908786+00:00 Debian Importer Fixing VCID-bkp8-m2yc-qub7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:17.759118+00:00 Debian Importer Fixing VCID-sdwv-6ycc-9ubh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:17.019562+00:00 Debian Importer Fixing VCID-d83g-5tdr-7fd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:15.607191+00:00 Debian Importer Fixing VCID-ucab-wj54-hyey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:12.288865+00:00 Debian Importer Fixing VCID-qdxg-kymb-mqdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:59.807428+00:00 Debian Importer Fixing VCID-tnur-avf1-sybe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:55.937783+00:00 Debian Importer Fixing VCID-n8y5-74xq-f7ft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:48.240386+00:00 Debian Importer Fixing VCID-2kan-b4em-f3fg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:47.094957+00:00 Debian Importer Fixing VCID-fvam-jks7-jkbt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:43.150166+00:00 Debian Importer Fixing VCID-exkc-gh4x-p3bh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:32.992865+00:00 Debian Importer Fixing VCID-dda8-c6rr-sqgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:30.391459+00:00 Debian Importer Fixing VCID-cp52-z8dw-gfhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:25.010991+00:00 Debian Importer Fixing VCID-2369-8134-y3ck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:53.575715+00:00 Debian Importer Fixing VCID-v41b-jva8-u7at https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:49.687334+00:00 Debian Importer Fixing VCID-9sqm-1ubb-zqhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:19.556172+00:00 Debian Importer Fixing VCID-2kk2-cj4m-6ucm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:12.955787+00:00 Debian Importer Fixing VCID-82py-ut98-qfb3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:59.053113+00:00 Debian Importer Fixing VCID-xxhg-up2k-yyhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:43.678106+00:00 Debian Importer Fixing VCID-ex4p-ftap-h7fe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:35.966852+00:00 Debian Importer Fixing VCID-gtzq-1g5y-tkh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:05.824924+00:00 Debian Importer Fixing VCID-rxej-y11f-tbca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:55.004776+00:00 Debian Importer Fixing VCID-r99q-4cst-dbem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:42.389217+00:00 Debian Importer Fixing VCID-z18v-yptf-7fhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:39.300330+00:00 Debian Importer Fixing VCID-87gw-ezjs-cqcs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:20.082610+00:00 Debian Importer Fixing VCID-4s4m-bf1u-tyht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:14.193580+00:00 Debian Importer Fixing VCID-8ud8-f75a-jyew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:02.608459+00:00 Debian Importer Fixing VCID-4vs9-vhrd-zfgn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:50.800911+00:00 Debian Importer Fixing VCID-17tu-a4wu-b3hv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:48.495912+00:00 Debian Importer Fixing VCID-a89e-bca3-1qfg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:38.271492+00:00 Debian Importer Fixing VCID-st59-ndz1-1yc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:37.220536+00:00 Debian Importer Fixing VCID-j843-2qbk-tkcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:34.232430+00:00 Debian Importer Fixing VCID-94ha-pwzk-dbdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:26.657815+00:00 Debian Importer Fixing VCID-qa1s-pr21-cycs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:19.818394+00:00 Debian Importer Fixing VCID-rjuh-7kkv-3qch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:18.155619+00:00 Debian Importer Fixing VCID-p6sm-vcng-mubd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:11.839207+00:00 Debian Importer Fixing VCID-n5aj-87mh-hbbd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:27:39.033001+00:00 Debian Importer Fixing VCID-kcca-um99-4ugp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:27:16.552898+00:00 Debian Importer Fixing VCID-5hrr-xvrw-ebd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:24:42.551470+00:00 Debian Importer Fixing VCID-h7tb-d7q2-pqcr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:24:30.266941+00:00 Debian Importer Fixing VCID-exhn-kypt-2fbd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:24:23.749461+00:00 Debian Importer Fixing VCID-73mg-3qys-3ubr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:24:00.964105+00:00 Debian Importer Fixing VCID-9azr-qrcs-k7by https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:55.590213+00:00 Debian Importer Fixing VCID-vt3e-tx5j-b7aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:48.015265+00:00 Debian Importer Fixing VCID-ehtx-jr8g-vbgb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:41.828554+00:00 Debian Importer Fixing VCID-mmsk-j6bt-wuh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:33.336644+00:00 Debian Importer Fixing VCID-e2vy-prvw-xkhq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:32.450571+00:00 Debian Importer Fixing VCID-u6nn-wr8u-qqdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:29.524212+00:00 Debian Importer Fixing VCID-eyg8-qhra-ukcj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:23:21.556407+00:00 Debian Importer Fixing VCID-n7kt-3rsy-rkg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:22:15.207215+00:00 Debian Importer Fixing VCID-9n5j-cp2p-qkhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:22:02.662208+00:00 Debian Importer Fixing VCID-9qfp-tkn1-uqa8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:21:45.414646+00:00 Debian Importer Fixing VCID-8edx-kmgw-jue5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:21:19.623409+00:00 Debian Importer Fixing VCID-21jy-g45u-c7gp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:19:56.387313+00:00 Debian Importer Fixing VCID-64g2-43qf-5qg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:19:50.788217+00:00 Debian Importer Fixing VCID-dav4-474s-33hg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:19:43.907529+00:00 Debian Importer Fixing VCID-a8ja-eegd-yqhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:19:14.535580+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:19:01.146594+00:00 Debian Importer Fixing VCID-kye7-8mwh-eyc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:18:56.229508+00:00 Debian Importer Fixing VCID-wxx7-3a43-h7gh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:18:44.854462+00:00 Debian Importer Fixing VCID-dqe1-cf2v-myes https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:17:51.422913+00:00 Debian Importer Fixing VCID-rdch-b3ck-qugc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:17:16.425915+00:00 Debian Importer Fixing VCID-vrz9-k2a3-4uep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:16:51.643180+00:00 Debian Importer Fixing VCID-hbzk-b7gn-9bgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:16:09.953057+00:00 Debian Importer Fixing VCID-8bmx-4nbw-6qcn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:48.436803+00:00 Debian Importer Fixing VCID-pbby-yjrv-23hc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:37.444953+00:00 Debian Importer Fixing VCID-2cxv-ay17-4kh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:28.332550+00:00 Debian Importer Fixing VCID-n1tb-u9us-57bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:13:14.814654+00:00 Debian Importer Fixing VCID-f76c-qhke-3bag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:12:55.739702+00:00 Debian Importer Fixing VCID-wnh7-18vz-vbgn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:12:32.629102+00:00 Debian Importer Fixing VCID-3yzs-sjd2-53d7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:12:07.951980+00:00 Debian Importer Fixing VCID-rzvj-774t-cqf8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:10:37.885021+00:00 Debian Importer Fixing VCID-aawx-4bwq-5ubw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:10:35.502286+00:00 Debian Importer Fixing VCID-ug16-p9vj-57e7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:10:20.090806+00:00 Debian Importer Fixing VCID-tyvp-9xvj-7uax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:10:16.089083+00:00 Debian Importer Fixing VCID-8sv6-72c2-kybe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:08:25.165897+00:00 Debian Importer Fixing VCID-huh6-94c8-rkad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:08:17.161876+00:00 Debian Importer Fixing VCID-n127-8kq6-1kb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:08:14.473988+00:00 Debian Importer Fixing VCID-9dfd-an6h-67gp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:07:58.368314+00:00 Debian Importer Fixing VCID-nwn5-d5f1-rkbr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:07:30.909265+00:00 Debian Importer Fixing VCID-mrh8-akgh-ybby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:06:58.513112+00:00 Debian Importer Fixing VCID-8b4z-nus3-c7h8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:06:48.634273+00:00 Debian Importer Fixing VCID-yr96-2nha-xbed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:06:39.119544+00:00 Debian Importer Fixing VCID-f2ce-pung-aqgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:05:52.317779+00:00 Debian Importer Fixing VCID-z9yn-4b8y-t3er https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:05:03.358021+00:00 Debian Importer Fixing VCID-7vdf-qwa1-ubeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:04:57.732266+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:04:54.646316+00:00 Debian Importer Fixing VCID-nfcw-pgwv-37dr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:04:46.159725+00:00 Debian Importer Fixing VCID-f1r5-rt1y-jkd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:04:25.011085+00:00 Debian Importer Fixing VCID-348f-73cd-37h6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:03:08.743785+00:00 Debian Importer Fixing VCID-jupy-x3sh-vqcp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:03:04.866957+00:00 Debian Importer Fixing VCID-fz9m-axm1-4kcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:02:18.105546+00:00 Debian Importer Fixing VCID-an5c-5rea-u3aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:00:07.051168+00:00 Debian Importer Fixing VCID-2198-cz4u-87hu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:59:14.110024+00:00 Debian Importer Fixing VCID-7v4n-4x85-dygx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:59:10.028351+00:00 Debian Importer Fixing VCID-ubuz-ts2u-ufem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:58:47.658218+00:00 Debian Importer Fixing VCID-ntqj-fmmb-b3g8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:58:07.860858+00:00 Debian Importer Fixing VCID-4kbk-38g4-6kb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:57:27.064132+00:00 Debian Importer Fixing VCID-98mp-5h68-73eg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:56:02.783671+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:54:59.611689+00:00 Debian Importer Fixing VCID-ewj3-dyq9-r7f2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:54:56.290831+00:00 Debian Importer Fixing VCID-jgke-4yqg-s7g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:54:39.743357+00:00 Debian Importer Fixing VCID-fmjc-a468-fffw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:54:00.351674+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:53:32.281118+00:00 Debian Importer Fixing VCID-xyds-k35a-2yf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:53:26.099898+00:00 Debian Importer Fixing VCID-puhc-5h95-13ff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:53:23.881586+00:00 Debian Importer Fixing VCID-pg2a-j1hc-83hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:53:15.562268+00:00 Debian Importer Fixing VCID-e6th-hujj-6bby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:53:13.312612+00:00 Debian Importer Fixing VCID-t8we-jmxu-k3bf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:52:42.865808+00:00 Debian Importer Fixing VCID-tsp7-ggzj-gud7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:50:50.228186+00:00 Debian Importer Fixing VCID-bnbm-zhck-yfex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:50:37.396320+00:00 Debian Importer Fixing VCID-e7ae-83vq-auf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:50:26.766311+00:00 Debian Importer Fixing VCID-c49r-knse-6bc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:50:16.317237+00:00 Debian Importer Fixing VCID-v8xr-k446-8uar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:49:18.247327+00:00 Debian Importer Fixing VCID-d8tr-usd8-6yca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:49:14.674717+00:00 Debian Importer Fixing VCID-z711-tvkz-9qa4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:48:58.676014+00:00 Debian Importer Fixing VCID-a5tz-dm6g-zqch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:48:51.374524+00:00 Debian Importer Fixing VCID-c9h3-3nm5-jqcq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:47:59.471284+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:47:43.469791+00:00 Debian Importer Fixing VCID-ubyx-g9qc-x7dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:47:34.092707+00:00 Debian Importer Fixing VCID-ns6g-c2p2-myf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:47:17.870614+00:00 Debian Importer Fixing VCID-w8r5-decj-vkem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:47:12.618849+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:45:45.132185+00:00 Debian Importer Fixing VCID-jmqw-ffjj-fqb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:45:11.476925+00:00 Debian Importer Fixing VCID-f968-vrzv-8ke5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:44:26.653299+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:44:22.001989+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:44:04.397452+00:00 Debian Importer Fixing VCID-tsfh-mjd5-cuch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:44:01.778734+00:00 Debian Importer Fixing VCID-wax6-n8k7-9fab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:43:25.476309+00:00 Debian Importer Fixing VCID-5gz4-1ysh-2qf7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:43:21.260909+00:00 Debian Importer Fixing VCID-887n-3662-zfba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:43:01.245121+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:41:29.298750+00:00 Debian Importer Fixing VCID-u58e-6ztz-5bcx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:41:26.490777+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:40:02.922383+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:39:17.627238+00:00 Debian Importer Fixing VCID-9zgh-r671-7ufw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:39:14.445548+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:39:09.462961+00:00 Debian Importer Fixing VCID-j5zr-w83u-q7ds https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:38:32.762608+00:00 Debian Importer Fixing VCID-vrfu-1kn8-x3be https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T05:38:02.750688+00:00 Debian Importer Fixing VCID-stma-rnkr-c3ef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:59.258404+00:00 Debian Importer Fixing VCID-e2wu-3vmz-3yae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:22.286577+00:00 Debian Importer Fixing VCID-m4y2-16uk-wkdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:20.808259+00:00 Debian Importer Fixing VCID-mtxh-7f6h-t3g4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:12.877395+00:00 Debian Importer Fixing VCID-142k-7wgv-pfh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:48:10.175889+00:00 Debian Importer Fixing VCID-pd3f-rmqx-cya3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:30.120128+00:00 Debian Importer Fixing VCID-q8p1-em5q-wuhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:11.426906+00:00 Debian Importer Fixing VCID-nuhs-4sjq-dkcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:08.544802+00:00 Debian Importer Fixing VCID-j1um-9nym-muh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:03.414255+00:00 Debian Importer Fixing VCID-ub6v-8wt6-5fbg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:51.914893+00:00 Debian Importer Fixing VCID-fx2q-84en-qyah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:44.685350+00:00 Debian Importer Fixing VCID-4spt-a3n7-z7fu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:27.347597+00:00 Debian Importer Fixing VCID-3ng4-wb1y-wyem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:20.249715+00:00 Debian Importer Fixing VCID-xafq-y8ca-hkhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:17.317836+00:00 Debian Importer Fixing VCID-wcu7-me4d-bugc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:09.417077+00:00 Debian Importer Fixing VCID-5hdv-pgsr-cfbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:08.124613+00:00 Debian Importer Fixing VCID-7fcn-v6b9-yber https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:07.139473+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:01.087442+00:00 Debian Importer Fixing VCID-jfhv-6svu-x3f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:56.610667+00:00 Debian Importer Fixing VCID-2e99-ge3p-13eq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:49.397775+00:00 Debian Importer Fixing VCID-m4v3-xfhr-rbgt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:42.668854+00:00 Debian Importer Fixing VCID-tgch-ns3e-qkhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:36.674203+00:00 Debian Importer Fixing VCID-gkhm-29a6-7uc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:04.652515+00:00 Debian Importer Fixing VCID-cbrz-vaxe-b3dt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:55.894553+00:00 Debian Importer Fixing VCID-vejg-5n4z-c7e8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:46.299519+00:00 Debian Importer Fixing VCID-rjgp-ta5t-vqge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:41.623955+00:00 Debian Importer Fixing VCID-f2u9-7eeg-e7cg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:38.786613+00:00 Debian Importer Fixing VCID-3eb4-ca4c-5qf7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:37.617233+00:00 Debian Importer Fixing VCID-atux-q6hk-hfau https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:31.468059+00:00 Debian Importer Fixing VCID-wwax-w4gg-cuhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:25.141642+00:00 Debian Importer Fixing VCID-yj28-va7b-3ug8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:21.922569+00:00 Debian Importer Fixing VCID-gcqh-ytsa-f7g1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:18.052115+00:00 Debian Importer Fixing VCID-xp23-rfjr-2ydv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:58.782995+00:00 Debian Importer Fixing VCID-mwv3-k49q-tfeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:51.375353+00:00 Debian Importer Fixing VCID-yx9t-1w27-akec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:49.571711+00:00 Debian Importer Fixing VCID-cqrs-uu2s-affj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:32.898816+00:00 Debian Importer Fixing VCID-4nrq-2zch-8uct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:31.900648+00:00 Debian Importer Fixing VCID-qk2m-qzes-qfhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:23.871686+00:00 Debian Importer Fixing VCID-24gw-73zd-3khc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:21.724782+00:00 Debian Importer Fixing VCID-vwnc-y4ve-nkhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:17.754637+00:00 Debian Importer Fixing VCID-jhz4-z9f5-4ka3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:15.572863+00:00 Debian Importer Fixing VCID-ew57-csay-bube https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:06.847921+00:00 Debian Importer Fixing VCID-ajfm-hpzg-uqck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:58.644841+00:00 Debian Importer Fixing VCID-tfg7-cn7k-ffaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:42.355634+00:00 Debian Importer Fixing VCID-ea36-7v42-fyfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:28.451714+00:00 Debian Importer Fixing VCID-4n9m-77qv-fuaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:40.218650+00:00 Debian Importer Fixing VCID-4uvy-ga5j-a7g3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:37.619465+00:00 Debian Importer Fixing VCID-bxaj-dwje-sbhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:34.383428+00:00 Debian Importer Fixing VCID-4ebq-x7rk-4ya3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:20.000373+00:00 Debian Importer Fixing VCID-hx57-qb6n-bfba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:03.633917+00:00 Debian Importer Fixing VCID-6cqc-um2d-1kfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:02.590777+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:00.985348+00:00 Debian Importer Fixing VCID-hu4f-e8qk-8fbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:00.320305+00:00 Debian Importer Fixing VCID-99f9-ne8p-d7c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:53.047452+00:00 Debian Importer Fixing VCID-9t5k-1w4u-8kep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:36.013630+00:00 Debian Importer Fixing VCID-1zkc-5ucw-e3et https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:35.273079+00:00 Debian Importer Fixing VCID-cn7e-8bbs-rubj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:28.986262+00:00 Debian Importer Fixing VCID-3ccs-8xaf-wfgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:20.802969+00:00 Debian Importer Fixing VCID-r23v-vjat-6qdk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:11.791956+00:00 Debian Importer Fixing VCID-b2kt-hmz5-yuhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:59.146257+00:00 Debian Importer Fixing VCID-gyhz-a9pm-zqav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:46.401634+00:00 Debian Importer Fixing VCID-v893-rr8x-nyay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:45.455966+00:00 Debian Importer Fixing VCID-93ay-73z5-h7er https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:43.309862+00:00 Debian Importer Fixing VCID-q2nc-hdcj-gfdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:42.574086+00:00 Debian Importer Fixing VCID-p2ng-3bek-d3b6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:30.300545+00:00 Debian Importer Fixing VCID-c2me-ar1y-y7dw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:29.567216+00:00 Debian Importer Fixing VCID-cqye-p3y7-bfdp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:28.774706+00:00 Debian Importer Fixing VCID-u28n-uwtv-tyaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:27.849411+00:00 Debian Importer Fixing VCID-3bwh-381p-6qbh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:26.673673+00:00 Debian Importer Fixing VCID-cvps-1xf8-kqb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:22.128657+00:00 Debian Importer Fixing VCID-e965-zevp-rqgd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:45.686484+00:00 Debian Importer Fixing VCID-av2k-qrby-suhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:42.065045+00:00 Debian Importer Fixing VCID-cear-n94a-jqdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:34.017191+00:00 Debian Importer Fixing VCID-ner2-8g1r-6bh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:18.959341+00:00 Debian Importer Fixing VCID-dqp6-k3du-n3ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:11.530786+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:02.704758+00:00 Debian Importer Fixing VCID-ka7q-cx4u-rkar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:01.959268+00:00 Debian Importer Fixing VCID-76zh-5x51-kffx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:48.362544+00:00 Debian Importer Fixing VCID-1ajk-6gxr-efgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:35.193057+00:00 Debian Importer Fixing VCID-wanj-gu4w-2qaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:30.962949+00:00 Debian Importer Fixing VCID-1n5v-auw6-wbcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:12.190412+00:00 Debian Importer Fixing VCID-ptyj-1y6d-dud1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:03.539198+00:00 Debian Importer Fixing VCID-6wrr-yr71-xuhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:00.389165+00:00 Debian Importer Fixing VCID-a29y-u4f3-nkfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:56.092067+00:00 Debian Importer Fixing VCID-wc4k-86v7-ykh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:53.642528+00:00 Debian Importer Fixing VCID-hh8s-8fc8-pkgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:43.526412+00:00 Debian Importer Fixing VCID-p4as-tvvw-ubcu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:41.779928+00:00 Debian Importer Fixing VCID-q1ts-48c2-xkgb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:30.289166+00:00 Debian Importer Fixing VCID-tt18-fh9r-57c9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:29.160460+00:00 Debian Importer Fixing VCID-bfjx-x5b3-53bg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:21.640170+00:00 Debian Importer Fixing VCID-7fke-ahd3-e7ac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:20.595566+00:00 Debian Importer Fixing VCID-ans1-wmuz-e3bw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:08.579846+00:00 Debian Importer Fixing VCID-a2jn-1xhp-9fg3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:01.571037+00:00 Debian Importer Fixing VCID-868a-udb4-qfbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:46.360267+00:00 Debian Importer Fixing VCID-93yj-3vbb-3ub5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:45.180314+00:00 Debian Importer Fixing VCID-v3m5-xj2s-5yef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:25.564253+00:00 Debian Importer Fixing VCID-ecc5-64vs-ekgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:16.279631+00:00 Debian Importer Fixing VCID-ppgp-v6th-y3ar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:13.104134+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:11.147715+00:00 Debian Importer Fixing VCID-j9tf-d5qg-6fgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:02.742802+00:00 Debian Importer Fixing VCID-wzkm-rtcg-cbdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:40.661893+00:00 Debian Importer Fixing VCID-gqbd-ybcp-jybq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:36.035913+00:00 Debian Importer Fixing VCID-g75p-x4da-efdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:32.185771+00:00 Debian Importer Fixing VCID-rffh-vskt-b7ga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:20.098030+00:00 Debian Importer Fixing VCID-hfq2-r9mw-p3cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:07.993351+00:00 Debian Importer Fixing VCID-ey68-cc97-duhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:03.873368+00:00 Debian Importer Fixing VCID-9kuz-7fag-4qhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:59.533051+00:00 Debian Importer Fixing VCID-7hxb-dbmf-nufr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:53.287118+00:00 Debian Importer Fixing VCID-366p-rhcz-8kb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:45.003613+00:00 Debian Importer Fixing VCID-25ja-vd4z-3ffc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:33.745333+00:00 Debian Importer Fixing VCID-xqpe-25bd-vygx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:33.088856+00:00 Debian Importer Fixing VCID-xb4p-ngcu-m3by https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:32.377717+00:00 Debian Importer Fixing VCID-y5ds-5mpf-u3hz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:25.102992+00:00 Debian Importer Fixing VCID-m6yv-nu11-ayg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:23.089630+00:00 Debian Importer Fixing VCID-z3qs-q6ce-aqbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:18.447556+00:00 Debian Importer Fixing VCID-yrgr-2c4c-3fgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:10.611748+00:00 Debian Importer Fixing VCID-5v5u-d5mg-53bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:06.876027+00:00 Debian Importer Fixing VCID-qzb2-2zd9-5kf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:05.128841+00:00 Debian Importer Fixing VCID-a6ke-6716-fker https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:34.126597+00:00 Debian Importer Fixing VCID-htyr-jnu7-e3gf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:25.813094+00:00 Debian Importer Fixing VCID-gv7r-71cz-e3cz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:20.845258+00:00 Debian Importer Fixing VCID-c2y9-myfb-s3f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:01.492588+00:00 Debian Importer Fixing VCID-wq4h-q7vt-23ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:52.979487+00:00 Debian Importer Fixing VCID-z4yz-sjm9-3ke4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:43.491494+00:00 Debian Importer Fixing VCID-qyxy-uh9d-fqhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:42.007071+00:00 Debian Importer Fixing VCID-cfms-gd2h-v7gd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:34.621695+00:00 Debian Importer Fixing VCID-ytcn-fxjj-efhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:32.687332+00:00 Debian Importer Fixing VCID-ktsr-nq3s-33gt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:31.527653+00:00 Debian Importer Fixing VCID-ytfc-yqtw-4yhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:23.496529+00:00 Debian Importer Fixing VCID-1n7k-a7ve-8qcr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:18.420259+00:00 Debian Importer Fixing VCID-cxtx-363a-ufhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:51.916787+00:00 Debian Importer Fixing VCID-rbua-nn9a-kfb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:45.721423+00:00 Debian Importer Fixing VCID-c3wk-9gm2-fkeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:44.504001+00:00 Debian Importer Fixing VCID-nv6q-r1kv-c7e3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:42.382941+00:00 Debian Importer Fixing VCID-msbv-kmj8-b7e8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:38.349117+00:00 Debian Importer Fixing VCID-fe76-s8g9-zuar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:36.810229+00:00 Debian Importer Fixing VCID-j9s4-1dar-7qdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:25.427387+00:00 Debian Importer Fixing VCID-kzsr-8hjr-gkf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:24.273119+00:00 Debian Importer Fixing VCID-a1rd-xu94-9bad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:52.706477+00:00 Debian Importer Fixing VCID-p4p8-hzzp-ake1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:47.978529+00:00 Debian Importer Fixing VCID-p47c-bn8d-6ka7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:41.214908+00:00 Debian Importer Fixing VCID-ncy9-6whk-ckep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:40.219957+00:00 Debian Importer Fixing VCID-vfxs-5p9x-5kcx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:31.057928+00:00 Debian Importer Fixing VCID-qmuk-1txu-z3da https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:26.193059+00:00 Debian Importer Fixing VCID-akq2-c6hp-tfda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:25.377272+00:00 Debian Importer Fixing VCID-nsa2-qgf5-xffq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:23.096224+00:00 Debian Importer Fixing VCID-q3hg-ug68-cffr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:33.956839+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:23.236911+00:00 Debian Importer Fixing VCID-zh6a-z135-ayeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:21.513722+00:00 Debian Importer Fixing VCID-w4u7-5ke3-57a7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:12.735439+00:00 Debian Importer Fixing VCID-n2t8-afcr-sffj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:06.654951+00:00 Debian Importer Fixing VCID-6c3x-q991-5uh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:57.820621+00:00 Debian Importer Fixing VCID-kpkx-qwue-bff4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:57.019768+00:00 Debian Importer Fixing VCID-93fb-qqv8-wyeb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:52.596612+00:00 Debian Importer Fixing VCID-wk3t-3jvn-quf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:51.455001+00:00 Debian Importer Fixing VCID-szdg-jd74-r7g1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:42.591078+00:00 Debian Importer Fixing VCID-vsyg-x46t-ayhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:39.175281+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:28.692133+00:00 Debian Importer Fixing VCID-nfg3-jgk3-z7bk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:25.501298+00:00 Debian Importer Fixing VCID-7gw9-7kbs-2uh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:22.144796+00:00 Debian Importer Fixing VCID-umyr-w4sv-gkgd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:16.445352+00:00 Debian Importer Fixing VCID-h5ks-h7t7-rqcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:01.869668+00:00 Debian Importer Fixing VCID-wstb-4k78-gufv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:52.323306+00:00 Debian Importer Fixing VCID-fsjs-fmwz-x3bd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:43.170881+00:00 Debian Importer Fixing VCID-1yba-pq6x-qkh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:39.692775+00:00 Debian Importer Fixing VCID-a8u6-m3s1-5fdx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:38.704802+00:00 Debian Importer Fixing VCID-hxj2-cvvc-tqec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:37.378617+00:00 Debian Importer Fixing VCID-k9e5-ykzu-qyew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:29.521964+00:00 Debian Importer Fixing VCID-a8cp-9ykt-xbdx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:08.494647+00:00 Debian Importer Fixing VCID-y7wh-qssq-cbg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:54.794546+00:00 Debian Importer Fixing VCID-h8sj-qvv2-rydf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:51.970371+00:00 Debian Importer Fixing VCID-gm3e-d4pv-53aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:42.674455+00:00 Debian Importer Fixing VCID-kx5p-87fs-9kgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:33.410711+00:00 Debian Importer Fixing VCID-4t4h-a2xy-h7bg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:32.501319+00:00 Debian Importer Fixing VCID-susc-ysbn-eqbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:29.743055+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:08.694337+00:00 Debian Importer Fixing VCID-9hnv-7gae-2kc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:06.853543+00:00 Debian Importer Fixing VCID-1fca-q7wb-u3cx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:57.639416+00:00 Debian Importer Fixing VCID-z4xx-msk4-k7bz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:55.963067+00:00 Debian Importer Fixing VCID-mkjm-756w-5ygt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:42.616851+00:00 Debian Importer Fixing VCID-pk74-dafk-e3gj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:39.701058+00:00 Debian Importer Fixing VCID-g4qj-az94-83c6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:38.034823+00:00 Debian Importer Fixing VCID-k3bt-ws28-e3ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:22.812688+00:00 Debian Importer Fixing VCID-8zy9-cpzf-q3be https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:16.885669+00:00 Debian Importer Fixing VCID-21fx-6crx-ske2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:15.474545+00:00 Debian Importer Fixing VCID-gr5s-rjhv-3kdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:14.523069+00:00 Debian Importer Fixing VCID-jfrf-qe3s-gbax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:53.872008+00:00 Debian Importer Fixing VCID-z423-786s-hyd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:37.798376+00:00 Debian Importer Fixing VCID-vdnv-8h83-7kfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:32.805838+00:00 Debian Importer Fixing VCID-gtjv-ut7g-hqhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:17.804167+00:00 Debian Importer Fixing VCID-37t1-1qg2-hqc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:15.224307+00:00 Debian Importer Fixing VCID-3fpy-fq8u-r3gb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:14.444662+00:00 Debian Importer Fixing VCID-xc83-2865-7bgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:13.493100+00:00 Debian Importer Fixing VCID-x6kd-y436-nbaw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:12.812785+00:00 Debian Importer Fixing VCID-s9mp-wsn8-cycf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:44.260913+00:00 Debian Importer Fixing VCID-k27q-9kcv-3fgh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:33.526267+00:00 Debian Importer Fixing VCID-hmmv-61tn-nkc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:11.205123+00:00 Debian Importer Fixing VCID-e9d9-jb9v-jufv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:07.502661+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:32.742762+00:00 Debian Importer Fixing VCID-nv5d-ux4k-gbck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:21.942530+00:00 Debian Importer Fixing VCID-mg8e-fpwg-rbg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:17.547839+00:00 Debian Importer Fixing VCID-4qwu-fw8y-t7et https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:14.267347+00:00 Debian Importer Fixing VCID-d1gu-5q4s-p7eq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:11.513406+00:00 Debian Importer Fixing VCID-1x2r-t2gj-akgf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:03.741369+00:00 Debian Importer Fixing VCID-m5bk-s7pe-cbd8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:59.272983+00:00 Debian Importer Fixing VCID-t9de-4jgf-wuc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:45.538401+00:00 Debian Importer Fixing VCID-5eks-kg2z-5ye1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:43.795518+00:00 Debian Importer Fixing VCID-798e-hc82-7qcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:36.600624+00:00 Debian Importer Fixing VCID-rayk-m71k-pkd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:33.452368+00:00 Debian Importer Fixing VCID-ubtn-8mb7-huef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:31.804427+00:00 Debian Importer Fixing VCID-rudf-s931-1qct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:27.094243+00:00 Debian Importer Fixing VCID-f5xt-m6qt-43ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:11.294044+00:00 Debian Importer Fixing VCID-a1xg-dyn3-skb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:10.394667+00:00 Debian Importer Fixing VCID-a3d8-8qvy-ykdr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:09.565182+00:00 Debian Importer Fixing VCID-9tbh-mrhu-v3am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:52.628600+00:00 Debian Importer Fixing VCID-5g2a-qj5r-uub4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:37.323024+00:00 Debian Importer Fixing VCID-vqmu-xn3y-e3gc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:36.320967+00:00 Debian Importer Fixing VCID-nsbf-fkcw-cbed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:26.513099+00:00 Debian Importer Fixing VCID-q5ky-7fqu-efcs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:25.783068+00:00 Debian Importer Fixing VCID-u2dn-mnr7-m3hy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:17.604117+00:00 Debian Importer Fixing VCID-2nz8-mxwk-dyfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:08.476100+00:00 Debian Importer Fixing VCID-a51v-ajen-u7et https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:03.797473+00:00 Debian Importer Fixing VCID-k48g-n4ka-fugh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:29.826312+00:00 Debian Importer Fixing VCID-cjnk-7asz-zuhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:28.404920+00:00 Debian Importer Fixing VCID-7ey4-wrhk-zfce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:06.237290+00:00 Debian Importer Fixing VCID-vm3p-zgmr-13gw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:55.760191+00:00 Debian Importer Fixing VCID-yq9b-dpsh-cuhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:54.028350+00:00 Debian Importer Fixing VCID-ub6v-vb3r-83eh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:48.281858+00:00 Debian Importer Fixing VCID-n4p8-dgkk-3bfr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:46.215570+00:00 Debian Importer Fixing VCID-71m1-rn5c-k3hm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:44.790114+00:00 Debian Importer Fixing VCID-qg8t-cx91-c7e3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:33.836654+00:00 Debian Importer Fixing VCID-ng2z-3hcf-9uh8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:32.099995+00:00 Debian Importer Fixing VCID-uh94-5nuu-w7fd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:04.643976+00:00 Debian Importer Fixing VCID-kg8v-183b-33ce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:00.477020+00:00 Debian Importer Fixing VCID-w71f-nskm-nyau https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:58.912099+00:00 Debian Importer Fixing VCID-1m9j-m8xz-zqav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:56.562332+00:00 Debian Importer Fixing VCID-n7w6-5y7w-gbcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:55.184801+00:00 Debian Importer Fixing VCID-2fsz-wcjz-9yer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:48.863385+00:00 Debian Importer Fixing VCID-gn82-9qs1-37hs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:38.155462+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:29.045050+00:00 Debian Importer Fixing VCID-enyv-k9c5-bfe4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:08.790895+00:00 Debian Importer Fixing VCID-z767-vnpz-37g8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:01.144657+00:00 Debian Importer Fixing VCID-m773-z76s-8qad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:56.066273+00:00 Debian Importer Fixing VCID-5wr6-yach-7fbf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:55.072952+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:36.377221+00:00 Debian Importer Fixing VCID-dfj9-5xtt-qba4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:30.671407+00:00 Debian Importer Fixing VCID-zx9u-zu1f-gbf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:24.011461+00:00 Debian Importer Fixing VCID-mm1u-nfnt-nkaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:20.972991+00:00 Debian Importer Fixing VCID-zrf8-efng-gfd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:14.764930+00:00 Debian Importer Fixing VCID-6r4x-xaaf-b7ft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:10.005163+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:48.453191+00:00 Debian Importer Fixing VCID-4wyy-uw7z-5be9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:45.925847+00:00 Debian Importer Fixing VCID-nhry-edgk-sbd6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:44.400974+00:00 Debian Importer Fixing VCID-edhy-ptjn-1kbx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:41.194289+00:00 Debian Importer Fixing VCID-d2xf-68nr-rqe2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:15.314377+00:00 Debian Importer Fixing VCID-ex9p-euhg-aybf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:07.482988+00:00 Debian Importer Fixing VCID-9ns9-s6pf-d7hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:03.592887+00:00 Debian Importer Fixing VCID-9fn1-ytny-vke1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:00.132920+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:57.100813+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:54.860520+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:36.356035+00:00 Debian Importer Fixing VCID-sk93-hxg5-yffv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:35.417022+00:00 Debian Importer Fixing VCID-ug5j-gaab-kuag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:30.926640+00:00 Debian Importer Fixing VCID-dtzb-vs94-3ygt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:25.406304+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:24.475193+00:00 Debian Importer Fixing VCID-93jq-59ak-xygv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:20.864478+00:00 Debian Importer Fixing VCID-k29n-spa9-uqdz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:17.234709+00:00 Debian Importer Fixing VCID-uem4-47we-qua4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:15.798407+00:00 Debian Importer Fixing VCID-rw71-ued5-jfg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:14.735943+00:00 Debian Importer Fixing VCID-ahsf-n2te-bfa2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:13.281751+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:12.241281+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:03.715729+00:00 Debian Importer Fixing VCID-zyme-v3xf-3kah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:55.112578+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:52.507814+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:47.514004+00:00 Debian Importer Fixing VCID-vysr-bztb-yugx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:42.196053+00:00 Debian Importer Fixing VCID-uzsb-9yx8-kua1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:36.356974+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:35.692583+00:00 Debian Importer Fixing VCID-vwmn-w6tb-sudq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:25.643246+00:00 Debian Importer Fixing VCID-bf5y-rqaa-afc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:20.398412+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:13.785726+00:00 Debian Importer Fixing VCID-d8ad-6vw9-b7f2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:06.379603+00:00 Debian Importer Fixing VCID-kdf1-9mq7-2ue6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:02.250016+00:00 Debian Importer Fixing VCID-9dms-q8x2-a3em https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:00.838385+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:57.039716+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:35.931846+00:00 Debian Importer Fixing VCID-c2ee-9r7y-9qfw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:27.275727+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:09.385122+00:00 Debian Importer Fixing VCID-d3x6-8uek-qkgn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:58.847853+00:00 Debian Importer Fixing VCID-8859-uavn-xygj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:54.012903+00:00 Debian Importer Fixing VCID-aywj-7j4w-z3au https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:48.064586+00:00 Debian Importer Fixing VCID-a3yj-v3tu-d7ga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:43.307880+00:00 Debian Importer Fixing VCID-yhft-bm7y-jfde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:35.368223+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:27.367413+00:00 Debian Importer Fixing VCID-aze6-wgfm-3ycv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:24.570074+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:07.391979+00:00 Debian Importer Fixing VCID-yzsh-2rk2-5yhq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:52.741808+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:49.923907+00:00 Debian Importer Fixing VCID-2bay-kzph-yya3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:40.725551+00:00 Debian Importer Fixing VCID-gqr9-19jt-qfds https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:39.839084+00:00 Debian Importer Fixing VCID-jvv4-j5x1-dbd6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:38.173351+00:00 Debian Importer Fixing VCID-r4zk-9j6t-uyhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:34.663490+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:26.620110+00:00 Debian Importer Fixing VCID-kjn8-9h7n-dfab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:25.529909+00:00 Debian Importer Fixing VCID-c9br-38nh-sfg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:22.430222+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:20.564994+00:00 Debian Importer Fixing VCID-4ghv-w1sg-77hu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:01.034963+00:00 Debian Importer Fixing VCID-y5bm-2fr5-8bbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-10T07:30:01.289411+00:00 Debian Importer Fixing VCID-upcd-ngpy-ekeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:09:34.799307+00:00 Debian Importer Fixing VCID-s5k9-u1uk-3be8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:06:34.725239+00:00 Debian Importer Fixing VCID-mmsk-j6bt-wuh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:05:53.628853+00:00 Debian Importer Fixing VCID-yj3z-hvs9-47hj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:01:39.434819+00:00 Debian Importer Fixing VCID-c86j-dzs8-nuem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:01:18.957947+00:00 Debian Importer Fixing VCID-kn32-aqhq-k7c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:00:23.389790+00:00 Debian Importer Fixing VCID-xbra-jtwd-6bhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:59:48.833626+00:00 Debian Importer Fixing VCID-jz2j-4jqz-8fdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:59:01.842886+00:00 Debian Importer Fixing VCID-psqs-wgmf-57d8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:57:58.641109+00:00 Debian Importer Fixing VCID-rzvj-774t-cqf8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:57:46.513696+00:00 Debian Importer Fixing VCID-stma-rnkr-c3ef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:56:27.909912+00:00 Debian Importer Fixing VCID-1kgs-19ue-wbe1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:56:02.002307+00:00 Debian Importer Fixing VCID-v9bm-48ec-9fc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:55:18.924190+00:00 Debian Importer Fixing VCID-687u-nzmt-n7a6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:53:48.360713+00:00 Debian Importer Fixing VCID-vmts-4etq-hqh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:53:47.625587+00:00 Debian Importer Fixing VCID-qweq-8dcb-x7eb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:53:06.745839+00:00 Debian Importer Fixing VCID-c8xs-q7hr-uua8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:53:02.295827+00:00 Debian Importer Fixing VCID-c9h3-3nm5-jqcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:52:30.004039+00:00 Debian Importer Fixing VCID-ah9v-pkq9-uqek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:52:16.472209+00:00 Debian Importer Fixing VCID-dwes-ct77-juc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:57.423568+00:00 Debian Importer Fixing VCID-skjn-kete-x7e1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:45.907702+00:00 Debian Importer Fixing VCID-sqf7-4e8r-7ken https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:29.014154+00:00 Debian Importer Fixing VCID-3kg4-jbwg-zffk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:27.701401+00:00 Debian Importer Fixing VCID-cvcu-khre-3bc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:26.994377+00:00 Debian Importer Fixing VCID-kdmz-w6db-7ue2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:51:22.767558+00:00 Debian Importer Fixing VCID-r76g-d7px-hqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:50:50.432997+00:00 Debian Importer Fixing VCID-ed3p-sm1w-33am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:50:33.376308+00:00 Debian Importer Fixing VCID-uzfu-ke47-1qaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:49:49.280675+00:00 Debian Importer Fixing VCID-d9ty-7748-33a7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:49:03.168202+00:00 Debian Importer Fixing VCID-hbzk-b7gn-9bgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:47:59.338347+00:00 Debian Importer Fixing VCID-vck1-emav-93gc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:47:47.757234+00:00 Debian Importer Fixing VCID-p31e-jzac-8kbe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:47:37.391615+00:00 Debian Importer Fixing VCID-9jq2-6zek-rqh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:47:24.701408+00:00 Debian Importer Fixing VCID-y6kc-guf2-bqdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:45:11.124265+00:00 Debian Importer Fixing VCID-kgv3-f25s-ckd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:45:00.306050+00:00 Debian Importer Fixing VCID-f2m2-u9j3-3ba9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:44:19.450721+00:00 Debian Importer Fixing VCID-aj3p-9trr-87cz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:44:12.670591+00:00 Debian Importer Fixing VCID-h3e8-fux5-3fe2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:44:04.981400+00:00 Debian Importer Fixing VCID-45qm-naju-pycn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:43:58.041493+00:00 Debian Importer Fixing VCID-9zgh-r671-7ufw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:43:05.616225+00:00 Debian Importer Fixing VCID-995q-6nn5-ykgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:57.094580+00:00 Debian Importer Fixing VCID-q7ty-xfyp-cbff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:46.878776+00:00 Debian Importer Fixing VCID-m995-b8rn-tkgk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:32.727153+00:00 Debian Importer Fixing VCID-rdch-b3ck-qugc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:25.565196+00:00 Debian Importer Fixing VCID-d8tr-usd8-6yca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:08.496400+00:00 Debian Importer Fixing VCID-3a8a-ns8q-wbgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:42:05.671299+00:00 Debian Importer Fixing VCID-qyu2-kw7b-1kg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:41:41.901669+00:00 Debian Importer Fixing VCID-jbs2-t7yr-rqh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:41:09.825865+00:00 Debian Importer Fixing VCID-pepq-cqcb-dkdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:40:30.152313+00:00 Debian Importer Fixing VCID-buyh-2d37-rqb1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:40:00.253114+00:00 Debian Importer Fixing VCID-9n5j-cp2p-qkhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:39:13.458385+00:00 Debian Importer Fixing VCID-zhaf-5de2-tycd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:38:56.238381+00:00 Debian Importer Fixing VCID-8e38-5bq1-8be9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:38:21.313312+00:00 Debian Importer Fixing VCID-3yzs-sjd2-53d7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:38:13.568489+00:00 Debian Importer Fixing VCID-xxe5-3ae2-vygt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:43.090616+00:00 Debian Importer Fixing VCID-ex8u-z3r8-cycq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:39.431408+00:00 Debian Importer Fixing VCID-2xhv-1gcg-y3cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:31.462805+00:00 Debian Importer Fixing VCID-ky32-n1qj-nydf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:29.081652+00:00 Debian Importer Fixing VCID-d4u6-bzuu-dubz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:00.984084+00:00 Debian Importer Fixing VCID-rjdd-dk1r-subd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:36:46.820060+00:00 Debian Importer Fixing VCID-8qua-yr2x-s7fd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:36:19.627792+00:00 Debian Importer Fixing VCID-akv9-pdny-1yh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:36:14.564073+00:00 Debian Importer Fixing VCID-nnnt-9vn7-rfc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:36:01.072554+00:00 Debian Importer Fixing VCID-an5c-5rea-u3aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:35:38.911516+00:00 Debian Importer Fixing VCID-7v66-8w2u-duf9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:35:13.195130+00:00 Debian Importer Fixing VCID-b1an-t4b8-4bd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:33:56.546752+00:00 Debian Importer Fixing VCID-e7ae-83vq-auf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:33:47.533470+00:00 Debian Importer Fixing VCID-f3sv-pbfs-cqcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:33:40.654797+00:00 Debian Importer Fixing VCID-2vqp-wpcw-pfbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:33:24.055702+00:00 Debian Importer Fixing VCID-gkap-5jhj-tbff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:32:59.927592+00:00 Debian Importer Fixing VCID-u58e-6ztz-5bcx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:32:36.129034+00:00 Debian Importer Fixing VCID-h31q-rcq3-7ud3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:32:05.406482+00:00 Debian Importer Fixing VCID-f968-vrzv-8ke5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:31:23.374528+00:00 Debian Importer Fixing VCID-sm3v-84rs-nyem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:48.369095+00:00 Debian Importer Fixing VCID-g34c-hwct-tqb1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:45.903794+00:00 Debian Importer Fixing VCID-fz9m-axm1-4kcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:42.623680+00:00 Debian Importer Fixing VCID-e1pe-znzp-jqhx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:31.661986+00:00 Debian Importer Fixing VCID-abfm-ssmn-1fap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:15.641070+00:00 Debian Importer Fixing VCID-awuq-scq3-fuev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:07.657255+00:00 Debian Importer Fixing VCID-n59e-jkf6-13bf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:30:02.429445+00:00 Debian Importer Fixing VCID-82f7-2axv-jbbf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:29:51.320050+00:00 Debian Importer Fixing VCID-xyds-k35a-2yf2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:29:34.919038+00:00 Debian Importer Fixing VCID-tsp7-ggzj-gud7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:29:24.591811+00:00 Debian Importer Fixing VCID-e495-c57w-tkft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:28:46.534155+00:00 Debian Importer Fixing VCID-3d8r-1n1k-skff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:28:42.634428+00:00 Debian Importer Fixing VCID-3jmx-jfhk-yqh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:28:30.312951+00:00 Debian Importer Fixing VCID-xf8w-1v5k-nyf7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:27:51.844745+00:00 Debian Importer Fixing VCID-v3ba-uvsy-ybfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:26:54.619977+00:00 Debian Importer Fixing VCID-mrh8-akgh-ybby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:26:50.663079+00:00 Debian Importer Fixing VCID-bcd9-e6dd-r3cf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:26:46.414407+00:00 Debian Importer Fixing VCID-y3wu-za9p-yub1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:26:37.212001+00:00 Debian Importer Fixing VCID-mu3y-rdt2-x3g1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:26:36.552998+00:00 Debian Importer Fixing VCID-5ehk-s7ww-vfc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:26:33.279442+00:00 Debian Importer Fixing VCID-94kq-ycmm-3bgn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:26:13.042843+00:00 Debian Importer Fixing VCID-ehtx-jr8g-vbgb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:48.466508+00:00 Debian Importer Fixing VCID-ya16-qrwm-kkfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:46.989956+00:00 Debian Importer Fixing VCID-kpyj-qqha-1udx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:28.591743+00:00 Debian Importer Fixing VCID-16es-2z99-a3hu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:25.057692+00:00 Debian Importer Fixing VCID-tyvp-9xvj-7uax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:23.146607+00:00 Debian Importer Fixing VCID-3aa5-4rp5-g7h3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:09.609973+00:00 Debian Importer Fixing VCID-rjuh-7kkv-3qch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:25:04.297826+00:00 Debian Importer Fixing VCID-9axt-c2hy-63eb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:24:46.146284+00:00 Debian Importer Fixing VCID-2cxv-ay17-4kh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:23:49.043539+00:00 Debian Importer Fixing VCID-ubuz-ts2u-ufem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:23:48.372767+00:00 Debian Importer Fixing VCID-73mg-3qys-3ubr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:23:30.978327+00:00 Debian Importer Fixing VCID-p9x5-syxd-fufc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:23:21.622318+00:00 Debian Importer Fixing VCID-pbby-yjrv-23hc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:23:11.584966+00:00 Debian Importer Fixing VCID-x1m4-hf24-27hq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:22:57.271060+00:00 Debian Importer Fixing VCID-b4ct-fnbp-43a3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:22:36.428387+00:00 Debian Importer Fixing VCID-qjqb-cqc9-17e1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:22:18.604897+00:00 Debian Importer Fixing VCID-m8n7-j86u-7ugj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:22:02.758459+00:00 Debian Importer Fixing VCID-n2ac-dtm2-sqa9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:36.412824+00:00 Debian Importer Fixing VCID-brwq-qcbd-c3ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:35.654572+00:00 Debian Importer Fixing VCID-rh4e-sbew-nkbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:30.664083+00:00 Debian Importer Fixing VCID-vxys-jj3n-n7gz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:17.971599+00:00 Debian Importer Fixing VCID-d131-p16m-jqhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:17.177059+00:00 Debian Importer Fixing VCID-kkmc-f6mq-xkfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:06.442648+00:00 Debian Importer Fixing VCID-b51x-3ss2-67ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:01.307907+00:00 Debian Importer Fixing VCID-kcmk-1zxh-2yhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:20:51.853191+00:00 Debian Importer Fixing VCID-w1sf-m294-jke8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:20:44.095866+00:00 Debian Importer Fixing VCID-4399-j8sn-t3b1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:20:33.200391+00:00 Debian Importer Fixing VCID-ddm7-5p27-3khg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:19:33.938497+00:00 Debian Importer Fixing VCID-n7kt-3rsy-rkg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:19:26.036302+00:00 Debian Importer Fixing VCID-c8t3-zakp-jqe2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:19:17.209927+00:00 Debian Importer Fixing VCID-jgke-4yqg-s7g7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:19:03.811083+00:00 Debian Importer Fixing VCID-3p2d-np1n-p3gv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:18:47.889633+00:00 Debian Importer Fixing VCID-g2gb-t5zm-1qb1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:18:20.684023+00:00 Debian Importer Fixing VCID-bens-aw9k-xka2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:18:09.621317+00:00 Debian Importer Fixing VCID-bg8h-jw13-8yhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:17:17.391314+00:00 Debian Importer Fixing VCID-6jzb-qp5p-47ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:16:56.198064+00:00 Debian Importer Fixing VCID-kns4-65da-v3bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:16:44.846940+00:00 Debian Importer Fixing VCID-a7fz-5z23-17ey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:16:31.813436+00:00 Debian Importer Fixing VCID-sy3c-f5q7-qygm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:16:23.551540+00:00 Debian Importer Fixing VCID-yeww-6ybr-qye8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:15:21.049651+00:00 Debian Importer Fixing VCID-31hs-1pwx-7uak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:15:11.825759+00:00 Debian Importer Fixing VCID-47k1-5vw2-97hy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:31.630687+00:00 Debian Importer Fixing VCID-jxkv-jbh3-9fhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:30.887156+00:00 Debian Importer Fixing VCID-gpcp-4y8w-fka1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:24.199156+00:00 Debian Importer Fixing VCID-zvp5-zhsh-9qap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:18.783267+00:00 Debian Importer Fixing VCID-emdc-7k4g-67e5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:17.403824+00:00 Debian Importer Fixing VCID-xh6y-ja9y-u3es https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:13.528764+00:00 Debian Importer Fixing VCID-tusw-jz3p-y3d5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:27.641786+00:00 Debian Importer Fixing VCID-ns6g-c2p2-myf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:12.991216+00:00 Debian Importer Fixing VCID-fqzh-sckm-a3ff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:08.955677+00:00 Debian Importer Fixing VCID-kvbv-df49-gyaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:07.400421+00:00 Debian Importer Fixing VCID-np3t-m158-k7he https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:42.410829+00:00 Debian Importer Fixing VCID-j87e-taah-ubbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:41.367853+00:00 Debian Importer Fixing VCID-dp4x-6duw-8yeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:18.263104+00:00 Debian Importer Fixing VCID-h7pm-dyef-1fan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:16.968082+00:00 Debian Importer Fixing VCID-ewj3-dyq9-r7f2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:12:10.943405+00:00 Debian Importer Fixing VCID-dyun-rd3c-rke6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:53.153454+00:00 Debian Importer Fixing VCID-d14h-dr7c-c3d9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:23.726700+00:00 Debian Importer Fixing VCID-7892-zv3s-xqhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:14.823943+00:00 Debian Importer Fixing VCID-nr6b-wdnx-k7e6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:13.929402+00:00 Debian Importer Fixing VCID-2k4e-em5c-m3bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:07.322396+00:00 Debian Importer Fixing VCID-u6nn-wr8u-qqdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:10:49.569663+00:00 Debian Importer Fixing VCID-z24p-wtzg-a3gh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:10:36.489428+00:00 Debian Importer Fixing VCID-czue-c27z-bkgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:59.249673+00:00 Debian Importer Fixing VCID-zxmw-r6pn-6fdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:54.052077+00:00 Debian Importer Fixing VCID-8sv6-72c2-kybe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:53.320560+00:00 Debian Importer Fixing VCID-j7c3-n2w7-fbg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:46.756242+00:00 Debian Importer Fixing VCID-c8qb-kbef-8qg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:44.841768+00:00 Debian Importer Fixing VCID-xdde-euh1-dqfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:33.824271+00:00 Debian Importer Fixing VCID-d1ke-rn87-f7ec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:09:17.202123+00:00 Debian Importer Fixing VCID-ug16-p9vj-57e7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:08:02.654599+00:00 Debian Importer Fixing VCID-padk-1w3h-7bfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:07:52.475062+00:00 Debian Importer Fixing VCID-qxd4-7ack-dkaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:07:35.844091+00:00 Debian Importer Fixing VCID-dqe1-cf2v-myes https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:07:33.273918+00:00 Debian Importer Fixing VCID-k1v3-945q-47eh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:07:25.769784+00:00 Debian Importer Fixing VCID-v2rb-s1g7-1ub4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:06:49.782191+00:00 Debian Importer Fixing VCID-qucs-qaj4-q7cf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:06:12.685906+00:00 Debian Importer Fixing VCID-jmqw-ffjj-fqb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:55.327836+00:00 Debian Importer Fixing VCID-5yp2-meun-zbas https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:47.558235+00:00 Debian Importer Fixing VCID-f76c-qhke-3bag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:39.604624+00:00 Debian Importer Fixing VCID-61t7-s6qz-mfcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:20.570856+00:00 Debian Importer Fixing VCID-2wmk-4bjz-bbhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:13.698379+00:00 Debian Importer Fixing VCID-c49r-knse-6bc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:05.309975+00:00 Debian Importer Fixing VCID-6syp-3js8-qudn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:44.834292+00:00 Debian Importer Fixing VCID-uhng-dru9-7yht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:43.007176+00:00 Debian Importer Fixing VCID-pva7-b7rk-ykam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:38.326592+00:00 Debian Importer Fixing VCID-6n32-z9u6-gfch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:21.764489+00:00 Debian Importer Fixing VCID-887n-3662-zfba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:02.573702+00:00 Debian Importer Fixing VCID-xxhg-up2k-yyhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:00.710494+00:00 Debian Importer Fixing VCID-eyg8-qhra-ukcj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:03:08.083832+00:00 Debian Importer Fixing VCID-tsfh-mjd5-cuch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:03:05.245454+00:00 Debian Importer Fixing VCID-khrd-ya2n-rygv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:02:50.244634+00:00 Debian Importer Fixing VCID-qffu-7n92-bbhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:02:45.048861+00:00 Debian Importer Fixing VCID-6r1j-pnmx-mkdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:02:37.261471+00:00 Debian Importer Fixing VCID-vmvf-81ex-yug4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:02:34.468202+00:00 Debian Importer Fixing VCID-rwfc-mzfg-akft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:41.845158+00:00 Debian Importer Fixing VCID-gvya-5wgk-j3cv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:32.960446+00:00 Debian Importer Fixing VCID-kcca-um99-4ugp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:25.690258+00:00 Debian Importer Fixing VCID-t644-dxrr-2qhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:20.967829+00:00 Debian Importer Fixing VCID-drqe-npyk-5yfa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:01:06.987322+00:00 Debian Importer Fixing VCID-jx72-vpup-p3gk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:55.952187+00:00 Debian Importer Fixing VCID-kv4f-h7zy-2yhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:51.455471+00:00 Debian Importer Fixing VCID-e6th-hujj-6bby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:46.591676+00:00 Debian Importer Fixing VCID-8b4z-nus3-c7h8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:30.639780+00:00 Debian Importer Fixing VCID-c42q-j659-e3gt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:27.049422+00:00 Debian Importer Fixing VCID-8bmx-4nbw-6qcn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:22.601006+00:00 Debian Importer Fixing VCID-z18v-yptf-7fhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:09.678819+00:00 Debian Importer Fixing VCID-fhme-yjgr-suep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:03.185396+00:00 Debian Importer Fixing VCID-9zxp-tyb1-ubg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:45.167763+00:00 Debian Importer Fixing VCID-nbnz-q819-f7g8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:36.736359+00:00 Debian Importer Fixing VCID-t2sv-vqq2-q7av https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:17.374062+00:00 Debian Importer Fixing VCID-ba6k-mvxj-8udm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:15.209297+00:00 Debian Importer Fixing VCID-vz1n-7fbk-kyag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:06.504313+00:00 Debian Importer Fixing VCID-e42z-ac66-gye3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:59:01.253936+00:00 Debian Importer Fixing VCID-jtnv-mefv-qqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:58:56.358554+00:00 Debian Importer Fixing VCID-wjeh-m3f2-tkbg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:58:18.711386+00:00 Debian Importer Fixing VCID-5gv4-c26w-gube https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:58:01.728926+00:00 Debian Importer Fixing VCID-b9uq-ggy1-eyan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:52.905307+00:00 Debian Importer Fixing VCID-yr96-2nha-xbed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:41.929327+00:00 Debian Importer Fixing VCID-yp8m-zttt-ffdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:34.567725+00:00 Debian Importer Fixing VCID-x226-2yqa-uuhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:29.111901+00:00 Debian Importer Fixing VCID-3ktq-cbhp-8fhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:20.497092+00:00 Debian Importer Fixing VCID-98mp-5h68-73eg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:57:00.053475+00:00 Debian Importer Fixing VCID-v8xr-k446-8uar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:56:15.597130+00:00 Debian Importer Fixing VCID-z711-tvkz-9qa4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:56:14.753057+00:00 Debian Importer Fixing VCID-w53c-hafw-6kbb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:56:01.627189+00:00 Debian Importer Fixing VCID-jupy-x3sh-vqcp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:40.149262+00:00 Debian Importer Fixing VCID-21jy-g45u-c7gp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:39.177751+00:00 Debian Importer Fixing VCID-n1tb-u9us-57bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:27.430304+00:00 Debian Importer Fixing VCID-j8yy-3tn1-63b5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:17.966455+00:00 Debian Importer Fixing VCID-4kbk-38g4-6kb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:07.000235+00:00 Debian Importer Fixing VCID-348f-73cd-37h6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:58.868573+00:00 Debian Importer Fixing VCID-tc63-4q6e-nker https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:54.972602+00:00 Debian Importer Fixing VCID-nfcw-pgwv-37dr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:51.436702+00:00 Debian Importer Fixing VCID-ahvx-mjgn-5fa8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:09.415820+00:00 Debian Importer Fixing VCID-mgjc-55mm-kffq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:54:00.307654+00:00 Debian Importer Fixing VCID-jbyd-zxvz-mkf2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:28.626345+00:00 Debian Importer Fixing VCID-vtwb-e5mq-6bgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:21.801619+00:00 Debian Importer Fixing VCID-hjf7-23wz-1qeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:18.372013+00:00 Debian Importer Fixing VCID-k1eg-sz6t-skg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:53:02.840240+00:00 Debian Importer Fixing VCID-1rd4-nsvv-6bfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:52:58.445936+00:00 Debian Importer Fixing VCID-xs4a-ha3z-2bej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:52:12.074687+00:00 Debian Importer Fixing VCID-kj4q-41ch-2bdx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:52:11.322080+00:00 Debian Importer Fixing VCID-6pmw-nqja-affb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:52:03.680405+00:00 Debian Importer Fixing VCID-abcd-nfuq-2kc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:51:38.475404+00:00 Debian Importer Fixing VCID-9azr-qrcs-k7by https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:51:33.201767+00:00 Debian Importer Fixing VCID-ete6-ycnw-7kgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:51:22.089805+00:00 Debian Importer Fixing VCID-kye7-8mwh-eyc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:52.079125+00:00 Debian Importer Fixing VCID-8edx-kmgw-jue5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:33.349299+00:00 Debian Importer Fixing VCID-dcd5-4y9y-euf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:25.738264+00:00 Debian Importer Fixing VCID-72pd-9p33-9qhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:58.295863+00:00 Debian Importer Fixing VCID-zufu-pwxh-eqbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:41.728138+00:00 Debian Importer Fixing VCID-24dm-m1bk-t7fv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:31.004543+00:00 Debian Importer Fixing VCID-7ejt-hdra-93ez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:29.685628+00:00 Debian Importer Fixing VCID-zs1j-hpbv-7qbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:10.814729+00:00 Debian Importer Fixing VCID-4bsb-hypz-5bav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:04.143606+00:00 Debian Importer Fixing VCID-ukr2-rp6y-rkf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:01.844174+00:00 Debian Importer Fixing VCID-98y4-8sve-mfbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:48:58.695900+00:00 Debian Importer Fixing VCID-fvhu-1xqw-fkbk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:48:42.023718+00:00 Debian Importer Fixing VCID-6hf1-vsj3-a3h5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:48:40.513887+00:00 Debian Importer Fixing VCID-8xdj-ys7r-rffm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:48:28.839306+00:00 Debian Importer Fixing VCID-2369-8134-y3ck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:42.369042+00:00 Debian Importer Fixing VCID-3yg6-7zfv-gkaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:33.172764+00:00 Debian Importer Fixing VCID-exhn-kypt-2fbd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:23.441112+00:00 Debian Importer Fixing VCID-1ygk-whua-gbcq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:17.478260+00:00 Debian Importer Fixing VCID-fufn-uqtv-wkas https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:16.666030+00:00 Debian Importer Fixing VCID-es8r-wvmz-gfe6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:09.057859+00:00 Debian Importer Fixing VCID-eetb-e929-77bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:47.107535+00:00 Debian Importer Fixing VCID-sq9c-y7kc-1yga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:43.376589+00:00 Debian Importer Fixing VCID-ubyx-g9qc-x7dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:32.540556+00:00 Debian Importer Fixing VCID-bnbm-zhck-yfex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:21.644636+00:00 Debian Importer Fixing VCID-yr2z-pe4g-8yhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:20.746436+00:00 Debian Importer Fixing VCID-d5cu-m235-x3gr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:46:00.060775+00:00 Debian Importer Fixing VCID-a36h-pqj3-9bhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:45:27.945460+00:00 Debian Importer Fixing VCID-1dxt-yy4z-y7cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:45:26.464525+00:00 Debian Importer Fixing VCID-9qhe-6xhk-hfhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:45:22.052282+00:00 Debian Importer Fixing VCID-mp87-833h-4uag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:45:16.522792+00:00 Debian Importer Fixing VCID-xd76-s5yw-fyaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:44:32.490312+00:00 Debian Importer Fixing VCID-4fhj-v5ut-eubv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:44:15.135413+00:00 Debian Importer Fixing VCID-hucp-gu2u-97e1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:44:09.616209+00:00 Debian Importer Fixing VCID-2s7e-4bym-cbe1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:44:04.759920+00:00 Debian Importer Fixing VCID-2198-cz4u-87hu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:58.114005+00:00 Debian Importer Fixing VCID-8q49-pygk-33d1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:56.472831+00:00 Debian Importer Fixing VCID-p1cz-e94f-57c2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:49.131223+00:00 Debian Importer Fixing VCID-w8r5-decj-vkem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:41.551980+00:00 Debian Importer Fixing VCID-v4ds-msgy-m3bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:38.973957+00:00 Debian Importer Fixing VCID-m35k-ahnu-abh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:30.310785+00:00 Debian Importer Fixing VCID-fmjc-a468-fffw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:10.104137+00:00 Debian Importer Fixing VCID-pg2a-j1hc-83hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:00.126456+00:00 Debian Importer Fixing VCID-4qx6-ysye-efhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:40.657918+00:00 Debian Importer Fixing VCID-214g-9hfm-wqbk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:24.355758+00:00 Debian Importer Fixing VCID-4eg9-yh2g-a7gc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:22.462615+00:00 Debian Importer Fixing VCID-nwn5-d5f1-rkbr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:16.369882+00:00 Debian Importer Fixing VCID-1g53-791b-8fd7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:05.682886+00:00 Debian Importer Fixing VCID-h7tb-d7q2-pqcr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:41:39.283070+00:00 Debian Importer Fixing VCID-g7k7-e2h7-a7f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:41:37.379342+00:00 Debian Importer Fixing VCID-cs7h-d7vk-73ab https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:41:21.590796+00:00 Debian Importer Fixing VCID-cvw6-a674-zfa9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:40:22.080251+00:00 Debian Importer Fixing VCID-g162-81ms-93g7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:40:06.524831+00:00 Debian Importer Fixing VCID-syxu-a4az-qfe4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:39:59.935406+00:00 Debian Importer Fixing VCID-vrz9-k2a3-4uep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:39:56.052436+00:00 Debian Importer Fixing VCID-wd2z-jnpt-3bd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:57.952948+00:00 Debian Importer Fixing VCID-v1ka-ynm7-q3cw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:45.351006+00:00 Debian Importer Fixing VCID-q7a3-cm2m-ayga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:42.766896+00:00 Debian Importer Fixing VCID-9sm6-shj5-cqh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:41.212896+00:00 Debian Importer Fixing VCID-ezwh-qc41-pugn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:30.164876+00:00 Debian Importer Fixing VCID-7dx8-ys84-zuac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:23.731627+00:00 Debian Importer Fixing VCID-qje4-3svy-5kg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:20.543185+00:00 Debian Importer Fixing VCID-5gz4-1ysh-2qf7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:03.467502+00:00 Debian Importer Fixing VCID-e2wu-3vmz-3yae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:56.529536+00:00 Debian Importer Fixing VCID-aawx-4bwq-5ubw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:37.035681+00:00 Debian Importer Fixing VCID-ypt7-tc1u-p3ev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:31.461994+00:00 Debian Importer Fixing VCID-p595-1qtr-tuae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:25.887627+00:00 Debian Importer Fixing VCID-f1r5-rt1y-jkd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:15.833245+00:00 Debian Importer Fixing VCID-25nt-fa4m-97fm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:37:01.933410+00:00 Debian Importer Fixing VCID-m21d-1mj4-3bbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:36:41.226333+00:00 Debian Importer Fixing VCID-21z5-p9ct-p7g2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:36:39.502034+00:00 Debian Importer Fixing VCID-hv12-tgt6-rub5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:36:19.043751+00:00 Debian Importer Fixing VCID-qjup-fvr1-xybc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:36:13.585102+00:00 Debian Importer Fixing VCID-mjbb-q1nx-8fgj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:56.129130+00:00 Debian Importer Fixing VCID-xhfy-gkwq-afbr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:47.861443+00:00 Debian Importer Fixing VCID-rkqz-erqh-dfh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:45.221611+00:00 Debian Importer Fixing VCID-xag6-3jdm-bqha https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:43.397439+00:00 Debian Importer Fixing VCID-wvp8-cst3-cuhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:39.870481+00:00 Debian Importer Fixing VCID-tspb-2q9s-u3d6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:34.261681+00:00 Debian Importer Fixing VCID-f2ce-pung-aqgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:14.101053+00:00 Debian Importer Fixing VCID-wnh7-18vz-vbgn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:35:00.287453+00:00 Debian Importer Fixing VCID-qxth-4ftd-s3ac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:56.663249+00:00 Debian Importer Fixing VCID-7r8h-rr9v-7qht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:46.834447+00:00 Debian Importer Fixing VCID-bq18-jcph-kkhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:44.165287+00:00 Debian Importer Fixing VCID-y13n-jhsr-ryd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:33.812476+00:00 Debian Importer Fixing VCID-38ja-dsj5-qyfc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:30.511559+00:00 Debian Importer Fixing VCID-nw3c-5apn-zfhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:09.710757+00:00 Debian Importer Fixing VCID-dzye-v1vd-gybq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:06.700526+00:00 Debian Importer Fixing VCID-t5z7-w31u-j7gs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:01.718102+00:00 Debian Importer Fixing VCID-1hvg-tmga-nfhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:46.387104+00:00 Debian Importer Fixing VCID-ppyy-4rvt-gydv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:43.657450+00:00 Debian Importer Fixing VCID-e2vy-prvw-xkhq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:39.849701+00:00 Debian Importer Fixing VCID-341t-wy9a-p7fz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:29.270549+00:00 Debian Importer Fixing VCID-v2y7-vmt3-w3dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:25.145283+00:00 Debian Importer Fixing VCID-63m2-phjq-kuav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:13.858317+00:00 Debian Importer Fixing VCID-7v4n-4x85-dygx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:13.083765+00:00 Debian Importer Fixing VCID-zamd-w45x-e3g5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:33:01.439664+00:00 Debian Importer Fixing VCID-p472-z1xz-r3cj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:57.817919+00:00 Debian Importer Fixing VCID-6ejs-59g2-xkgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:54.505235+00:00 Debian Importer Fixing VCID-p72b-szhh-wyd6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:52.172232+00:00 Debian Importer Fixing VCID-y439-52f2-rfck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:20.683223+00:00 Debian Importer Fixing VCID-dav4-474s-33hg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:19.951820+00:00 Debian Importer Fixing VCID-rq73-h79m-hqhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:32:11.404854+00:00 Debian Importer Fixing VCID-jgaw-mgbm-sfaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:31:46.278089+00:00 Debian Importer Fixing VCID-4mqx-42ea-53c3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:31:37.546015+00:00 Debian Importer Fixing VCID-8ssr-76q5-6kf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:31:17.301440+00:00 Debian Importer Fixing VCID-bq5a-jeg3-9ua7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:31:03.571373+00:00 Debian Importer Fixing VCID-ntqj-fmmb-b3g8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:57.662318+00:00 Debian Importer Fixing VCID-u8gh-ber8-q3dw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:55.007017+00:00 Debian Importer Fixing VCID-94ha-pwzk-dbdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:49.309820+00:00 Debian Importer Fixing VCID-m7cd-jefr-4ydy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:47.620555+00:00 Debian Importer Fixing VCID-7vdf-qwa1-ubeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:25.899441+00:00 Debian Importer Fixing VCID-3pv5-s5r1-vkdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:04.126785+00:00 Debian Importer Fixing VCID-vz73-y2va-5kbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:59.556518+00:00 Debian Importer Fixing VCID-9axb-sz3w-ubcx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:57.435409+00:00 Debian Importer Fixing VCID-wxx7-3a43-h7gh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:55.335357+00:00 Debian Importer Fixing VCID-7hpf-k162-1ubu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:51.060232+00:00 Debian Importer Fixing VCID-puhc-5h95-13ff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:48.814035+00:00 Debian Importer Fixing VCID-6hur-ug1s-83am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:44.892063+00:00 Debian Importer Fixing VCID-cayc-j15f-ekdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:43.393813+00:00 Debian Importer Fixing VCID-qwre-yeev-uya8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:38.872049+00:00 Debian Importer Fixing VCID-t8we-jmxu-k3bf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:30.224203+00:00 Debian Importer Fixing VCID-m4y2-16uk-wkdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:17.810881+00:00 Debian Importer Fixing VCID-huh6-94c8-rkad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:16.157604+00:00 Debian Importer Fixing VCID-t5y5-2hne-7keh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:06.825392+00:00 Debian Importer Fixing VCID-5j3a-r6pk-2kdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:28:16.891767+00:00 Debian Importer Fixing VCID-wax6-n8k7-9fab https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:28:14.884033+00:00 Debian Importer Fixing VCID-esup-2y63-afa4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:28:05.828081+00:00 Debian Importer Fixing VCID-e57d-cw7e-73an https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:53.794570+00:00 Debian Importer Fixing VCID-xncx-nvr7-k7d8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:46.693389+00:00 Debian Importer Fixing VCID-z9yn-4b8y-t3er https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:44.052690+00:00 Debian Importer Fixing VCID-9cuj-t2sc-bbdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:34.900734+00:00 Debian Importer Fixing VCID-vrfu-1kn8-x3be https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:32.182783+00:00 Debian Importer Fixing VCID-yf6e-3aw3-tqeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:29.171356+00:00 Debian Importer Fixing VCID-92j7-p476-97ca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:26.353628+00:00 Debian Importer Fixing VCID-kptu-sm1d-kuae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:24.016049+00:00 Debian Importer Fixing VCID-a8ja-eegd-yqhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:15.248995+00:00 Debian Importer Fixing VCID-33re-7rh6-2bg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:07.968263+00:00 Debian Importer Fixing VCID-asy4-m48b-xydu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:27:00.659241+00:00 Debian Importer Fixing VCID-ds3w-wph8-7kam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:56.157455+00:00 Debian Importer Fixing VCID-8d9a-bf6e-dkga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:49.801375+00:00 Debian Importer Fixing VCID-k68k-tnns-mkga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:46.745808+00:00 Debian Importer Fixing VCID-724j-jc6b-5uba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:35.625290+00:00 Debian Importer Fixing VCID-1zbm-pnj5-xqb4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:08.500413+00:00 Debian Importer Fixing VCID-ajr2-wmhj-fbbj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:26:00.471719+00:00 Debian Importer Fixing VCID-w4d7-nppw-pye9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:58.140403+00:00 Debian Importer Fixing VCID-x245-d866-nkff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:44.743375+00:00 Debian Importer Fixing VCID-2cux-cw1j-43hw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:38.916142+00:00 Debian Importer Fixing VCID-5zuy-q1p8-hqex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:23.306426+00:00 Debian Importer Fixing VCID-mzw8-vbmv-6yay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:19.249580+00:00 Debian Importer Fixing VCID-sne8-13hq-mqan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:17.858615+00:00 Debian Importer Fixing VCID-p6sm-vcng-mubd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:17.070604+00:00 Debian Importer Fixing VCID-kbc5-2ek1-gfbd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:11.392600+00:00 Debian Importer Fixing VCID-kn25-f6gk-93fd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:07.946647+00:00 Debian Importer Fixing VCID-9cpj-kd98-33bz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:57.260597+00:00 Debian Importer Fixing VCID-gyzx-musu-83c4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:54.083031+00:00 Debian Importer Fixing VCID-6tb9-nnj3-57gv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:45.504191+00:00 Debian Importer Fixing VCID-vt3e-tx5j-b7aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:37.057073+00:00 Debian Importer Fixing VCID-p4nk-v455-puaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:17.770642+00:00 Debian Importer Fixing VCID-nrff-k45r-y7bj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:08.082333+00:00 Debian Importer Fixing VCID-v9p4-t339-t3g4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:57.143810+00:00 Debian Importer Fixing VCID-mt8z-wdzf-kugb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:54.541498+00:00 Debian Importer Fixing VCID-pnfa-xm28-w3bk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:52.417921+00:00 Debian Importer Fixing VCID-5nsy-fndc-7ka8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:45.989689+00:00 Debian Importer Fixing VCID-cecv-w1gr-qkbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:40.943651+00:00 Debian Importer Fixing VCID-n5aj-87mh-hbbd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:33.643910+00:00 Debian Importer Fixing VCID-rsz5-e5fc-syh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:29.915504+00:00 Debian Importer Fixing VCID-5hrr-xvrw-ebd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:24.584084+00:00 Debian Importer Fixing VCID-cwnm-um2n-17cw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:23.629249+00:00 Debian Importer Fixing VCID-e4jw-y3k8-r7ec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:17.930270+00:00 Debian Importer Fixing VCID-sv8j-57vx-9ubs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:07.681083+00:00 Debian Importer Fixing VCID-apfq-mqch-jkgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:23:00.624929+00:00 Debian Importer Fixing VCID-tb3q-ndrt-mkg3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:55.783843+00:00 Debian Importer Fixing VCID-dda8-c6rr-sqgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:51.157700+00:00 Debian Importer Fixing VCID-rup3-z1qu-j3hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:50.362616+00:00 Debian Importer Fixing VCID-qx21-w7wn-tqap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:43.857558+00:00 Debian Importer Fixing VCID-16bv-9gad-pkat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:38.410228+00:00 Debian Importer Fixing VCID-ttde-y49k-eqdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:36.670925+00:00 Debian Importer Fixing VCID-mkw6-9tye-x3fb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:34.194475+00:00 Debian Importer Fixing VCID-3vk2-4sx1-aybu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:31.777047+00:00 Debian Importer Fixing VCID-hwat-fnmq-vydn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:24.116495+00:00 Debian Importer Fixing VCID-etb2-844u-jfdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:21.780227+00:00 Debian Importer Fixing VCID-9tb7-5mp1-pkhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:21.108440+00:00 Debian Importer Fixing VCID-fhxv-d8du-rbgk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:18.762110+00:00 Debian Importer Fixing VCID-wkqf-ex7a-73ft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:17.368315+00:00 Debian Importer Fixing VCID-vaaz-21uq-gbc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:16.469714+00:00 Debian Importer Fixing VCID-bkp8-m2yc-qub7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:02.706296+00:00 Debian Importer Fixing VCID-sdwv-6ycc-9ubh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:01.950341+00:00 Debian Importer Fixing VCID-d83g-5tdr-7fd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:22:00.802580+00:00 Debian Importer Fixing VCID-ucab-wj54-hyey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:58.069124+00:00 Debian Importer Fixing VCID-qdxg-kymb-mqdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:50.250665+00:00 Debian Importer Fixing VCID-tnur-avf1-sybe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:48.097396+00:00 Debian Importer Fixing VCID-n8y5-74xq-f7ft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:44.775101+00:00 Debian Importer Fixing VCID-mtxh-7f6h-t3g4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:42.905474+00:00 Debian Importer Fixing VCID-2kan-b4em-f3fg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:42.044866+00:00 Debian Importer Fixing VCID-fvam-jks7-jkbt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:39.427760+00:00 Debian Importer Fixing VCID-exkc-gh4x-p3bh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:30.516632+00:00 Debian Importer Fixing VCID-cp52-z8dw-gfhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:14.031973+00:00 Debian Importer Fixing VCID-64g2-43qf-5qg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:05.810473+00:00 Debian Importer Fixing VCID-v41b-jva8-u7at https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:21:02.589245+00:00 Debian Importer Fixing VCID-9sqm-1ubb-zqhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:20:41.905392+00:00 Debian Importer Fixing VCID-2kk2-cj4m-6ucm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:20:40.562337+00:00 Debian Importer Fixing VCID-j5zr-w83u-q7ds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:20:36.218002+00:00 Debian Importer Fixing VCID-82py-ut98-qfb3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:20:13.634184+00:00 Debian Importer Fixing VCID-gtzq-1g5y-tkh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:20:06.579946+00:00 Debian Importer Fixing VCID-9qfp-tkn1-uqa8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:19:55.470524+00:00 Debian Importer Fixing VCID-a5tz-dm6g-zqch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:19:51.755477+00:00 Debian Importer Fixing VCID-rxej-y11f-tbca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:19:21.079305+00:00 Debian Importer Fixing VCID-4s4m-bf1u-tyht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:19:16.074997+00:00 Debian Importer Fixing VCID-8ud8-f75a-jyew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:18:56.875455+00:00 Debian Importer Fixing VCID-a89e-bca3-1qfg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:18:30.512995+00:00 Debian Importer Fixing VCID-pd3f-rmqx-cya3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:42.521777+00:00 Debian Importer Fixing VCID-fx2q-84en-qyah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:20.422009+00:00 Debian Importer Fixing VCID-3ng4-wb1y-wyem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:11.295951+00:00 Debian Importer Fixing VCID-wcu7-me4d-bugc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:17:04.995316+00:00 Debian Importer Fixing VCID-5hdv-pgsr-cfbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:16:52.707756+00:00 Debian Importer Fixing VCID-2e99-ge3p-13eq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:16:34.566071+00:00 Debian Importer Fixing VCID-gkhm-29a6-7uc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:16:05.018791+00:00 Debian Importer Fixing VCID-cbrz-vaxe-b3dt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:57.191647+00:00 Debian Importer Fixing VCID-vejg-5n4z-c7e8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:48.136646+00:00 Debian Importer Fixing VCID-rjgp-ta5t-vqge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:43.600657+00:00 Debian Importer Fixing VCID-f2u9-7eeg-e7cg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:41.295402+00:00 Debian Importer Fixing VCID-3eb4-ca4c-5qf7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:40.266349+00:00 Debian Importer Fixing VCID-atux-q6hk-hfau https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:28.745933+00:00 Debian Importer Fixing VCID-yj28-va7b-3ug8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:14:58.716623+00:00 Debian Importer Fixing VCID-yx9t-1w27-akec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:14:57.043667+00:00 Debian Importer Fixing VCID-cqrs-uu2s-affj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:14:26.820533+00:00 Debian Importer Fixing VCID-ew57-csay-bube https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:14:11.341929+00:00 Debian Importer Fixing VCID-tfg7-cn7k-ffaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:13:43.681263+00:00 Debian Importer Fixing VCID-4n9m-77qv-fuaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:12:59.122281+00:00 Debian Importer Fixing VCID-4uvy-ga5j-a7g3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:12:56.475076+00:00 Debian Importer Fixing VCID-bxaj-dwje-sbhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:12:24.592551+00:00 Debian Importer Fixing VCID-6cqc-um2d-1kfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:12:22.140504+00:00 Debian Importer Fixing VCID-hu4f-e8qk-8fbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:12:21.396165+00:00 Debian Importer Fixing VCID-99f9-ne8p-d7c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:11:52.357523+00:00 Debian Importer Fixing VCID-3ccs-8xaf-wfgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:11:44.741938+00:00 Debian Importer Fixing VCID-r23v-vjat-6qdk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:11:10.317344+00:00 Debian Importer Fixing VCID-q2nc-hdcj-gfdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:11:09.526512+00:00 Debian Importer Fixing VCID-p2ng-3bek-d3b6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:10:57.301774+00:00 Debian Importer Fixing VCID-cqye-p3y7-bfdp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T17:52:24.860555+00:00 Debian Importer Fixing VCID-nsbf-fkcw-cbed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:24:25.852053+00:00 Debian Importer Fixing VCID-cvps-1xf8-kqb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:23:34.785049+00:00 Debian Importer Fixing VCID-ner2-8g1r-6bh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:23:21.317355+00:00 Debian Importer Fixing VCID-dqp6-k3du-n3ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:23:06.616142+00:00 Debian Importer Fixing VCID-ka7q-cx4u-rkar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:23:05.898918+00:00 Debian Importer Fixing VCID-76zh-5x51-kffx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:55.712828+00:00 Debian Importer Fixing VCID-1ajk-6gxr-efgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:45.279294+00:00 Debian Importer Fixing VCID-wanj-gu4w-2qaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:41.808314+00:00 Debian Importer Fixing VCID-1n5v-auw6-wbcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:06.307982+00:00 Debian Importer Fixing VCID-wc4k-86v7-ykh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:22:03.747046+00:00 Debian Importer Fixing VCID-hh8s-8fc8-pkgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:21:22.966784+00:00 Debian Importer Fixing VCID-a2jn-1xhp-9fg3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:21:17.406097+00:00 Debian Importer Fixing VCID-868a-udb4-qfbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:21:03.358519+00:00 Debian Importer Fixing VCID-93yj-3vbb-3ub5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:21:02.234170+00:00 Debian Importer Fixing VCID-v3m5-xj2s-5yef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:20:45.850332+00:00 Debian Importer Fixing VCID-ecc5-64vs-ekgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:20:33.201243+00:00 Debian Importer Fixing VCID-bpmy-u7wr-kude https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:52.504622+00:00 Debian Importer Fixing VCID-gqbd-ybcp-jybq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:47.833987+00:00 Debian Importer Fixing VCID-g75p-x4da-efdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:44.245474+00:00 Debian Importer Fixing VCID-rffh-vskt-b7ga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:33.446322+00:00 Debian Importer Fixing VCID-hfq2-r9mw-p3cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:18.828840+00:00 Debian Importer Fixing VCID-9kuz-7fag-4qhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:18:00.753238+00:00 Debian Importer Fixing VCID-25ja-vd4z-3ffc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:17:49.203801+00:00 Debian Importer Fixing VCID-y5ds-5mpf-u3hz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:17:36.220278+00:00 Debian Importer Fixing VCID-yrgr-2c4c-3fgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:17:29.057941+00:00 Debian Importer Fixing VCID-5v5u-d5mg-53bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:17:23.937046+00:00 Debian Importer Fixing VCID-a6ke-6716-fker https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:48.412202+00:00 Debian Importer Fixing VCID-gv7r-71cz-e3cz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:27.633392+00:00 Debian Importer Fixing VCID-wq4h-q7vt-23ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:19.916797+00:00 Debian Importer Fixing VCID-z4yz-sjm9-3ke4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:10.537567+00:00 Debian Importer Fixing VCID-cfms-gd2h-v7gd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:16:01.302437+00:00 Debian Importer Fixing VCID-ytfc-yqtw-4yhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:15:48.767548+00:00 Debian Importer Fixing VCID-cxtx-363a-ufhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:15:07.549067+00:00 Debian Importer Fixing VCID-c3wk-9gm2-fkeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:13:56.477045+00:00 Debian Importer Fixing VCID-fe76-s8g9-zuar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:13:42.061967+00:00 Debian Importer Fixing VCID-a1rd-xu94-9bad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:13:15.810085+00:00 Debian Importer Fixing VCID-p4p8-hzzp-ake1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:13:05.715391+00:00 Debian Importer Fixing VCID-ncy9-6whk-ckep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:12:56.750391+00:00 Debian Importer Fixing VCID-qmuk-1txu-z3da https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:12:51.487938+00:00 Debian Importer Fixing VCID-nsa2-qgf5-xffq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:12:10.181319+00:00 Debian Importer Fixing VCID-edst-7exd-zud8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:12:01.094035+00:00 Debian Importer Fixing VCID-zh6a-z135-ayeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:11:59.398829+00:00 Debian Importer Fixing VCID-w4u7-5ke3-57a7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:11:30.230126+00:00 Debian Importer Fixing VCID-kpkx-qwue-bff4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:11:24.999275+00:00 Debian Importer Fixing VCID-szdg-jd74-r7g1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:11:16.754055+00:00 Debian Importer Fixing VCID-vsyg-x46t-ayhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:09:54.645868+00:00 Debian Importer Fixing VCID-wstb-4k78-gufv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:09:45.820325+00:00 Debian Importer Fixing VCID-fsjs-fmwz-x3bd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:09:36.707799+00:00 Debian Importer Fixing VCID-1yba-pq6x-qkh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:09:31.878758+00:00 Debian Importer Fixing VCID-hxj2-cvvc-tqec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:08:49.556334+00:00 Debian Importer Fixing VCID-gm3e-d4pv-53aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:08:42.212357+00:00 Debian Importer Fixing VCID-kx5p-87fs-9kgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:08:32.355236+00:00 Debian Importer Fixing VCID-4t4h-a2xy-h7bg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:08:31.353896+00:00 Debian Importer Fixing VCID-susc-ysbn-eqbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:07:29.089094+00:00 Debian Importer Fixing VCID-1fca-q7wb-u3cx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:07:21.266380+00:00 Debian Importer Fixing VCID-z4xx-msk4-k7bz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:06:28.385666+00:00 Debian Importer Fixing VCID-pk74-dafk-e3gj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:06:17.306538+00:00 Debian Importer Fixing VCID-k3bt-ws28-e3ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:04:08.969899+00:00 Debian Importer Fixing VCID-z423-786s-hyd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:03:36.848095+00:00 Debian Importer Fixing VCID-37t1-1qg2-hqc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:03:33.782688+00:00 Debian Importer Fixing VCID-xc83-2865-7bgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:03:32.078515+00:00 Debian Importer Fixing VCID-s9mp-wsn8-cycf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:02:57.672908+00:00 Debian Importer Fixing VCID-hmmv-61tn-nkc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:02:42.494033+00:00 Debian Importer Fixing VCID-e9d9-jb9v-jufv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:01:44.869445+00:00 Debian Importer Fixing VCID-nv5d-ux4k-gbck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:01:30.794967+00:00 Debian Importer Fixing VCID-4qwu-fw8y-t7et https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:01:07.770791+00:00 Debian Importer Fixing VCID-5eks-kg2z-5ye1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:58.631359+00:00 Debian Importer Fixing VCID-rayk-m71k-pkd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:54.070051+00:00 Debian Importer Fixing VCID-rudf-s931-1qct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:50.772356+00:00 Debian Importer Fixing VCID-f5xt-m6qt-43ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:38.630935+00:00 Debian Importer Fixing VCID-a1xg-dyn3-skb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:25.181648+00:00 Debian Importer Fixing VCID-5g2a-qj5r-uub4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:00:10.812961+00:00 Debian Importer Fixing VCID-vqmu-xn3y-e3gc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:59:51.021804+00:00 Debian Importer Fixing VCID-2nz8-mxwk-dyfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:59:39.465030+00:00 Debian Importer Fixing VCID-k48g-n4ka-fugh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:59:06.275647+00:00 Debian Importer Fixing VCID-7ey4-wrhk-zfce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:58:37.929193+00:00 Debian Importer Fixing VCID-yq9b-dpsh-cuhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:58:31.106024+00:00 Debian Importer Fixing VCID-n4p8-dgkk-3bfr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:58:29.227131+00:00 Debian Importer Fixing VCID-71m1-rn5c-k3hm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:58:27.760703+00:00 Debian Importer Fixing VCID-qg8t-cx91-c7e3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:57:53.130471+00:00 Debian Importer Fixing VCID-kg8v-183b-33ce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:57:49.155288+00:00 Debian Importer Fixing VCID-w71f-nskm-nyau https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:57:45.928984+00:00 Debian Importer Fixing VCID-n7w6-5y7w-gbcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:57:30.735910+00:00 Debian Importer Fixing VCID-yehk-tjrt-rbbe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:56:34.621214+00:00 Debian Importer Fixing VCID-dfj9-5xtt-qba4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:56:21.368864+00:00 Debian Importer Fixing VCID-zrf8-efng-gfd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:56:14.176794+00:00 Debian Importer Fixing VCID-6r4x-xaaf-b7ft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:50.607847+00:00 Debian Importer Fixing VCID-4wyy-uw7z-5be9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:48.201763+00:00 Debian Importer Fixing VCID-nhry-edgk-sbd6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:20.201706+00:00 Debian Importer Fixing VCID-ex9p-euhg-aybf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:12.411162+00:00 Debian Importer Fixing VCID-9ns9-s6pf-d7hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:02.300566+00:00 Debian Importer Fixing VCID-y4w2-qru6-p3g4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:55:00.198809+00:00 Debian Importer Fixing VCID-7j8j-s3am-6bgv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:53:55.916294+00:00 Debian Importer Fixing VCID-sk93-hxg5-yffv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:53:54.957978+00:00 Debian Importer Fixing VCID-ug5j-gaab-kuag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:53:50.933406+00:00 Debian Importer Fixing VCID-dtzb-vs94-3ygt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:53:44.764616+00:00 Debian Importer Fixing VCID-sv2x-sud7-9fcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:53:43.802272+00:00 Debian Importer Fixing VCID-93jq-59ak-xygv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:53:36.006358+00:00 Debian Importer Fixing VCID-k29n-spa9-uqdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:58.726262+00:00 Debian Importer Fixing VCID-rw71-ued5-jfg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:57.725553+00:00 Debian Importer Fixing VCID-ahsf-n2te-bfa2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:56.415090+00:00 Debian Importer Fixing VCID-td5e-4c6y-cyc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:55.359648+00:00 Debian Importer Fixing VCID-dsrd-nv6n-5ygq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:47.386858+00:00 Debian Importer Fixing VCID-zyme-v3xf-3kah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:39.181041+00:00 Debian Importer Fixing VCID-z1gu-rwfd-7yfa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:37.323612+00:00 Debian Importer Fixing VCID-pwd1-juze-77bx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:32.392073+00:00 Debian Importer Fixing VCID-vysr-bztb-yugx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:27.680290+00:00 Debian Importer Fixing VCID-uzsb-9yx8-kua1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:22.243773+00:00 Debian Importer Fixing VCID-vwmn-w6tb-sudq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:12.935864+00:00 Debian Importer Fixing VCID-bf5y-rqaa-afc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:08.025374+00:00 Debian Importer Fixing VCID-9ej7-7tra-zqcm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:51:55.007883+00:00 Debian Importer Fixing VCID-kdf1-9mq7-2ue6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:51:50.992094+00:00 Debian Importer Fixing VCID-9dms-q8x2-a3em https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:51:45.973242+00:00 Debian Importer Fixing VCID-svm7-nyr5-kfa3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:51:19.832167+00:00 Debian Importer Fixing VCID-vw6j-sby6-dbh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:50:12.634376+00:00 Debian Importer Fixing VCID-8859-uavn-xygj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:50:07.101183+00:00 Debian Importer Fixing VCID-aywj-7j4w-z3au https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:59.706272+00:00 Debian Importer Fixing VCID-a3yj-v3tu-d7ga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:55.219856+00:00 Debian Importer Fixing VCID-yhft-bm7y-jfde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:47.258279+00:00 Debian Importer Fixing VCID-yaz4-szyc-afg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:37.847654+00:00 Debian Importer Fixing VCID-kgsv-ke1m-xkg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:19.708953+00:00 Debian Importer Fixing VCID-yzsh-2rk2-5yhq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:04.937382+00:00 Debian Importer Fixing VCID-mrj8-hhte-77a4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:48:39.110153+00:00 Debian Importer Fixing VCID-c9br-38nh-sfg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:48:34.302865+00:00 Debian Importer Fixing VCID-4ghv-w1sg-77hu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:56.267248+00:00 Debian Importer Fixing VCID-1m9j-m8xz-zqav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:55.284489+00:00 Debian Importer Fixing VCID-ex4p-ftap-h7fe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:48.860680+00:00 Debian Importer Fixing VCID-sjam-bp41-27f4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:34.346497+00:00 Debian Importer Fixing VCID-r99q-4cst-dbem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:24.080683+00:00 Debian Importer Fixing VCID-87gw-ezjs-cqcs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:13.808466+00:00 Debian Importer Fixing VCID-n127-8kq6-1kb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:11:03.377522+00:00 Debian Importer Fixing VCID-4vs9-vhrd-zfgn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:56.975937+00:00 Debian Importer Fixing VCID-17tu-a4wu-b3hv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:56.145959+00:00 Debian Importer Fixing VCID-j9s4-1dar-7qdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:53.557520+00:00 Debian Importer Fixing VCID-9dfd-an6h-67gp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:51.660988+00:00 Debian Importer Fixing VCID-st59-ndz1-1yc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:50.622331+00:00 Debian Importer Fixing VCID-j843-2qbk-tkcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:43.235059+00:00 Debian Importer Fixing VCID-qa1s-pr21-cycs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:37.724062+00:00 Debian Importer Fixing VCID-142k-7wgv-pfh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:29.366127+00:00 Debian Importer Fixing VCID-av2k-qrby-suhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:27.933972+00:00 Debian Importer Fixing VCID-a29y-u4f3-nkfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:26.756996+00:00 Debian Importer Fixing VCID-q8p1-em5q-wuhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:15.006159+00:00 Debian Importer Fixing VCID-nuhs-4sjq-dkcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:12.826235+00:00 Debian Importer Fixing VCID-j1um-9nym-muh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:10:09.729804+00:00 Debian Importer Fixing VCID-ub6v-8wt6-5fbg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:58.058744+00:00 Debian Importer Fixing VCID-4spt-a3n7-z7fu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:47.134272+00:00 Debian Importer Fixing VCID-zx9u-zu1f-gbf2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:45.050733+00:00 Debian Importer Fixing VCID-xafq-y8ca-hkhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:40.658640+00:00 Debian Importer Fixing VCID-1zkc-5ucw-e3et https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:39.307050+00:00 Debian Importer Fixing VCID-7fcn-v6b9-yber https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:38.341603+00:00 Debian Importer Fixing VCID-spab-qnhh-vqap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:33.394881+00:00 Debian Importer Fixing VCID-jfhv-6svu-x3f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:27.812456+00:00 Debian Importer Fixing VCID-m4v3-xfhr-rbgt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:22.301011+00:00 Debian Importer Fixing VCID-tgch-ns3e-qkhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:56.289635+00:00 Debian Importer Fixing VCID-r4zk-9j6t-uyhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:33.016679+00:00 Debian Importer Fixing VCID-wwax-w4gg-cuhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:26.273965+00:00 Debian Importer Fixing VCID-gcqh-ytsa-f7g1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:24.486951+00:00 Debian Importer Fixing VCID-xp23-rfjr-2ydv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:20.910139+00:00 Debian Importer Fixing VCID-gu84-p4ru-b7gj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:08:12.038686+00:00 Debian Importer Fixing VCID-mwv3-k49q-tfeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:54.778833+00:00 Debian Importer Fixing VCID-4nrq-2zch-8uct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:53.893079+00:00 Debian Importer Fixing VCID-qk2m-qzes-qfhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:48.260189+00:00 Debian Importer Fixing VCID-24gw-73zd-3khc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:46.218134+00:00 Debian Importer Fixing VCID-vwnc-y4ve-nkhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:43.416063+00:00 Debian Importer Fixing VCID-jhz4-z9f5-4ka3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:37.773953+00:00 Debian Importer Fixing VCID-ajfm-hpzg-uqck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:07:20.733606+00:00 Debian Importer Fixing VCID-ea36-7v42-fyfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:45.938935+00:00 Debian Importer Fixing VCID-7hxb-dbmf-nufr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:38.844249+00:00 Debian Importer Fixing VCID-4ebq-x7rk-4ya3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:30.485663+00:00 Debian Importer Fixing VCID-uh94-5nuu-w7fd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:29.562720+00:00 Debian Importer Fixing VCID-hx57-qb6n-bfba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:16.840466+00:00 Debian Importer Fixing VCID-vgze-rbc5-bbc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:06:01.358957+00:00 Debian Importer Fixing VCID-9t5k-1w4u-8kep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:50.508184+00:00 Debian Importer Fixing VCID-cn7e-8bbs-rubj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:32.962587+00:00 Debian Importer Fixing VCID-b2kt-hmz5-yuhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:25.343904+00:00 Debian Importer Fixing VCID-gyhz-a9pm-zqav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:18.797781+00:00 Debian Importer Fixing VCID-v893-rr8x-nyay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:17.917663+00:00 Debian Importer Fixing VCID-93ay-73z5-h7er https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:10.629519+00:00 Debian Importer Fixing VCID-c2me-ar1y-y7dw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:09.770421+00:00 Debian Importer Fixing VCID-u28n-uwtv-tyaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:08.971999+00:00 Debian Importer Fixing VCID-3bwh-381p-6qbh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:05:05.613338+00:00 Debian Importer Fixing VCID-e965-zevp-rqgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:04:41.810240+00:00 Debian Importer Fixing VCID-1x2r-t2gj-akgf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:04:40.794635+00:00 Debian Importer Fixing VCID-cear-n94a-jqdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:04:20.554239+00:00 Debian Importer Fixing VCID-5b4f-sket-kuge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:04:05.488656+00:00 Debian Importer Fixing VCID-g3ku-5npc-v7gc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:56.732610+00:00 Debian Importer Fixing VCID-mkjm-756w-5ygt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:46.492185+00:00 Debian Importer Fixing VCID-ptyj-1y6d-dud1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:40.118064+00:00 Debian Importer Fixing VCID-6wrr-yr71-xuhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:28.285850+00:00 Debian Importer Fixing VCID-p4as-tvvw-ubcu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:26.711785+00:00 Debian Importer Fixing VCID-q1ts-48c2-xkgb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:17.155885+00:00 Debian Importer Fixing VCID-tt18-fh9r-57c9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:16.136014+00:00 Debian Importer Fixing VCID-bfjx-x5b3-53bg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:11.605221+00:00 Debian Importer Fixing VCID-7fke-ahd3-e7ac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:10.527544+00:00 Debian Importer Fixing VCID-ans1-wmuz-e3bw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:07.597464+00:00 Debian Importer Fixing VCID-d8ad-6vw9-b7f2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:03:01.178667+00:00 Debian Importer Fixing VCID-enyv-k9c5-bfe4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:02:24.416905+00:00 Debian Importer Fixing VCID-ppgp-v6th-y3ar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:02:21.217484+00:00 Debian Importer Fixing VCID-j9tf-d5qg-6fgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:02:16.756838+00:00 Debian Importer Fixing VCID-wzkm-rtcg-cbdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:41.373280+00:00 Debian Importer Fixing VCID-ey68-cc97-duhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:32.499547+00:00 Debian Importer Fixing VCID-366p-rhcz-8kb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:19.732209+00:00 Debian Importer Fixing VCID-xqpe-25bd-vygx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:18.962343+00:00 Debian Importer Fixing VCID-xb4p-ngcu-m3by https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:17.592698+00:00 Debian Importer Fixing VCID-ffdb-88yu-3be1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:13.154317+00:00 Debian Importer Fixing VCID-m6yv-nu11-ayg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:11.613611+00:00 Debian Importer Fixing VCID-z3qs-q6ce-aqbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:01:02.862699+00:00 Debian Importer Fixing VCID-qzb2-2zd9-5kf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:39.143226+00:00 Debian Importer Fixing VCID-htyr-jnu7-e3gf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:34.602489+00:00 Debian Importer Fixing VCID-ng2z-3hcf-9uh8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:29.994495+00:00 Debian Importer Fixing VCID-c2y9-myfb-s3f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:08.127712+00:00 Debian Importer Fixing VCID-qyxy-uh9d-fqhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:02.748830+00:00 Debian Importer Fixing VCID-ytcn-fxjj-efhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:00:00.725795+00:00 Debian Importer Fixing VCID-ktsr-nq3s-33gt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:56.177371+00:00 Debian Importer Fixing VCID-1n7k-a7ve-8qcr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:44.643113+00:00 Debian Importer Fixing VCID-d3x6-8uek-qkgn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:42.043685+00:00 Debian Importer Fixing VCID-jamx-hf6t-bfcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:35.108055+00:00 Debian Importer Fixing VCID-rbua-nn9a-kfb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:31.606209+00:00 Debian Importer Fixing VCID-nv6q-r1kv-c7e3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:59:24.333896+00:00 Debian Importer Fixing VCID-akq2-c6hp-tfda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:58:42.986252+00:00 Debian Importer Fixing VCID-msbv-kmj8-b7e8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:58:32.497795+00:00 Debian Importer Fixing VCID-kzsr-8hjr-gkf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:58:08.593565+00:00 Debian Importer Fixing VCID-p47c-bn8d-6ka7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:58:04.236506+00:00 Debian Importer Fixing VCID-vfxs-5p9x-5kcx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:57:55.874100+00:00 Debian Importer Fixing VCID-q3hg-ug68-cffr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:57:45.380162+00:00 Debian Importer Fixing VCID-vm3p-zgmr-13gw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:57:17.381261+00:00 Debian Importer Fixing VCID-8zy9-cpzf-q3be https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:57:13.106694+00:00 Debian Importer Fixing VCID-n2t8-afcr-sffj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:57:08.390281+00:00 Debian Importer Fixing VCID-6c3x-q991-5uh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:57:02.852440+00:00 Debian Importer Fixing VCID-93fb-qqv8-wyeb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:57.002001+00:00 Debian Importer Fixing VCID-wk3t-3jvn-quf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:46.422681+00:00 Debian Importer Fixing VCID-1cac-quc3-2bcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:38.419357+00:00 Debian Importer Fixing VCID-nfg3-jgk3-z7bk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:36.203484+00:00 Debian Importer Fixing VCID-7gw9-7kbs-2uh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:33.876183+00:00 Debian Importer Fixing VCID-umyr-w4sv-gkgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:30.827492+00:00 Debian Importer Fixing VCID-h5ks-h7t7-rqcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:08.921609+00:00 Debian Importer Fixing VCID-a8u6-m3s1-5fdx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:06.993220+00:00 Debian Importer Fixing VCID-k9e5-ykzu-qyew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:56:00.040223+00:00 Debian Importer Fixing VCID-gqr9-19jt-qfds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:55:59.000204+00:00 Debian Importer Fixing VCID-a8cp-9ykt-xbdx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:55:43.097981+00:00 Debian Importer Fixing VCID-y7wh-qssq-cbg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:55:34.509941+00:00 Debian Importer Fixing VCID-h8sj-qvv2-rydf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:55:07.837379+00:00 Debian Importer Fixing VCID-9hnv-7gae-2kc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:57.146543+00:00 Debian Importer Fixing VCID-g4qj-az94-83c6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:44.732789+00:00 Debian Importer Fixing VCID-21fx-6crx-ske2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:43.578745+00:00 Debian Importer Fixing VCID-gr5s-rjhv-3kdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:42.767119+00:00 Debian Importer Fixing VCID-jfrf-qe3s-gbax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:19.120370+00:00 Debian Importer Fixing VCID-vdnv-8h83-7kfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:54:13.875381+00:00 Debian Importer Fixing VCID-gtjv-ut7g-hqhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:58.656863+00:00 Debian Importer Fixing VCID-3fpy-fq8u-r3gb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:57.747402+00:00 Debian Importer Fixing VCID-x6kd-y436-nbaw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:38.718582+00:00 Debian Importer Fixing VCID-k27q-9kcv-3fgh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:53:19.937330+00:00 Debian Importer Fixing VCID-7eh9-dqkv-j3bm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:51.286441+00:00 Debian Importer Fixing VCID-mg8e-fpwg-rbg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:45.208366+00:00 Debian Importer Fixing VCID-d1gu-5q4s-p7eq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:40.033401+00:00 Debian Importer Fixing VCID-m5bk-s7pe-cbd8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:37.215907+00:00 Debian Importer Fixing VCID-t9de-4jgf-wuc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:29.627110+00:00 Debian Importer Fixing VCID-798e-hc82-7qcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:21.111898+00:00 Debian Importer Fixing VCID-ubtn-8mb7-huef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:08.579582+00:00 Debian Importer Fixing VCID-a3d8-8qvy-ykdr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:52:07.579035+00:00 Debian Importer Fixing VCID-9tbh-mrhu-v3am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:51:40.653773+00:00 Debian Importer Fixing VCID-q5ky-7fqu-efcs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:51:39.885421+00:00 Debian Importer Fixing VCID-u2dn-mnr7-m3hy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:51:27.234574+00:00 Debian Importer Fixing VCID-a51v-ajen-u7et https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:51:16.538296+00:00 Debian Importer Fixing VCID-ub6v-vb3r-83eh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:50:18.054041+00:00 Debian Importer Fixing VCID-cjnk-7asz-zuhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:08:46.331579+00:00 Debian Importer Fixing VCID-2fsz-wcjz-9yer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:08:10.720187+00:00 Debian Importer Fixing VCID-gn82-9qs1-37hs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:07:44.063450+00:00 Debian Importer Fixing VCID-z767-vnpz-37g8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:07:37.868651+00:00 Debian Importer Fixing VCID-m773-z76s-8qad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:07:34.659167+00:00 Debian Importer Fixing VCID-5wr6-yach-7fbf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:06:06.832894+00:00 Debian Importer Fixing VCID-mm1u-nfnt-nkaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:01:48.685531+00:00 Debian Importer Fixing VCID-rmuw-t9j1-sygw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:48:37.729353+00:00 Debian Importer Fixing VCID-edhy-ptjn-1kbx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:46:31.148101+00:00 Debian Importer Fixing VCID-d2xf-68nr-rqe2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:35:46.271359+00:00 Debian Importer Fixing VCID-9fn1-ytny-vke1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:35:29.336603+00:00 Debian Importer Fixing VCID-ycev-sqxs-13da https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:24:34.214799+00:00 Debian Importer Fixing VCID-uem4-47we-qua4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T16:03:22.594777+00:00 Debian Importer Fixing VCID-c2ee-9r7y-9qfw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:52:11.189804+00:00 Debian Importer Fixing VCID-aze6-wgfm-3ycv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:42:13.108384+00:00 Debian Importer Fixing VCID-2bay-kzph-yya3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:41:18.472284+00:00 Debian Importer Fixing VCID-jvv4-j5x1-dbd6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:40:40.154243+00:00 Debian Importer Fixing VCID-tzdq-wy6d-xbbx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:39:24.551071+00:00 Debian Importer Fixing VCID-kjn8-9h7n-dfab https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:36:51.041539+00:00 Debian Importer Fixing VCID-vccj-gtv8-kug3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:34:45.613204+00:00 Debian Importer Fixing VCID-y5bm-2fr5-8bbp https://security-tracker.debian.org/tracker/data/json 38.1.0