close
Versions Packages Information History CVEs Related Badges Report

Versions for linux

3479 package(s) known

Repository Package name Version Category Maintainer(s)
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
NFV
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.16
community
linux-edge 6.0.11 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-edge-dev 6.0.11 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-edge-doc 6.0.11 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
main
linux-headers 5.16.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-lts 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-lts-dev 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-virt 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-virt-dev 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
cpupower 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
cpupower-bash-completion 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
cpupower-openrc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-dev 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-doc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-gpio 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-iio 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-tmon 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-usbip 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-usbip-openrc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
perf 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
perf-bash-completion 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-edge 6.3.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-edge-dev 6.3.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-edge-doc 6.3.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
main
linux-headers 5.19.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-lts 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-lts-dev 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-lts-doc 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-virt 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-virt-dev 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
bpftool 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
bpftool-bash-completion 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
cpupower 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
cpupower-bash-completion 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
cpupower-openrc 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-dev 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-doc 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-gpio 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-iio 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-spi 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-tmon 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-usbip 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-usbip-openrc 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
perf 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
perf-bash-completion 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-edge 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-edge-dev 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-edge-doc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
bpftool 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
bpftool-bash-completion 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
cpupower 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
cpupower-bash-completion 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
cpupower-openrc 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-dev 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-doc 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-gpio 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-iio 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-spi 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-tmon 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-usbip 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-usbip-openrc 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
perf 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
perf-bash-completion 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
main
linux-headers 6.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-lts 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-lts-dev 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-lts-doc 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-virt 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-virt-dev 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
linux-edge 6.9.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-edge-dev 6.9.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-edge-doc 6.9.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
main
linux-lts 6.6.117 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-lts-dev 6.6.117 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-lts-doc 6.6.117 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-virt 6.6.117 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-virt-dev 6.6.117 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
bpftool 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
bpftool-bash-completion 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
cpupower 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
cpupower-bash-completion 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
cpupower-openrc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-dev 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-doc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-gpio 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-iio 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-spi 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-tmon 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-usbip 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-usbip-openrc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
perf 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
perf-bash-completion 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
main
linux-headers 6.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
linux-edge 6.12.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-edge-dev 6.12.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-edge-doc 6.12.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
main
linux-lts 6.6.134 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-lts-dev 6.6.134 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-lts-doc 6.6.134 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-virt 6.6.134 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-virt-dev 6.6.134 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
bpftool 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
bpftool-bash-completion 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
cpupower 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
cpupower-bash-completion 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
cpupower-openrc 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-dev 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-doc 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-gpio 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-iio 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-spi 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-tmon 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-usbip 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-usbip-openrc 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
perf 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
perf-bash-completion 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
main
linux-headers 6.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
linux-edge 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-edge-dev 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-edge-doc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
main
linux-lts 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-lts-dev 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-lts-doc 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-virt 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-virt-dev 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
bpftool 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
bpftool-bash-completion 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
cpupower 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
cpupower-bash-completion 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
cpupower-openrc 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-dev 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-doc 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-gpio 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-iio 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-spi 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-tmon 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-usbip 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-usbip-openrc 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
perf 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
perf-bash-completion 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
main
linux-headers 6.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
bpftool 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
bpftool-bash-completion 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
cpupower 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
cpupower-bash-completion 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
cpupower-openrc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-edge 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-edge-dev 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-edge-doc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-dev 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-doc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-gpio 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-iio 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-spi 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-tmon 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-usbip 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-usbip-openrc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
perf 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
perf-bash-completion 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
main
linux-headers 6.14.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-lts 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-lts-dev 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-lts-doc 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-virt 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-virt-dev 6.12.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.23
community
linux-stable 6.19.8 - achill@achill.org
Alpine Linux 3.23
community
linux-stable-dev 6.19.8 - achill@achill.org
Alpine Linux 3.23
community
linux-stable-doc 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
bpftool 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
bpftool-bash-completion 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
cpupower 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
cpupower-bash-completion 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
cpupower-openrc 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
cpupower-systemd 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-dev 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-doc 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-gpio 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-iio 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-spi 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-tmon 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-usbip 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-tools-usbip-openrc 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
perf 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
perf-bash-completion 6.19.8 - achill@achill.org
Alpine Linux 3.23
main
linux-lts 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.23
main
linux-lts-dev 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.23
main
linux-lts-doc 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.23
main
linux-virt 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.23
main
linux-virt-dev 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.23
main
linux-headers 6.16.12 Potentially vulnerable - achill@achill.org
Alpine Linux Edge
main
bpftool 7.0.0 - achill@achill.org
Alpine Linux Edge
main
bpftool-bash-completion 7.0.0 - achill@achill.org
Alpine Linux Edge
main
cpupower 7.0.0 - achill@achill.org
Alpine Linux Edge
main
cpupower-bash-completion 7.0.0 - achill@achill.org
Alpine Linux Edge
main
cpupower-openrc 7.0.0 - achill@achill.org
Alpine Linux Edge
main
cpupower-systemd 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-headers 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-dev 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-doc 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-gpio 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-iio 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-spi 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-tmon 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-usbip 7.0.0 - achill@achill.org
Alpine Linux Edge
main
linux-tools-usbip-openrc 7.0.0 - achill@achill.org
Alpine Linux Edge
main
perf 7.0.0 - achill@achill.org
Alpine Linux Edge
main
perf-bash-completion 7.0.0 - achill@achill.org
Alpine Linux Edge
community
linux-stable 6.19.12 - achill@achill.org
Alpine Linux Edge
community
linux-stable-dev 6.19.12 - achill@achill.org
Alpine Linux Edge
community
linux-stable-doc 6.19.12 - achill@achill.org
Alpine Linux Edge
main
linux-lts 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-lts-dev 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-lts-doc 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-virt 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-virt-dev 6.18.22 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 linux-tools 5.10 Potentially vulnerable Development/Tools vt@altlinux.org
ALT Linux p9 usbip 2.0.4 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
ALT Linux p10 linux-tools 6.1 Potentially vulnerable Development/Tools vt@altlinux.org
ALT Linux p10 usbip 5.10 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
ALT Linux p11 linux-tools 6.18 Potentially vulnerable Development/Tools vt@altlinux.org
ALT Linux p11 usbip 5.10 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
ALT Sisyphus linux-tools 6.19 Potentially vulnerable Development/Tools vt@altlinux.org
ALT Sisyphus usbip 5.10 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.353 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.350 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.349 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.334 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.330 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.328 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.326 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.313 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.311 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.309 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.305 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.301 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.299 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.294 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.287 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.285 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.281 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.275 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.273 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.268 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.262 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.262 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.252 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.248 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.232 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.219 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.214 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.209 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.203 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.200 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.193 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.186 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.181 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.177 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.173 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.171 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.158 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.154 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.152 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.146 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.143 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.138 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.128 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.123 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.121 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.109 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.106 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.104 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.101 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.97 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.94 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.72 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.70 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.67 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.62 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.59 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.55 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.51 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.47 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.42 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
main
kernel 4.14.26 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.353 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.350 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.349 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.345 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.344 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.334 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.330 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.328 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.327 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.326 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.313 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.311 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.309 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.305 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.304 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.301 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.301 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.299 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.296 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.294 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.291 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.290 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.287 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.285 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.281 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.276 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.275 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.273 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.268 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.262 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.256 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.252 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.252 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.248 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.246 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.243 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.241 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.232 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.232 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.231 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.231 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.219 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.219 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.214 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.209 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.209 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.203 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.200 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.198 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.193 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.192 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.186 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.181 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.181 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.177 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.177 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.173 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.173 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.171 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.158 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.154 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.152 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.152 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.146 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.146 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.143 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.138 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.128 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.123 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.121 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.109 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.106 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.104 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.101 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.97 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.94 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.72 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.70 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.67 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.62 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.59 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.55 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.51 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.47 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.47 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.42 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.26 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.85 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.85 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.81 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.76 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.75 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.70 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.62 Potentially vulnerable System Environment/Kernel -
AOSC kernel-tools 6.18.16 Potentially vulnerable utils fallback-mnt-aosc@repology
AOSC linux-kernel-6.18.16 6.18.16 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.14.10 6.14.10 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.14.9 6.14.9 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.12.32 6.12.32 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.12.31 6.12.31 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.12.28 6.12.28 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.10.10 6.10.10 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.10.8 6.10.8 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.10.5 6.10.5 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.61 6.6.61 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.54 6.6.54 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.53 6.6.53 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.50 6.6.50 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.47 6.6.47 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.46 6.6.46 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.41 6.6.41 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.31 6.6.31 Potentially vulnerable kernel fallback-mnt-aosc@repology
Apertis v2023
v2023/target
linux 6.1.128 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2024
v2024-security/target
linux 6.6.133 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2024
v2024/target
linux 6.6.113 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2025
v2025-security/target
linux 6.12.74 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2025
v2025/target
linux 6.12.57 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2026
v2026/target
linux 6.18.5 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2027 Development
v2027dev1/target
linux 6.18.5 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Arch Linux
extra
bootconfig 7.0 - -
Arch Linux
extra
bpf 7.0 - -
Arch Linux
extra
cpupower 7.0 - -
Arch Linux
extra
hyperv 7.0 - -
Arch Linux
extra
intel-speed-select 7.0 - -
Arch Linux
extra
kcpuid 7.0 - -
Arch Linux
extra
linux-tools-meta 7.0 - -
Arch Linux
extra
perf 7.0 - -
Arch Linux
extra
tmon 7.0 - -
Arch Linux
extra
turbostat 7.0 - -
Arch Linux
extra
usbip 7.0 - -
Arch Linux
extra
x86_energy_perf_policy 7.0 - -
Arch Linux
core
linux 6.19.12.arch1 - -
Arch Linux
core
linux-docs 6.19.12.arch1 - -
Arch Linux
core
linux-headers 6.19.12.arch1 - -
Arch Linux
core
linux-api-headers 6.19 Potentially vulnerable - -
Arch Linux
core
linux-lts 6.18.23 Potentially vulnerable - -
Arch Linux
core
linux-lts-docs 6.18.23 Potentially vulnerable - -
Arch Linux
core
linux-lts-headers 6.18.23 Potentially vulnerable - -
Arch Testing
core-testing
linux 6.19.13.arch1 - -
Arch Testing
core-testing
linux-docs 6.19.13.arch1 - -
Arch Testing
core-testing
linux-headers 6.19.13.arch1 - -
ArchPOWER powerpc linux 6.19.11.arch1 - -
ArchPOWER powerpc linux-headers 6.19.11.arch1 - -
ArchPOWER powerpc bootconfig 6.19.7 - -
ArchPOWER powerpc bpf 6.19.7 - -
ArchPOWER powerpc cpupower 6.19.7 - -
ArchPOWER powerpc linux-tools-meta 6.19.7 - -
ArchPOWER powerpc perf 6.19.7 - -
ArchPOWER powerpc tmon 6.19.7 - -
ArchPOWER powerpc usbip 6.19.7 - -
ArchPOWER powerpc linux-api-headers 6.19 Potentially vulnerable - -
ArchPOWER powerpc linux-docs 6.19 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.18 6.18.21.arch1 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.18-headers 6.18.21.arch1 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.12 6.12.80 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.12-headers 6.12.80 Potentially vulnerable - -
ArchPOWER powerpc cgroup_event_listener 6.7 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.6 6.6.130 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.6-headers 6.6.130 Potentially vulnerable - -
ArchPOWER powerpc linux-lts 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-headers 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.1 6.1.167 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.1-headers 6.1.167 Potentially vulnerable - -
ArchPOWER powerpc64le linux 6.19.11.arch1 - -
ArchPOWER powerpc64le linux-headers 6.19.11.arch1 - -
ArchPOWER powerpc64le bootconfig 6.19.7 - -
ArchPOWER powerpc64le bpf 6.19.7 - -
ArchPOWER powerpc64le cpupower 6.19.7 - -
ArchPOWER powerpc64le linux-tools-meta 6.19.7 - -
ArchPOWER powerpc64le perf 6.19.7 - -
ArchPOWER powerpc64le tmon 6.19.7 - -
ArchPOWER powerpc64le usbip 6.19.7 - -
ArchPOWER powerpc64le linux-api-headers 6.19 Potentially vulnerable - -
ArchPOWER powerpc64le linux-docs 6.19 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.18 6.18.21.arch1 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.18-headers 6.18.21.arch1 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.12 6.12.80 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.12-headers 6.12.80 Potentially vulnerable - -
ArchPOWER powerpc64le cgroup_event_listener 6.7 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.6 6.6.130 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.6-headers 6.6.130 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-headers 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.1 6.1.167 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.1-headers 6.1.167 Potentially vulnerable - -
ArchPOWER riscv64 bootconfig 6.13 Potentially vulnerable - -
ArchPOWER riscv64 bpf 6.13 Potentially vulnerable - -
ArchPOWER riscv64 cpupower 6.13 Potentially vulnerable - -
ArchPOWER riscv64 linux-tools-meta 6.13 Potentially vulnerable - -
ArchPOWER riscv64 perf 6.13 Potentially vulnerable - -
ArchPOWER riscv64 tmon 6.13 Potentially vulnerable - -
ArchPOWER riscv64 usbip 6.13 Potentially vulnerable - -
ArchPOWER riscv64 linux-docs 6.11 Potentially vulnerable - -
ArchPOWER riscv64 linux-api-headers 6.10 Potentially vulnerable - -
ArchPOWER riscv64 cgroup_event_listener 6.7 Potentially vulnerable - -
ArchPOWER riscv64 linux 5.14.16.arch1 Potentially vulnerable - -
ArchPOWER riscv64 linux-headers 5.14.16.arch1 Potentially vulnerable - -
AUR linux-next-git 20250704.r0.g26ffb3d6f02c - ptr1337@aur, gromit@aur
AUR linux-next-git-headers 20250704.r0.g26ffb3d6f02c - ptr1337@aur, gromit@aur
AUR linux-git 7.0.r11782.c1f49dea2b8f - osimarr@aur
AUR linux-git-headers 7.0.r11782.c1f49dea2b8f - osimarr@aur
AUR linux-lts-515-git 5.15.136 - akusari@aur
AUR linux-lts-515-git-headers 5.15.136 - akusari@aur
AUR linux-mainline 7.0 - miffe@aur
AUR linux-mainline-docs 7.0 - miffe@aur
AUR linux-mainline-headers 7.0 - miffe@aur
AUR linux-lts-versioned-bin 6.18.23 Potentially vulnerable - chrisjbillington@aur
AUR linux-lts-versioned-docs-bin 6.18.23 Potentially vulnerable - chrisjbillington@aur
AUR linux-lts-versioned-headers-bin 6.18.23 Potentially vulnerable - chrisjbillington@aur
AUR linux6.18.23-1-lts-bin 6.18.23 Potentially vulnerable - chrisjbillington@aur
AUR linux6.18.23-1-lts-docs-bin 6.18.23 Potentially vulnerable - chrisjbillington@aur
AUR linux6.18.23-1-lts-headers-bin 6.18.23 Potentially vulnerable - chrisjbillington@aur
AUR linux-lts612 6.12.82 Potentially vulnerable - severach@aur
AUR linux-lts612-docs 6.12.82 Potentially vulnerable - severach@aur
AUR linux-lts612-headers 6.12.82 Potentially vulnerable - severach@aur
AUR linux-lts66 6.6.135 Potentially vulnerable - severach@aur
AUR linux-lts66-docs 6.6.135 Potentially vulnerable - severach@aur
AUR linux-lts66-headers 6.6.135 Potentially vulnerable - severach@aur
AUR linux-lts61 6.1.169 Potentially vulnerable - severach@aur
AUR linux-lts61-docs 6.1.169 Potentially vulnerable - severach@aur
AUR linux-lts61-headers 6.1.169 Potentially vulnerable - severach@aur
AUR linux-lts515 5.15.202 Potentially vulnerable - andreas_baumann@aur, severach@aur
AUR linux-lts515-docs 5.15.202 Potentially vulnerable - andreas_baumann@aur, severach@aur
AUR linux-lts515-headers 5.15.202 Potentially vulnerable - andreas_baumann@aur, severach@aur
AUR linux-lts510 5.10.252 Potentially vulnerable - severach@aur
AUR linux-lts510-docs 5.10.252 Potentially vulnerable - severach@aur
AUR linux-lts510-headers 5.10.252 Potentially vulnerable - severach@aur
Artix
world
bootconfig 6.19.11 - -
Artix
world
bpf 6.19.11 - -
Artix
world
cpupower 6.19.11 - -
Artix
world
hyperv 6.19.11 - -
Artix
world
intel-speed-select 6.19.11 - -
Artix
world
kcpuid 6.19.11 - -
Artix
world
linux-tools-meta 6.19.11 - -
Artix
world
perf 6.19.11 - -
Artix
world
tmon 6.19.11 - -
Artix
world
turbostat 6.19.11 - -
Artix
world
usbip 6.19.11 - -
Artix
world
x86_energy_perf_policy 6.19.11 - -
Artix
system
linux 6.19.11.artix1 - -
Artix
system
linux-docs 6.19.11.artix1 - -
Artix
system
linux-headers 6.19.11.artix1 - -
Artix
system
linux-api-headers 6.19 Potentially vulnerable - -
Artix
system
linux-lts 6.18.22 Potentially vulnerable - -
Artix
system
linux-lts-docs 6.18.22 Potentially vulnerable - -
Artix
system
linux-lts-headers 6.18.22 Potentially vulnerable - -
Artix
galaxy
linux-lts515 5.15.160 Potentially vulnerable - -
Artix
galaxy
linux-lts515-docs 5.15.160 Potentially vulnerable - -
Artix
galaxy
linux-lts515-headers 5.15.160 Potentially vulnerable - -
Carbs Linux
core
linux-headers 6.11.2 Potentially vulnerable - cem@carbslinux.org
Carbs Linux
alternatives/linux-headers-lts
linux-headers lts Potentially vulnerable - cem@carbslinux.org
CentOS 6
os
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
os
cpupowerutils 1.3 Potentially vulnerable System Environment/Base -
CentOS 6
os
tmon 0.9 Potentially vulnerable System Environment/Base -
CentOS 7
updates
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
os
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
Chimera Linux
main
linux-stable 6.19.12 - -
Chimera Linux
main
linux-stable-devel 6.19.12 - -
Chimera Linux
main
linux-lts 6.18.22 Potentially vulnerable - -
Chimera Linux
main
linux-lts-devel 6.18.22 Potentially vulnerable - -
Chimera Linux
main
linux-headers 6.18.7 Potentially vulnerable - -
Chimera Linux
main
perf 6.18.4 Potentially vulnerable - -
Chimera Linux
main
perf-bashcomp 6.18.4 Potentially vulnerable - -
Chimera Linux
main
perf-man 6.18.4 Potentially vulnerable - -
Chimera Linux
main
perf-zshcomp 6.18.4 Potentially vulnerable - -
Chimera Linux
main
cpupower 6.15.2 Potentially vulnerable - -
Chimera Linux
main
cpupower-bashcomp 6.15.2 Potentially vulnerable - -
Chimera Linux
main
cpupower-devel 6.15.2 Potentially vulnerable - -
Chimera Linux
main
cpupower-man 6.15.2 Potentially vulnerable - -
Chocolatey usbip (Install) 0.1.0 Potentially vulnerable - -
Chromebrew perf 4.14 Potentially vulnerable - -
ConanCenter perf 5.13 Potentially vulnerable - -
Debian 11
bullseye-security/main
linux-6.1 6.1.164 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
linux 5.10.251 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.223 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.218 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.46 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.28 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.13 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm-security/main
linux 6.1.164 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.159 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.148 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.8 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.4 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.74 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.73 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.69 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.63 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.57 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.43 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.5.10 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie-security/main
linux 6.12.74 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.73 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.63 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.38 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.8 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.19.11 misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.19.10 misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.19.8 misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.19.6 misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.18.15 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.18.12 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.18.9 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.18.5 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.17.13 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.17.8 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.16.12 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13 Backports
trixie-backports/main
linux 6.16.3 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 14
forky/main
linux 6.19.11 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 14
forky/main
linux 6.18.9 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 14
forky/main
linux 6.18.5 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 14
forky/main
linux 6.12.73 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.19.13 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.19.12 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.19.11 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.19.10 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.19.8 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.19.6 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.19.6 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.18.15 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.18.14 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.18.13 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.18.12 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.18.10 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.18.9 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.18.5 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.73 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 7.0 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
deepin 20
main
linux 5.15.5 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
deepin 20
main
linux 5.10.84 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
deepin 23
main
linux 6.6.9 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Devuan 4.0
chimaera/main
linux 5.10.223 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Devuan Unstable
unstable/main
linux 6.19.13 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
distri linux 5.6.5 Potentially vulnerable - -
ELRepo el8 usbip-utils 0.0 Potentially vulnerable System Environment/Base -
ELRepo el9 usbip-utils 0.0 Potentially vulnerable System Environment/Base phil@elrepo.org
Endless OS 4.0
endless
linux 5.11.0 Potentially vulnerable main kernel-team@lists.ubuntu.com
Endless OS master
endless
linux 6.14.0 Potentially vulnerable main kernel-team@lists.ubuntu.com
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 9
appstream
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
powertools
kernel 5.14.0 Potentially vulnerable Unspecified -
Exherbo
arbor
sys-kernel/linux-headers 7.0 sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.19 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.18 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.17 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
CleverCloud
sys-analyzer/perf 6.16 Potentially vulnerable sys-analyzer fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.16 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.15 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.7 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.5 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.4 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.3 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.2 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
kepstin
sys-apps/turbostat 6.1 Potentially vulnerable sys-apps fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.0 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
hardware
sys-power/cpupowerutils 6.0 Potentially vulnerable sys-power fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.19 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.18 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
hardware
sys-power/cpupowerutils 5.18 Potentially vulnerable sys-power fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.17 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.16 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
hardware
sys-power/cpupowerutils 5.10 Potentially vulnerable sys-power fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Fedora 38
updates
kernel 6.8.9 Potentially vulnerable Unspecified -
Fedora 38
updates
kernel-headers 6.8.3 Potentially vulnerable Unspecified -
Fedora 38
updates
kernel-tools 6.6.3 Potentially vulnerable Unspecified -
Fedora 38
release
kernel 6.2.9 Potentially vulnerable Unspecified -
Fedora 38
release
kernel-headers 6.2.6 Potentially vulnerable Unspecified -
Fedora 38
release
kernel-tools 6.2.6 Potentially vulnerable Unspecified -
Fedora 38
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 39
updates
kernel 6.11.9 Potentially vulnerable Unspecified -
Fedora 39
updates
kernel-headers 6.11.3 Potentially vulnerable Unspecified -
Fedora 39
updates
kernel-tools 6.6.3 Potentially vulnerable Unspecified -
Fedora 39
release
kernel 6.5.6 Potentially vulnerable Unspecified -
Fedora 39
release
kernel-headers 6.5.4 Potentially vulnerable Unspecified -
Fedora 39
release
kernel-tools 6.5.4 Potentially vulnerable Unspecified -
Fedora 39
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 40
updates
kernel 6.14.5 Potentially vulnerable Unspecified -
Fedora 40
updates
kernel-headers 6.14.3 Potentially vulnerable Unspecified -
Fedora 40
release
kernel 6.8.5 Potentially vulnerable Unspecified -
Fedora 40
release
kernel-headers 6.8.3 Potentially vulnerable Unspecified -
Fedora 40
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 41
updates
kernel 6.17.10 Potentially vulnerable Unspecified -
Fedora 41
updates
kernel-headers 6.17.4 Potentially vulnerable Unspecified -
Fedora 41
release
kernel 6.11.4 Potentially vulnerable Unspecified -
Fedora 41
release
kernel-headers 6.11.3 Potentially vulnerable Unspecified -
Fedora 41
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 42
updates
kernel 6.19.12 Unspecified -
Fedora 42
updates
kernel-headers 6.19.6 Unspecified -
Fedora 42
release
kernel 6.14.0 Potentially vulnerable Unspecified -
Fedora 42
release
kernel-headers 6.14.0 Potentially vulnerable Unspecified -
Fedora 42
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 43
updates
kernel 6.19.12 Unspecified -
Fedora 43
updates
kernel-headers 6.19.6 Unspecified -
Fedora 43
release
kernel 6.17.1 Potentially vulnerable Unspecified -
Fedora 43
release
kernel-headers 6.17.0 Potentially vulnerable Unspecified -
Fedora 43
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora Rawhide
development
kernel 7.0.0 Unspecified -
Fedora Rawhide
development
kernel-headers 7.0.0 Unspecified -
Fedora Rawhide
development
usbip 5.7.9 Potentially vulnerable Unspecified -
FreeBSD Ports devel/evdev-proto 5.8 Potentially vulnerable devel x11@freebsd.org
FreeBSD Ports sysutils/turbostat 4.17 Potentially vulnerable sysutils ports@freebsd.org
Gentoo sys-kernel/linux-next 9999 sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.15.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.10.9999 sys-kernel dist-kernel@gentoo.org
Gentoo dev-util/perf 7.0 dev-util amadio@gentoo.org, dlan@gentoo.org
Gentoo sys-kernel/vanilla-sources 7.0.0 sys-kernel kernel@gentoo.org
Gentoo sys-kernel/git-sources 7.0_rc7 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/git-sources 7.0_rc6 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/git-sources 7.0_rc5 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/git-sources 7.0_rc4 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/git-sources 7.0_rc3 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/git-sources 7.0_rc2 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/git-sources 7.0_rc1 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.19.13 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.19.13 sys-kernel kernel@gentoo.org
Gentoo dev-util/perf 6.19.12 dev-util amadio@gentoo.org, dlan@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.19.12 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.19.11 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 6.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.18.23 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.18.23 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.18.22 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.18.21 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.18.20 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.18.19 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.18.18 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo dev-util/perf 6.18.5 Potentially vulnerable dev-util amadio@gentoo.org, dlan@gentoo.org
Gentoo sys-kernel/linux-docs 6.18 Potentially vulnerable sys-kernel mpagano@gentoo.org
Gentoo sys-kernel/linux-headers 6.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.17 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.16 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.16 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-power/cpupower 6.16 Potentially vulnerable sys-power floppym@gentoo.org
Gentoo sys-kernel/linux-headers 6.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo dev-util/perf 6.14 Potentially vulnerable dev-util amadio@gentoo.org, dlan@gentoo.org
Gentoo sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.82 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.12.82 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.81 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.80 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.79 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.77 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-power/cpupower 6.10 Potentially vulnerable sys-power floppym@gentoo.org
Gentoo sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.135 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.6.135 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.134 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.133 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.130 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-power/cpupower 6.2 Potentially vulnerable sys-power floppym@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.169 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.1.169 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.168 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.167 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.166 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.163 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.15.203 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 5.15.203 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.15.202 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.15.200 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo net-misc/usbip 5.15 Potentially vulnerable net-misc maintainer-needed@gentoo.org
Gentoo sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.10.253 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 5.10.253 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.10.252 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.10.250 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 3.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
glaucus linux-headers 6.18.3 Potentially vulnerable - -
GNU Guix cpupower 6.18.22 Potentially vulnerable - -
GNU Guix perf 6.18.22 Potentially vulnerable - -
GNU Guix tmon 6.18.22 Potentially vulnerable - -
GNU Guix turbostat 6.18.22 Potentially vulnerable - -
GNU Guix usbip-utils 6.18.22 Potentially vulnerable - -
GoboLinux Linux 6.12.16 Potentially vulnerable - -
GoboLinux Linux-Headers 6.0.19 Potentially vulnerable - -
Homebrew linux-headers@6.8 6.8.12 Potentially vulnerable - -
Homebrew linux-headers@5.15 5.15.203 Potentially vulnerable - -
Homebrew linux-headers@4.4 4.4.302 Potentially vulnerable - -
Kali Linux Rolling
main
linux 6.19.11 kernel devel@kali.org, hertzog@debian.org, sophie@offensive-security.com
KaOS
core
linux 6.19.12 - demm@kaosx.us
KaOS
core
linux-docs 6.19.12 - demm@kaosx.us
KaOS
core
linux-headers 6.19.12 - demm@kaosx.us
KaOS
core
linux-next 6.19.12 - demm@kaosx.us
KaOS
core
linux-next-docs 6.19.12 - demm@kaosx.us
KaOS
core
linux-next-headers 6.19.12 - demm@kaosx.us
KaOS
main
cpupower 6.19.8 - demm@kaosx.us
KaOS
core
linux-api-headers 6.18.2 Potentially vulnerable - demm@kaosx.us
KaOS Build
build
linux-next 7.0 - demm@kaosx.us
KaOS Build
build
linux-next-docs 7.0 - demm@kaosx.us
KaOS Build
build
linux-next-headers 7.0 - demm@kaosx.us
KISS Community - main
core
linux-headers 6.18.14 Potentially vulnerable - owen@owenrafferty.com
LiGurOS stable sys-kernel/linux-next 9999 sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.17_rc4 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.17_rc3 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.17_rc2 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.17_rc1 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.16.5 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.16.5 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable dev-util/perf 6.16.4 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-docs 6.16.4 Potentially vulnerable sys-kernel mpagano@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.16.4 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.16.3 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable dev-util/perf 6.16 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.16 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-power/cpupower 6.16 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.15.11 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable dev-util/perf 6.15 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable dev-util/perf 6.14 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.45 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.12.45 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.44 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.43 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.42 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.41 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-power/cpupower 6.10 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.104 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.6.104 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.103 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.102 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.101 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-power/cpupower 6.2 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.150 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.1.150 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.149 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.148 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.147 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.191 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 5.15.191 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.190 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.189 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable net-misc/usbip 5.15 Potentially vulnerable net-misc fallback-mnt-liguros@repology
LiGurOS stable sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.242 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 5.10.242 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.241 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.240 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 5.4.298 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 3.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-next 9999 sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.15.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.10.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop dev-util/perf 7.0 dev-util amadio@gentoo.org, dlan@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 7.0.0 sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 7.0_rc7 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 7.0_rc6 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 7.0_rc5 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 7.0_rc4 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 7.0_rc3 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 7.0_rc2 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 7.0_rc1 sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.19.13 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.19.13 sys-kernel kernel@gentoo.org
LiGurOS develop dev-util/perf 6.19.12 dev-util amadio@gentoo.org, dlan@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.19.12 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.19.11 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.18.23 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.18.23 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.18.22 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.18.21 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.18.20 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.18.19 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.18.18 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop dev-util/perf 6.18.5 Potentially vulnerable dev-util amadio@gentoo.org, dlan@gentoo.org
LiGurOS develop sys-kernel/linux-docs 6.18 Potentially vulnerable sys-kernel mpagano@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.17 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.16 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.16 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-power/cpupower 6.16 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop dev-util/perf 6.14 Potentially vulnerable dev-util amadio@gentoo.org, dlan@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.82 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.12.82 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.81 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.80 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.79 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.77 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-power/cpupower 6.10 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.135 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.6.135 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.134 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.133 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.130 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-power/cpupower 6.2 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.169 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.1.169 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.168 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.167 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.166 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.163 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.15.203 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 5.15.203 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.15.202 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.15.200 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop net-misc/usbip 5.15 Potentially vulnerable net-misc fallback-mnt-liguros@repology
LiGurOS develop sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.10.253 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 5.10.253 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.10.252 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.10.250 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 3.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
Mageia 9
core/updates
kernel 6.6.130 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.130 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.120 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.120 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.116 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.116 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.105 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.105 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.101 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.101 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.93 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.93 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.88 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.88 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.83 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.83 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.79 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.79 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.74 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.74 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.65 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.65 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.61 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.61 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.58 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.58 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.52 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.52 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.50 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.50 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.43 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.43 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.37 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.37 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.28 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.28 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.22 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.22 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.18 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.18 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.14 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.14 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.5.13 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.5.13 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.5.11 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.5.11 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.4.16 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.4.16 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/release
kernel 6.4.9 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/release
kernel-linus 6.4.9 Potentially vulnerable System/Kernel and hardware -
Mageia cauldron
core/release
kernel 6.18.22 Potentially vulnerable System/Kernel and hardware -
Mageia cauldron
core/release
kernel-linus 6.18.22 Potentially vulnerable System/Kernel and hardware -
Manjaro Stable
core
linux70 7.0.0rc4 - -
Manjaro Stable
core
linux70-headers 7.0.0rc4 - -
Manjaro Stable
core
linux619 6.19.8 - -
Manjaro Stable
core
linux619-headers 6.19.8 - -
Manjaro Stable
extra
bootconfig 6.19.7 - -
Manjaro Stable
extra
bpf 6.19.7 - -
Manjaro Stable
extra
cpupower 6.19.7 - -
Manjaro Stable
extra
hyperv 6.19.7 - -
Manjaro Stable
extra
intel-speed-select 6.19.7 - -
Manjaro Stable
extra
kcpuid 6.19.7 - -
Manjaro Stable
extra
linux-tools-meta 6.19.7 - -
Manjaro Stable
extra
perf 6.19.7 - -
Manjaro Stable
extra
tmon 6.19.7 - -
Manjaro Stable
extra
turbostat 6.19.7 - -
Manjaro Stable
extra
usbip 6.19.7 - -
Manjaro Stable
extra
x86_energy_perf_policy 6.19.7 - -
Manjaro Stable
core
linux-api-headers 6.19 Potentially vulnerable - -
Manjaro Stable
core
linux618 6.18.18 Potentially vulnerable - -
Manjaro Stable
core
linux618-headers 6.18.18 Potentially vulnerable - -
Manjaro Stable
core
linux612 6.12.77 Potentially vulnerable - -
Manjaro Stable
core
linux612-headers 6.12.77 Potentially vulnerable - -
Manjaro Stable
core
linux66 6.6.128 Potentially vulnerable - -
Manjaro Stable
core
linux66-headers 6.6.128 Potentially vulnerable - -
Manjaro Stable
core
linux61 6.1.165 Potentially vulnerable - -
Manjaro Stable
core
linux61-headers 6.1.165 Potentially vulnerable - -
Manjaro Stable
core
linux515 5.15.202 Potentially vulnerable - -
Manjaro Stable
core
linux515-headers 5.15.202 Potentially vulnerable - -
Manjaro Stable
core
linux510 5.10.252 Potentially vulnerable - -
Manjaro Stable
core
linux510-headers 5.10.252 Potentially vulnerable - -
Manjaro Testing
core
linux71 7.1.0rc0 - -
Manjaro Testing
core
linux71-headers 7.1.0rc0 - -
Manjaro Testing
core
linux70 7.0.0 - -
Manjaro Testing
core
linux70-headers 7.0.0 - -
Manjaro Testing
extra
bootconfig 7.0 - -
Manjaro Testing
extra
bpf 7.0 - -
Manjaro Testing
extra
cpupower 7.0 - -
Manjaro Testing
extra
hyperv 7.0 - -
Manjaro Testing
extra
intel-speed-select 7.0 - -
Manjaro Testing
extra
kcpuid 7.0 - -
Manjaro Testing
extra
linux-tools-meta 7.0 - -
Manjaro Testing
extra
perf 7.0 - -
Manjaro Testing
extra
tmon 7.0 - -
Manjaro Testing
extra
turbostat 7.0 - -
Manjaro Testing
extra
usbip 7.0 - -
Manjaro Testing
extra
x86_energy_perf_policy 7.0 - -
Manjaro Testing
core
linux619 6.19.13 - -
Manjaro Testing
core
linux619-headers 6.19.13 - -
Manjaro Testing
core
linux-api-headers 6.19 Potentially vulnerable - -
Manjaro Testing
core
linux618 6.18.23 Potentially vulnerable - -
Manjaro Testing
core
linux618-headers 6.18.23 Potentially vulnerable - -
Manjaro Testing
core
linux612 6.12.82 Potentially vulnerable - -
Manjaro Testing
core
linux612-headers 6.12.82 Potentially vulnerable - -
Manjaro Testing
core
linux66 6.6.135 Potentially vulnerable - -
Manjaro Testing
core
linux66-headers 6.6.135 Potentially vulnerable - -
Manjaro Testing
core
linux61 6.1.169 Potentially vulnerable - -
Manjaro Testing
core
linux61-headers 6.1.169 Potentially vulnerable - -
Manjaro Testing
core
linux515 5.15.203 Potentially vulnerable - -
Manjaro Testing
core
linux515-headers 5.15.203 Potentially vulnerable - -
Manjaro Testing
core
linux510 5.10.253 Potentially vulnerable - -
Manjaro Testing
core
linux510-headers 5.10.253 Potentially vulnerable - -
Manjaro Unstable
core
linux71 7.1.0rc0 - -
Manjaro Unstable
core
linux71-headers 7.1.0rc0 - -
Manjaro Unstable
core
linux70 7.0.0 - -
Manjaro Unstable
core
linux70-headers 7.0.0 - -
Manjaro Unstable
extra
bootconfig 7.0 - -
Manjaro Unstable
extra
bpf 7.0 - -
Manjaro Unstable
extra
cpupower 7.0 - -
Manjaro Unstable
extra
hyperv 7.0 - -
Manjaro Unstable
extra
intel-speed-select 7.0 - -
Manjaro Unstable
extra
kcpuid 7.0 - -
Manjaro Unstable
extra
linux-tools-meta 7.0 - -
Manjaro Unstable
extra
perf 7.0 - -
Manjaro Unstable
extra
tmon 7.0 - -
Manjaro Unstable
extra
turbostat 7.0 - -
Manjaro Unstable
extra
usbip 7.0 - -
Manjaro Unstable
extra
x86_energy_perf_policy 7.0 - -
Manjaro Unstable
core
linux619 6.19.13 - -
Manjaro Unstable
core
linux619-headers 6.19.13 - -
Manjaro Unstable
core
linux-api-headers 6.19 Potentially vulnerable - -
Manjaro Unstable
core
linux618 6.18.23 Potentially vulnerable - -
Manjaro Unstable
core
linux618-headers 6.18.23 Potentially vulnerable - -
Manjaro Unstable
core
linux612 6.12.82 Potentially vulnerable - -
Manjaro Unstable
core
linux612-headers 6.12.82 Potentially vulnerable - -
Manjaro Unstable
core
linux66 6.6.135 Potentially vulnerable - -
Manjaro Unstable
core
linux66-headers 6.6.135 Potentially vulnerable - -
Manjaro Unstable
core
linux61 6.1.169 Potentially vulnerable - -
Manjaro Unstable
core
linux61-headers 6.1.169 Potentially vulnerable - -
Manjaro Unstable
core
linux515 5.15.203 Potentially vulnerable - -
Manjaro Unstable
core
linux515-headers 5.15.203 Potentially vulnerable - -
Manjaro Unstable
core
linux510 5.10.253 Potentially vulnerable - -
Manjaro Unstable
core
linux510-headers 5.10.253 Potentially vulnerable - -
MX Linux MX-21
ahs
linux 6.5.13 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
MX Linux MX-21
main
linux 5.15.2 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
MX Linux MX-23
ahs
linux 6.12.38 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
MX Linux MX-25
ahs
linux 6.18.15 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
nixpkgs stable 23.11 linux 6.10-rc5 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.9.7 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.9.7 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux-manual 6.9.7 Potentially vulnerable - mvs@nya.yt
nixpkgs stable 23.11 perf-linux 6.9.7 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 perf-linux 6.9.7 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.9.4 Potentially vulnerable linuxKernel lythe1107@gmail.com, meurerbernardo@gmail.com, atemu.main+nixpkgs@gmail.com, shawn8901@googlemail.com, me@zzzsy.top
nixpkgs stable 23.11 perf-linux 6.9.4 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 perf-linux 6.9.4 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.9.2 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.9.2 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 23.11 perf-linux 6.9.2 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 perf-linux 6.9.2 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.8.12 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 6.8.12 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.8.11 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.8.11 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 23.11 perf-linux 6.8.11 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 perf-linux 6.8.11 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.6.36 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 6.6.36 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.6.35-rt34 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.6.33 Potentially vulnerable linuxKernel lythe1107@gmail.com, meurerbernardo@gmail.com, atemu.main+nixpkgs@gmail.com, shawn8901@googlemail.com, me@zzzsy.top
nixpkgs stable 23.11 perf-linux 6.6.33 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.6.32 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 6.6.32 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel post@davidak.de, madouura@gmail.com, root@pedrohlc.com, ryan@lahfa.xyz, daniel@gluo.nz
nixpkgs stable 23.11 perf-linux 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.5.13 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.5.13 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 6.5.13 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 perf-linux 6.5.13 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 bpftools 6.5 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 23.11 evdev-proto 6.5 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 23.11 linux-headers 6.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.1.96 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.96 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.96 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 6.1.96 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 perf-linux 6.1.96 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.1.95-rt34 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.1.92 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.92 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 6.1.92 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 perf-linux 6.1.92 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.15.161 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 5.15.161 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.15.160 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 5.15.160 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.15.160-rt77 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.10.220 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 5.10.220 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.10.218 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 5.10.218 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.10.218-rt110 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.4.278 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 5.4.278 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.4.277 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 5.4.277 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.4.271-rt89 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 4.19.316 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 4.19.316 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 4.19.315 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 23.11 perf-linux 4.19.315 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 23.11 tmon 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.13-rc4 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.12.7 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.12.7 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux-manual 6.12.7 Potentially vulnerable - mvs@nya.yt
nixpkgs stable 24.05 perf-linux 6.12.7 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 perf-linux 6.12.7 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.12.6 Potentially vulnerable linuxKernel lythe1107@gmail.com, meurerbernardo@gmail.com, nixpkgs@mail.atemu.net, shawn8901@googlemail.com, me@zzzsy.top
nixpkgs stable 24.05 perf-linux 6.12.6 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 perf-linux 6.12.6 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.11.11 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 6.11.11 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.11.10 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 6.11.10 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.10.1 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 24.05 perf-linux 6.10.1 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.9.11 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 24.05 perf-linux 6.9.11 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 bpftools 6.7 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 24.05 evdev-proto 6.7 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 24.05 linux-headers 6.7 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.6.68 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.6.68 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.6.68 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 6.6.68 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 perf-linux 6.6.68 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.6.67 Potentially vulnerable linuxKernel lythe1107@gmail.com, meurerbernardo@gmail.com, nixpkgs@mail.atemu.net, shawn8901@googlemail.com, me@zzzsy.top
nixpkgs stable 24.05 perf-linux 6.6.67 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.6.63 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.6.63 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 6.6.63 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 perf-linux 6.6.63 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.6.63-rt46 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.1.122 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 6.1.122 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.1.119 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 6.1.119 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.1.119-rt45 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.15.175 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 5.15.175 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.15.173 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 5.15.173 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.15.170-rt81 Potentially vulnerable - tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.10.232 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 5.10.232 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.10.230 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 5.10.230 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.10.229-rt121 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.4.288 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 5.4.288 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.4.286 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 5.4.286 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.4.285-rt93 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 4.19.322 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 4.19.322 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 4.19.315 Potentially vulnerable linuxKernel tredwell@tutanota.com, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.05 perf-linux 4.19.315 Potentially vulnerable linuxKernel viric@viric.name
nixpkgs stable 24.05 tmon 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.16-rc2 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 6.15.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 6.15.4 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 perf-linux 6.15.4 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.15.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.15.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.15.3 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 linux-manual 6.15.3 Potentially vulnerable - mvs@nya.yt
nixpkgs stable 24.11 perf-linux 6.15.3 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 perf-linux 6.15.3 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 6.15.2 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 perf-linux 6.15.2 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.14.11 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 6.14.11 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.13.12 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 6.13.12 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.13.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 6.13.7 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.13.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.13.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.12.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 6.12.35 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.12.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.12.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.12.34 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 6.12.34 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.12.19 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 6.12.19 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.12.19 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.12.19 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 bpftools 6.10 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 24.11 evdev-proto 6.10 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 24.11 linux-headers 6.10 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.6.94 Potentially vulnerable - tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 linux 6.6.94 Potentially vulnerable - tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 6.6.94 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 perf-linux 6.6.94 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 6.6.83 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 perf-linux 6.6.83 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.1.141 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 6.1.141 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.1.131 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 6.1.131 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 6.1.131 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.1.131 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 5.15.185 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 5.15.185 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.15.179 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 5.15.179 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 5.15.179 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.15.179 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 5.10.238 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 5.10.238 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.10.235 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 5.10.235 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 5.10.235 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.10.235 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 5.4.294 Potentially vulnerable linuxKernel tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is, aseipp@pobox.com
nixpkgs stable 24.11 perf-linux 5.4.294 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.4.291 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 perf-linux 5.4.291 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 24.11 tmon 5.4.291 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.4.291 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.19-rc1 Potentially vulnerable linuxKernel aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 cpupower 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.18.2 Potentially vulnerable linuxKernel aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 linux-manual 6.18.2 Potentially vulnerable - mvs@nya.yt
nixpkgs stable 25.05 perf-linux 6.18.2 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 perf-linux 6.18.2 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 perf-linux 6.18.2 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 perf-linux 6.18.2 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.18.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.17.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.17.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 6.17.12 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 perf-linux 6.17.12 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.17.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.17.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.17.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.17.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.12.63 Potentially vulnerable - aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 linux 6.12.63 Potentially vulnerable - aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 perf-linux 6.12.63 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 perf-linux 6.12.63 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.12.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.12.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.12.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.62 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 6.12.62 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.12.62 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.62 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.61 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.61 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 6.12.61 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 perf-linux 6.12.61 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.12.61 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.12.61 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.61 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.61 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 bpftools 6.12.7 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 25.05 evdev-proto 6.12.7 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 25.05 linux-headers 6.12.7 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.6.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.6.119 Potentially vulnerable linuxKernel aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 perf-linux 6.6.119 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.6.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.6.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.6.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.6.115 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 6.6.115 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.6.115 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.6.115 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.1.159 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.1.159 Potentially vulnerable linuxKernel aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 perf-linux 6.1.159 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.1.159 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.1.159 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.1.159 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.1.158 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 6.1.158 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 6.1.158 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.1.158 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.15.197 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 5.15.197 Potentially vulnerable linuxKernel aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 perf-linux 5.15.197 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 5.15.197 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.15.197 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 5.15.197 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.15.196 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 5.15.196 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 5.15.196 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.15.196 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.10.247 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 5.10.247 Potentially vulnerable linuxKernel aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 perf-linux 5.10.247 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 5.10.247 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.10.247 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 5.10.247 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.10.246 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 5.10.246 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 5.10.246 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.10.246 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.4.301 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 perf-linux 5.4.301 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 5.4.301 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.4.301 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.4.300 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 5.4.300 Potentially vulnerable linuxKernel aseipp@pobox.com, tredwell@tutanota.com, me@0upti.me, maximilian@mbosch.me, tim@nequissimus.com, hi@alyssa.is
nixpkgs stable 25.05 perf-linux 5.4.300 Potentially vulnerable linuxKernel nix@tobim.fastmail.fm
nixpkgs stable 25.05 tmon 5.4.300 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.4.300 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 5.4.300 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 7.0 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 linux-manual 7.0 - mvs@nya.yt
nixpkgs stable 25.11 perf-linux 7.0 - nix@tobim.fastmail.fm
nixpkgs stable 25.11 tmon 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 6.19.13 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 tmon 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 tmon 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 tmon 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.19.9 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 tmon 6.19.9 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.19.9 linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 6.18.23 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 tmon 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 tmon 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 bpftools 6.16.7 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 25.11 evdev-proto 6.16.7 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 25.11 linux-headers 6.16.7 Potentially vulnerable - hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 cpupower 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 6.12.82 Potentially vulnerable - aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 linux 6.12.82 Potentially vulnerable - aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 tmon 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.12.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.12.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 tmon 6.12.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 tmon 6.12.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.12.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.12.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 6.6.135 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 tmon 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 6.1.169 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 tmon 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 5.15.203 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 tmon 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 cpupower 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 linux 5.10.253 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs stable 25.11 tmon 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 turbostat 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.11 usbip-linux 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 7.0 - aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 7.0 - aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 7.0 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 7.0 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 7.0 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 7.0 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux-manual 7.0 - mvs@nya.yt
nixpkgs unstable perf-linux 7.0 - nix@tobim.fastmail.fm
nixpkgs unstable tmon 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 7.0 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.19.13 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.19.13 linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable tmon 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.19.13 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.19.12 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.19.12 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.19.12 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.19.12 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.19.12 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.19.12 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.19.11 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.19.11 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.19.11 linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.18.23 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.18.23 Potentially vulnerable - aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.18.23 Potentially vulnerable - aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.18.23 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.18.23 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable tmon 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.18.23 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.18.22 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.18.22 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.18.22 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable bpftools 6.18.7 Potentially vulnerable - aseipp@pobox.com
nixpkgs unstable evdev-proto 6.18.7 Potentially vulnerable - hi@alyssa.is
nixpkgs unstable linux-headers 6.18.7 Potentially vulnerable - hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github
nixpkgs unstable cpupower 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.12.82 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.12.82 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable tmon 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.12.82 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.6.135 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.6.135 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable tmon 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.6.135 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.1.169 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 6.1.169 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable tmon 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.1.169 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 5.15.203 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 5.15.203 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable tmon 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 5.15.203 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 5.10.253 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable linux 5.10.253 Potentially vulnerable linuxKernel aseipp@pobox.com, hi@alyssa.is, me@0upti.me, maximilian@mbosch.me, zowoq@github, balsoft75@gmail.com, contact@infinisil.com, pyrox@pyrox.dev
nixpkgs unstable tmon 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 5.10.253 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
NOIR Linux Main
core
linux-headers 6.7.7 Potentially vulnerable - mmatongo_@hotmail.com
openEuler 20.03-LTS-SP3 kernel 4.19.90 Potentially vulnerable Unspecified -
openEuler 20.03-LTS-SP4 kernel 4.19.90 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP1 kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP3 kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP4 kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 24.03-LTS kernel 6.6.0 Potentially vulnerable Unspecified -
openEuler 24.03-LTS-SP1 kernel 6.6.0 Potentially vulnerable Unspecified -
openEuler 24.09 kernel 6.6.0 Potentially vulnerable Unspecified -
openEuler 25.03 kernel 6.6.0 Potentially vulnerable Unspecified -
openmamba
base
linux-tools 7.0 System/Kernel and Hardware silvan@openmamba.org
openmamba
base
kernel 6.18.18 Potentially vulnerable System/Kernel and Hardware silvan@openmamba.org
OpenMandriva 5.0
main/release
kernel-rc 6.7.0-rc2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 5.0
main/release
kernel 6.6.2 Potentially vulnerable System/Kernel and hardware rugyada@gmail.com
OpenMandriva 5.0
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 6.0
main/release
kernel-rc 6.15.0-rc2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 6.0
main/release
kernel 6.14.2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 6.0
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
kernel 6.19.0 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
kernel-rc 6.19.0-rc8 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Cooker
main/release
kernel 7.0.0 System/Kernel and hardware bero@lindev.ch
OpenMandriva Cooker
main/release
kernel-rc 7.0.0-rc7 System/Kernel and hardware bero@lindev.ch
OpenMandriva Cooker
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
openSUSE Leap 15.5
main/oss
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
main/oss
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
main/oss
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
main/oss
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.5
main/oss
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.5
updates/sle
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.5
updates/sle
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
linux32 1.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
tmon 1.0.gb61442df748f06e9 Potentially vulnerable System/Base -
openSUSE Leap 15.6
main/oss
cpupower 6.4.0 Potentially vulnerable System/Base -
openSUSE Leap 15.6
main/oss
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
main/oss
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
main/oss
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
cpupower 6.4.0 Potentially vulnerable System/Base -
openSUSE Leap 15.6
updates/sle
cpupower 6.4.0 Potentially vulnerable System/Base -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git38565.b555487b73 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git33229.a3afe13a7f Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git33229.a3afe13a7f Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git26920.4570763476 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git26920.4570763476 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git25687.7bc1e4ff37 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git22305.596cd3fdbd Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
main/oss
perf 6.4.0.git19721.c2fa164e2b Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
main/oss
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
linux32 1.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
tmon 1.0.gb61442df748f06e9 Potentially vulnerable System/Base -
openSUSE Tumbleweed
src-oss
cpupower 6.19.12 System/Base -
openSUSE Tumbleweed
src-oss
kernel-default 6.19.12 System/Kernel -
openSUSE Tumbleweed
src-oss
kernel-default-base 6.19.12 System/Kernel -
openSUSE Tumbleweed
src-oss
kernel-docs 6.19.12 Documentation/Man -
openSUSE Tumbleweed
src-oss
kernel-kvmsmall 6.19.12 System/Kernel -
openSUSE Tumbleweed
src-oss
kernel-source 6.19.12 Development/Sources -
openSUSE Tumbleweed
src-oss
kernel-syms 6.19.12 Development/Sources -
openSUSE Tumbleweed
src-oss
kernel-vanilla 6.19.12 System/Kernel -
openSUSE Tumbleweed
src-oss
perf 6.19.12 Development/Tools/Debuggers -
openSUSE Tumbleweed
src-oss
usbip 6.19.12 Hardware/Other -
openSUSE Tumbleweed
src-oss
linux32 1.0 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
tmon 1.0.gb61442df748f06e9 Potentially vulnerable System/Base -
openSUSE network Tumbleweed usbip 6.19.12 Hardware/Other -
openSUSE network Tumbleweed usbip 6.19.11 Hardware/Other -
OpenWrt 23.05 x86_64
packages
usbip 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 23.05 x86_64
packages
usbip-client 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 23.05 x86_64
packages
usbip-server 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 24.10 x86_64
base
tmon 6.6.133 Potentially vulnerable devel fe@dev.tdt.de
OpenWrt 24.10 x86_64
packages
usbip 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 24.10 x86_64
packages
usbip-client 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 24.10 x86_64
packages
usbip-server 2.0 Potentially vulnerable net nunojpg@gmail.com
pacstall linux-headers-deb 7.0 - oren@taumoda.com
pacstall linux-kernel 7.0 - oren@taumoda.com
pacstall linux-kernel-lts-6.6 6.6.63 Potentially vulnerable - jimedrand@disroot.org
Parabola
extra
bootconfig 7.0 - -
Parabola
extra
bpf 7.0 - -
Parabola
extra
hyperv 7.0 - -
Parabola
extra
intel-speed-select 7.0 - -
Parabola
extra
kcpuid 7.0 - -
Pardus 21
updates/main
linux-6.1 6.1.164 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
updates/main
linux 5.10.251 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.223 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.218 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.46 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.28 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.13 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Parrot
parrot-updates/main
linux 6.19.10 kernel team@parrotsec.org, palinuro@parrotsec.org
Parrot
parrot/main
linux 6.19.10 kernel team@parrotsec.org, palinuro@parrotsec.org
PCLinuxOS kernel-userspace-headers 6.12.82 Potentially vulnerable System/Kernel and hardware -
PCLinuxOS tmon 5.12 Potentially vulnerable Monitoring -
PCLinuxOS turbostat 5.12 Potentially vulnerable Monitoring -
Pisi Linux
core
cpupowertools 6.12.82 Potentially vulnerable app:console ertugrulerata@gmail.com
Pisi Linux
core
kernel 6.12.82 Potentially vulnerable kernel ertugrulerata@gmail.com
Pisi Linux
main
perf 6.12.78 Potentially vulnerable app:gui ertugrulerata@gmail.com
PLD Linux kernel 6.19.10 - -
PLD Linux kernel-tools 6.19.0 Potentially vulnerable - -
PLD Linux kernel-6.18 6.18.20 Potentially vulnerable - -
PLD Linux kernel-6.12 6.12.79 Potentially vulnerable - -
PLD Linux kernel-6.6 6.6.130 Potentially vulnerable - -
PLD Linux kernel-6.1 6.1.167 Potentially vulnerable - -
PLD Linux kernel-5.15 5.15.202 Potentially vulnerable - -
PLD Linux kernel-5.10 5.10.252 Potentially vulnerable - -
PLD Linux kernel-4.19 4.19.325 Potentially vulnerable - -
postmarketOS 24.12
aarch64
linux-next 6.12_git20241128 Potentially vulnerable - caleb@postmarketos.org
postmarketOS master
aarch64
linux-next 7.0_git20260313 - kcxt@postmarketos.org
PTXdist kernel 6.17.6 Potentially vulnerable - -
PTXdist usbip 5.8 Potentially vulnerable - -
PureOS amber
amber/main
linux 4.19.249 Potentially vulnerable debian-installer debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
PureOS byzantium
byzantium/main
linux 5.10.209 Potentially vulnerable debian-installer debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
PureOS landing
landing/main
linux 6.12.73 Potentially vulnerable debian-installer debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Oldstable
main
linux 6.1.147 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Oldstable
main
linux-tools 3.16 Potentially vulnerable devel debian-kernel@lists.debian.org, ben@decadent.org.uk, jrnieder@gmail.com, waldi@debian.org
Raspbian Stable
main
linux 6.12.41 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Stable
main
linux-tools 3.16 Potentially vulnerable devel debian-kernel@lists.debian.org, ben@decadent.org.uk, jrnieder@gmail.com, waldi@debian.org
Raspbian Testing
main
linux 6.19.6 kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Testing
main
linux-tools 3.16 Potentially vulnerable devel debian-kernel@lists.debian.org, ben@decadent.org.uk, jrnieder@gmail.com, waldi@debian.org
Ravenports linux-api-headers 6.4.3 Potentially vulnerable devel kraileth@elderlinux.org
Ravenports evdev-proto 6.2 Potentially vulnerable devel fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2021.1
main/release
cpupower 6.7 Potentially vulnerable System/Kernel and hardware m.novosyolov@rosalinux.ru
Rosa 2021.1
contrib/release
usbip 5 Potentially vulnerable System/Configuration/Networking m.novosyolov@rosalinux.ru
Rosa 13
main/release
cpupower 6.7 Potentially vulnerable System/Kernel and hardware alexander@mezon.ru
Rosa 13
contrib/release
usbip 6 Potentially vulnerable System/Configuration/Networking alexander@mezon.ru
Rosa 13
main/release
usbip 6 Potentially vulnerable System/Configuration/Networking alexander@mezon.ru
Rosa 13
contrib/release
kernel-release 5.9.10 Potentially vulnerable System/Kernel and hardware alexander@mezon.ru
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Side Linux kernel 5.15.197 Potentially vulnerable - uglyside@yandex.ru
SlackBuilds development/perf 5.15.193 Potentially vulnerable development andreas.guldstrand@gmail.com
Slackware 15.0
patches
kernel-headers 5.15.193 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.193_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.193_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.188 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.188_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.188_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.187 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.187_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.187_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.161 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.161_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.161_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.160 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.160_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.160_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.145 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.145_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.145_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.139 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.139_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.139_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.117 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.117_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.117_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
extra
kernel-headers 5.15.19 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
kernel-headers 5.15.19_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
kernel-source 5.15.19_smp Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
kernel-headers 6.12.82 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
kernel-source 6.12.82 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.193 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.193 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.188 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.188 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.187 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.187 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.161 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.161 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.160 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.160 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.145 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.145 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.139 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.139 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.117 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.117 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
kernel-headers 5.15.19 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
kernel-source 5.15.19 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
kernel-headers 6.18.23 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
kernel-source 6.18.23 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
patches
kernel-headers 5.15.196 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
patches
kernel-source 5.15.196 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
kernel-headers 5.15.21 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
kernel-source 5.15.21 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking lguest 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-acpi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-agp 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-aoe 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-api-headers 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux-appletalk 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-arcnet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-autofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-bluetooth 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-bridge 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-chrome 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cifs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-coda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-configfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cpufreq 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cramfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-crypto 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cryptoloop 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-dialup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-dlm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-drm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ecryptfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-exofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-firewire 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-firmware 3.16.55 Potentially vulnerable non-free devel@slitaz.org
SliTaz Cooking linux-gfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-hfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-hfsplus 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-hwmon 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-input-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-input-tablet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-input-touchscreen 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ipv6 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-irda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-isdn 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-jfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-joystick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-kvm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-logfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-md 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-media 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-memstick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-minix 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-mmc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-module-headers 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux-mwave 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-nbd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ncpfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-netfilter 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-nfsd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ocfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-reiserfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-romfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-sched 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-scsi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-sound 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-source 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux-speakup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-squashfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-staging 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-toshiba 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-usb-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-usbdsl 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-usbip 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-uwb 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-video 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-wan 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-wimax 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-wireless 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-without-modules 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-without-modules-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-zram 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-acpi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-agp 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-aoe 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-appletalk 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-arcnet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-autofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-bluetooth 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-bridge 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-chrome 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-cifs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-coda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-configfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-cpufreq 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-cramfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-crypto 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-cryptoloop 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-dialup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-dlm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-drm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-ecryptfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-exofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-firewire 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-firmware 3.16.55 Potentially vulnerable non-free devel@slitaz.org
SliTaz Cooking linux586-gfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-hfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-hfsplus 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-hwmon 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-input-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-input-tablet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-input-touchscreen 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-ipv6 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-irda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-isdn 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-jfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-joystick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-kvm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-logfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-md 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-media 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-memstick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-minix 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-mmc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-module-headers 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux586-mwave 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-nbd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-ncpfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-netfilter 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-nfsd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-ocfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-reiserfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-romfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-sched 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-scsi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-sound 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-speakup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-squashfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-staging 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-toshiba 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-tridentfb 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-usb-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-usbdsl 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-usbip 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-uwb 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-video 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-wan 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-wimax 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-wireless 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-without-modules 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-without-modules-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux586-zram 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-acpi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-agp 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-aoe 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-appletalk 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-arcnet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-autofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-bluetooth 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-bridge 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-chrome 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cifs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-coda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-configfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cpufreq 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cramfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-crypto 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cryptoloop 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-dialup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-dlm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-drm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ecryptfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-exofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-firewire 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-gfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-hfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-hfsplus 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-hwmon 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-input-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-input-tablet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-input-touchscreen 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ipv6 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-irda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-isdn 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-jfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-joystick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-kvm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-logfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-md 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-media 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-memstick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-minix 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-mmc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-module-headers 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux64-mwave 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-nbd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ncpfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-netfilter 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-nfsd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ocfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-radio 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-reiserfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-romfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-sched 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-scsi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-sound 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-speakup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-squashfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-staging 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-usb-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-usbdsl 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-usbip 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-uwb 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-video 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-wan 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-wimax 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-wireless 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-without-modules 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-without-modules-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-zram 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking usbip 3.16.55 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Cooking usbip-dev 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-acpi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-agp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-aoe 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-api-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-appletalk 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-arcnet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-autofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-bluetooth 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-bridge 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-chrome 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cifs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-coda 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-configfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cpufreq 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cramfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-crypto 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cryptoloop 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-dialup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-dlm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-drm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ecryptfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-exofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-firewire 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-gfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-gpio 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-hfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-hfsplus 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-hwmon 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-input-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-input-tablet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-input-touchscreen 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ipv6 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-isdn 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-jffs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-jfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-joystick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-kvm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-l2tp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-logfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-md 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-media 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-memstick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-minix 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-mmc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-module-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-mtd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-mwave 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-nbd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ncpfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-netfilter 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-nfsd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ocfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-openvswitch 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-overlayfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-agp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-chrome 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-crypto 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-drm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-hfsplus 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-input-touchscreen 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-ipv6 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-module-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-pae-netfilter 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-overlayfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-sound 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-speakup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-wireless 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-zram 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-reiserfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-romfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-sched 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-scsi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-sound 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-source 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-speakup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-squashfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-staging 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-toshiba 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ubifs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-usb-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-usbdsl 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-usbip 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-video 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-wan 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-wimax 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-wireless 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-without-modules 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-without-modules-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-zram 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-acpi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-agp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-aoe 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-appletalk 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-arcnet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-autofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-bluetooth 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-bridge 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-chrome 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cifs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-coda 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-configfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cpufreq 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cramfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-crypto 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cryptoloop 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-dialup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-dlm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-drm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ecryptfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-exofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-firewire 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-gfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-hfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-hfsplus 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-hwmon 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-input-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-input-tablet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-input-touchscreen 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ipv6 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-isdn 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-jfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-joystick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-kvm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-logfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-md 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-media 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-memstick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-minix 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-mmc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-module-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux64-mwave 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-nbd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ncpfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-netfilter 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-nfsd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ocfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-overlayfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-radio 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-reiserfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-romfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-sched 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-scsi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-sound 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-speakup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-squashfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-staging 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-usb-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-usbdsl 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-usbip 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-video 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-wan 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-wimax 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-wireless 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-without-modules 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-without-modules-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-zram 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current usbip 5.10.238 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Current usbip-dev 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-acpi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-acpi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-agp 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-agp 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-aoe 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-aoe 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-api-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-api-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-appletalk 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-appletalk 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-arcnet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-arcnet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-autofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-autofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bluetooth 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bluetooth 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bridge 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bridge 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-btrfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-btrfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cifs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cifs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-coda 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-coda 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cpufreq 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cpufreq 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cramfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cramfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-crypto 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-crypto 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cryptoloop 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cryptoloop 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dev 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-dev 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-dialup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dialup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dlm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dlm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-drm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-drm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ecryptfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ecryptfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-efi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-efi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ethernet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ethernet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-exofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-exofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-firewire 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-firewire 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-gfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-gfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfsplus 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfsplus 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hid 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hid 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hwmon 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hwmon 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ide 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ide 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-tablet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-tablet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-touchscreen 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-touchscreen 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ipv6 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ipv6 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-isdn 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-isdn 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-jfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-jfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-joystick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-joystick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-kvm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-kvm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-md 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-md 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-media 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-media 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-memstick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-memstick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-minix 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-minix 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-mmc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-mmc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-module-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-module-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-mwave 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-mwave 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nbd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nbd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ncpfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ncpfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-netfilter 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-netfilter 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfsd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfsd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ocfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ocfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-orangefs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-orangefs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-radio 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-radio 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-reiserfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-reiserfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-romfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-romfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sched 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sched 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-scsi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-scsi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sound 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sound 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-source 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-source 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-speakup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-speakup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-squashfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-squashfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-staging 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-staging 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-gadget 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-gadget 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbdsl 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbdsl 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbip 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbip 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-uwb 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-uwb 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-video 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-video 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wan 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wan 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-watchdog 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-watchdog 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wimax 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wimax 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wireless 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wireless 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-without-modules 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-without-modules 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-zram 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-zram 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next usbip 0.1.7 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next usbip 0.1.7 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next usbip-dev 0.1.7 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next usbip-dev 0.1.7 Potentially vulnerable development pascal.bellard@slitaz.org
Solus linux-lts 6.18.23 Potentially vulnerable kernel.image harvey@getsol.us
Solus linux-lts-dbginfo 6.18.23 Potentially vulnerable debug harvey@getsol.us
Solus linux-lts-headers 6.18.23 Potentially vulnerable kernel.devel harvey@getsol.us
Solus linux-tools 6.18.7 Potentially vulnerable programming.tools josephriches@gmail.com
Solus linux-tools-bpftool 6.18.7 Potentially vulnerable system.utils josephriches@gmail.com
Solus linux-tools-cpupower 6.18.7 Potentially vulnerable programming.library josephriches@gmail.com
Solus linux-tools-cpupower-devel 6.18.7 Potentially vulnerable programming.devel josephriches@gmail.com
Solus linux-tools-dbginfo 6.18.7 Potentially vulnerable debug josephriches@gmail.com
Solus linux-tools-turbostat 6.18.7 Potentially vulnerable system.utils josephriches@gmail.com
Solus linux-tools-x86_energy_perf_policy 6.18.7 Potentially vulnerable system.utils josephriches@gmail.com
Solus linux-headers 6.18 Potentially vulnerable system.devel josephriches@gmail.com
Spack linux-perf 6.9.10 Potentially vulnerable detectable jordan474@spack
Spack linux-headers 6.9.1 Potentially vulnerable - fallback-mnt-spack@repology
stal/IX lib/linux/headers/next 6.17.13 Potentially vulnerable lib anton@samokhvalov.xyz
stal/IX bin/kernel/6/16 6.16.11 Potentially vulnerable bin anton@samokhvalov.xyz
stal/IX dev lib/linux/headers/next 6.17.13 Potentially vulnerable lib anton@samokhvalov.xyz
stal/IX dev bin/kernel/6/16 6.16.11 Potentially vulnerable bin anton@samokhvalov.xyz
T2 SDE linux 6.19.13 base/kernel rene@exactco.de
T2 SDE perf 6.19.13 base/tool rene@exactco.de
T2 SDE linux-header 6.6 Potentially vulnerable base/system rene@exactco.de
Terra 40 tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Terra 41 tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Terra rawhide tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Terra rawhide tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Tin Can Linux
core
linux-headers 6.13.7 Potentially vulnerable - avs.origami@gmail.com
Trisquel 10.0
nabia-updates/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
linux 5.4.0 Potentially vulnerable devel trisquel-devel@listas.trisquel.info
Trisquel 10.0
nabia/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Trisquel 11.0
aramo-updates/main
linux 5.15.0 Potentially vulnerable devel trisquel-devel@listas.trisquel.info
Trisquel 11.0
aramo/main
linux 5.15.0 Potentially vulnerable devel trisquel-devel@listas.trisquel.info
Ubuntu 14.04
trusty-updates/main
linux-lts-xenial 4.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux-lts-wily 4.2.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux-lts-vivid 3.19.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux-lts-utopic 3.16.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux 3.13.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty/main
linux 3.13.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty/universe
usbip 0.1.7 Potentially vulnerable universe/admin xam@debian.org
Ubuntu 16.04
xenial-updates/main
linux 4.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 16.04
xenial/main
linux 4.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 16.04
xenial/universe
usbip 0.1.7 Potentially vulnerable universe/admin xam@debian.org
Ubuntu 18.04
bionic-updates/main
linux 4.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 18.04
bionic/main
linux 4.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 20.04
focal-updates/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 20.04
focal/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 22.04
jammy-updates/main
linux 5.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 22.04
jammy/main
linux 5.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 24.04
noble-updates/main
linux 6.8.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 24.04
noble/main
linux 6.8.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.04
plucky-updates/main
linux 6.14.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.04
plucky/main
linux 6.14.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.10
questing-updates/main
linux 6.17.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.10
questing/main
linux 6.17.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 26.04
resolute/main
linux 7.0.0 devel kernel-team@lists.ubuntu.com
Void Linux x86_64
x86_64
linux-mainline 7.0 - leah@vuxu.org
Void Linux x86_64
x86_64
linux-mainline-headers 7.0 - leah@vuxu.org
Void Linux x86_64
x86_64
linux7.0 7.0.0 - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux7.0-headers 7.0.0 - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.19 6.19.13 - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.19-headers 6.19.13 - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.18 6.18.23 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.18-headers 6.18.23 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
kernel-libc-headers 6.14 Potentially vulnerable - ericonr@disroot.org
Void Linux x86_64
x86_64
linux6.12 6.12.82 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.12-headers 6.12.82 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux 6.12 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux-headers 6.12 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux6.6 6.6.135 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.6-headers 6.6.135 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux-lts 6.6 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux-lts-headers 6.6 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
bpftool 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
cpupower 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
freefall 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libcpupower 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libcpupower-devel 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libusbip 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libusbip-devel 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
linux-tools 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
perf 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
tmon 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
turbostat 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
usbip 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
x86_energy_perf_policy 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
linux6.1 6.1.169 Potentially vulnerable - congdanhqx@gmail.com
Void Linux x86_64
x86_64
linux6.1-headers 6.1.169 Potentially vulnerable - congdanhqx@gmail.com
Void Linux x86_64
x86_64
linux5.15 5.15.201 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
linux5.15-headers 5.15.201 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
linux5.10 5.10.251 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
linux5.10-headers 5.10.251 Potentially vulnerable - orphan@voidlinux.org
Wikidata Linux kernel 7.0 - -
Wikidata Linux kernel 7.0-rc7 - -
Wikidata Linux kernel 6.18.21 Potentially vulnerable - -