Versions Packages Information History CVEs Related Badges Report

Versions for busybox

273 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux 3.8
main
busybox-static 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
ssl_client 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
busybox-extras 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
busybox-suid 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
busybox 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox-extras 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
ssl_client 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox-static 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox-suid 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
ssl_client 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox-suid 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox-static 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox-extras 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox-extras 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox-static 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
ssl_client 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox-suid 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-suid 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-extras 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
ssl_client 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-static 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-doc 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-doc 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-extras 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
ssl_client 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-suid 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-static 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-ifupdown 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-ifupdown 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
ssl_client 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-static 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-doc 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-suid 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-extras 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-static 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-suid 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-ifupdown 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-extras 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
ssl_client 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-doc 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
busybox-suid 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
ssl_client 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-ifupdown 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-doc 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-static 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-extras 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Amazon Linux 1
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Amazon Linux 1
main
busybox 1.19.3 Potentially vulnerable System Environment/Shells -
Amazon Linux 1
updates
busybox 1.19.3 Potentially vulnerable System Environment/Shells -
AOSC busybox 1.32.0 Potentially vulnerable utils fallback-mnt-aosc@repology
Apertis v2020
v2020/target
busybox 1.30.1 Potentially vulnerable main debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2021
v2021/target
busybox 1.30.1 Potentially vulnerable main debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2022
v2022/target
busybox 1.30.1 Potentially vulnerable main debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2023 Development
v2023dev1/target
busybox 1.30.1 Potentially vulnerable main debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Arch
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch
community
busybox 1.34.1 Potentially vulnerable - -
Arch Linux 32 i486
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux 32 i486
community
busybox 1.34.1 Potentially vulnerable - -
Arch Linux 32 i686
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux 32 i686
community
busybox 1.34.1 Potentially vulnerable - -
Arch Linux 32 pentium4
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux 32 pentium4
community
busybox 1.34.1 Potentially vulnerable - -
Arch Linux ARM aarch64
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux ARM aarch64
community
busybox 1.34.1 Potentially vulnerable - -
Arch Linux ARM armv7h
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux ARM armv7h
community
busybox 1.34.1 Potentially vulnerable - -
ArchPOWER powerpc mkinitcpio-busybox 1.31.1 Potentially vulnerable - -
ArchPOWER powerpc64le mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
ArchPOWER riscv64 mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
AUR busybox-git 1.33.0.r363.g08ca313d7 - chocobo1@aur
AUR busybox-custom-git 1.28.0 - endlesseden@aur
AUR busybox-norootreboot 1.25.0 Potentially vulnerable - jcjordyn120@aur
Artix
system
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Astra Orel Stable
main
busybox 1.22.0 Potentially vulnerable utils debian-boot@lists.debian.org, mjt@tls.msk.ru, waldi@debian.org
Carbs Linux
core
busybox 1.34.1 Potentially vulnerable - cem@carbslinux.org
CentOS 6
os
busybox 1.15.1 Potentially vulnerable System Environment/Shells -
Chocolatey BusyBox-w32 4621.0 - -
Cygwin busybox-doc 1.23.2 Potentially vulnerable Shells christian.franke@cygwin
Cygwin busybox 1.23.2 Potentially vulnerable Shells christian.franke@cygwin
Cygwin busybox-debuginfo 1.23.2 Potentially vulnerable Debug christian.franke@cygwin
Cygwin busybox-standalone 1.23.2 Potentially vulnerable Shells christian.franke@cygwin
Debian 8
jessie/main
busybox 1.22.0 Potentially vulnerable utils debian-boot@lists.debian.org, mjt@tls.msk.ru, waldi@debian.org
Debian 9
stretch/main
busybox 1.22.0 Potentially vulnerable utils debian-boot@lists.debian.org, mjt@tls.msk.ru, waldi@debian.org
Debian 10
buster/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Debian 11
bullseye/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Debian 12
bookworm/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Debian 12
bookworm/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Debian Unstable
sid/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Debian Unstable
sid/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Deepin
main
busybox 1.30.1.3 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Deepin
main
busybox 1.30.1.2 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Deepin
main
busybox 1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Devuan 1.0
jessie/main
busybox 1.22.0 Potentially vulnerable utils debian-boot@lists.debian.org, mjt@tls.msk.ru, waldi@debian.org
Devuan 2.0
ascii/main
busybox 1.22.0 Potentially vulnerable misc debian-boot@lists.debian.org, mjt@tls.msk.ru, waldi@debian.org
Devuan 3.0
beowulf/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Devuan 4.0
chimaera/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Devuan Unstable
unstable/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
distri busybox 1.31.1 Potentially vulnerable - -
DistroWatch.com busybox 1.35.0 Potentially vulnerable - -
DPorts sysutils/busybox 1.26.2 Potentially vulnerable sysutils ports@freebsd.org
Entware
x64-k3.2
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
Entware
mipselsf-k3.4
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
Entware
mipssf-k3.4
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
Entware
armv5sf-k3.2
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
Entware
armv7sf-k2.6
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
Entware
aarch64-k3.10
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
Entware
armv7sf-k3.2
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
EPEL 9 busybox 1.35.0 Potentially vulnerable Unspecified -
Exherbo
arbor
sys-apps/busybox 1.34.0 Potentially vulnerable sys-apps fallback-mnt-exherbo@repology
F-Droid BusyBox 1.34.1 Potentially vulnerable System -
F-Droid BusyBox 1.31.1 Potentially vulnerable System -
F-Droid BusyBox 1.30.1 Potentially vulnerable System -
Fedora 26
release
busybox 1.22.1 Potentially vulnerable System Environment/Shells -
Fedora 27
release
busybox 1.26.2 Potentially vulnerable System Environment/Shells -
Fedora 28
release
busybox 1.26.2 Potentially vulnerable System Environment/Shells -
Fedora 29
release
busybox 1.28.3 Potentially vulnerable System Environment/Shells -
Fedora 30
release
busybox 1.28.3 Potentially vulnerable Unspecified -
Fedora 31
release
busybox 1.30.1 Potentially vulnerable Unspecified -
Fedora 32
updates
busybox 1.32.1 Potentially vulnerable Unspecified -
Fedora 32
release
busybox 1.31.1 Potentially vulnerable Unspecified -
Fedora 33
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Fedora 33
release
busybox 1.32.0 Potentially vulnerable Unspecified -
Fedora 34
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Fedora 34
release
busybox 1.33.0 Potentially vulnerable Unspecified -
Fedora 35
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Fedora 35
release
busybox 1.34.0 Potentially vulnerable Unspecified -
Fedora 36
updates
busybox 1.35.0 Potentially vulnerable Unspecified -
Fedora 36
release
busybox 1.35.0 Potentially vulnerable Unspecified -
Fedora Rawhide
development
busybox 1.35.0 Potentially vulnerable Unspecified -
FreeBSD Ports sysutils/busybox 1.34.1 Potentially vulnerable sysutils samm@freebsd.org
Funtoo 1.4
core-kit
sys-apps/busybox 1.32.0 Potentially vulnerable sys-apps embedded@gentoo.org
Funtoo 1.4
core-kit
sys-apps/busybox 1.31.1 Potentially vulnerable sys-apps embedded@gentoo.org
Funtoo 1.4
core-kit
sys-fs/mdev 1.21.1 Potentially vulnerable sys-fs fallback-mnt-funtoo@repology
Gentoo sys-apps/busybox 9999 sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.35.0 Potentially vulnerable sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.34.1 Potentially vulnerable sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.33.1 Potentially vulnerable sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.33.1 Potentially vulnerable sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.32.1 Potentially vulnerable sys-apps embedded@gentoo.org
GNU Guix busybox 1.33.1 Potentially vulnerable - -
GoboLinux BusyBox 1.31.1 Potentially vulnerable - -
Kali Linux Rolling
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
KaOS
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - demm@kaosx.us
LiGurOS stable sys-apps/busybox 9999 sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.35.0 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.34.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.33.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.33.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.32.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 9999 sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.35.0 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.34.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.33.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.33.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.32.1 Potentially vulnerable sys-apps embedded@gentoo.org
Mageia 7
core/release
busybox 1.30.1 Potentially vulnerable Shells -
Mageia 7
core/updates
busybox 1.30.1 Potentially vulnerable Shells -
Mageia 7
core/updates
busybox 1.30.1 Potentially vulnerable Shells -
Mageia 8
core/updates
busybox 1.34.1 Potentially vulnerable Shells -
Mageia 8
core/updates
busybox 1.34.1 Potentially vulnerable Shells -
Mageia 8
core/release
busybox 1.32.1 Potentially vulnerable Shells -
Mageia 8
core/updates
busybox 1.32.1 Potentially vulnerable Shells -
Mageia Cauldron
core/release
busybox 1.35.0 Potentially vulnerable Shells -
Manjaro Stable
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Manjaro Stable
community
busybox 1.34.1 Potentially vulnerable - -
Manjaro Testing
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Manjaro Testing
community
busybox 1.34.1 Potentially vulnerable - -
Manjaro Unstable
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Manjaro Unstable
community
busybox 1.34.1 Potentially vulnerable - -
MSYS2 msys2
x86_64
busybox 1.31.1 Potentially vulnerable - alexpux@gmail.com
MSYS2 msys2
i686
busybox 1.31.1 Potentially vulnerable - alexpux@gmail.com
nixpkgs stable 21.05 busybox 1.32.1 Potentially vulnerable - freaken@freaken.dk
nixpkgs stable 21.11 busybox 1.34.1 Potentially vulnerable - freaken@freaken.dk, hi@alyssa.is
nixpkgs unstable busybox 1.35.0 Potentially vulnerable - freaken@freaken.dk, hi@alyssa.is
NOIR Linux Main
core
busybox 1.34.1 Potentially vulnerable - mmatongo_@hotmail.com
openEuler 20.03
source
busybox 1.31.1 Potentially vulnerable Unspecified -
OpenMandriva 4.0
main/release
busybox 1.30.1 Potentially vulnerable Shells bero@lindev.ch
OpenMandriva 4.1
main/release
busybox 1.30.1 Potentially vulnerable Shells tpgxyz@gmail.com
OpenMandriva 4.2
main/release
busybox 1.32.0 Potentially vulnerable Shells bero@lindev.ch
OpenMandriva Rolling
main/release
busybox 1.32.1 Potentially vulnerable Shells bero+massbuild@lindev.ch
OpenMandriva Cooker
main/release
busybox 1.32.1 Potentially vulnerable Shells bero+massbuild@lindev.ch
openSUSE Leap 42.3
main/oss
busybox 1.21.1 Potentially vulnerable System/Base -
openSUSE Leap 42.3
main/oss
busybox-static 1.21.1 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.3
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.3
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.4
main/oss
busybox 1.34.1 Potentially vulnerable System/Base -
openSUSE Tumbleweed
src-oss
busybox 1.35.0 Potentially vulnerable System/Base -
OpenWrt 17.01 x86_64
base
busybox 1.25.1 Potentially vulnerable base nbd@nbd.name
OpenWrt 18.06 x86_64
base
busybox 1.28.4 Potentially vulnerable base nbd@nbd.name
OpenWrt 19.07 x86_64
base
busybox 1.30.1 Potentially vulnerable base nbd@nbd.name
OpenWrt 21.02 x86_64
base
busybox-selinux 1.33.2 Potentially vulnerable base nbd@nbd.name
OpenWrt 21.02 x86_64
base
busybox 1.33.2 Potentially vulnerable base nbd@nbd.name
Parabola
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Parabola
community
busybox 1.34.1 Potentially vulnerable - -
Pardus 17
main
busybox 1.22.0 Potentially vulnerable utils debian-boot@lists.debian.org, mjt@tls.msk.ru, waldi@debian.org
Pardus 19
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Pardus 21
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Parrot
parrot-updates/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Parrot
parrot/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Pisi Linux
core
busybox 1.33.1 Potentially vulnerable app:console admins@pisilinux.org
PLD Linux busybox 1.31.1 Potentially vulnerable - -
PureOS Amber busybox 1.30.1 Potentially vulnerable misc debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
PureOS landing busybox 1.30.1 Potentially vulnerable misc debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Raspbian Oldstable
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Raspbian Stable
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Raspbian Testing
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Rosa 2014.1
main/updates
busybox 1.24.2 Potentially vulnerable - -
Rosa 2014.1
main/release
busybox 1.22.1 Potentially vulnerable - -
Rosa 2016.1
main/updates
busybox 1.27.2 Potentially vulnerable - -
Rosa 2016.1
main/release
busybox 1.26.0 Potentially vulnerable - -
Rosa 2019.1
main/release
busybox 1.34.1 Potentially vulnerable Shells alexander@mezon.ru
Rosa Server 6.9
base/release
busybox 1.15.1 Potentially vulnerable System Environment/Shells andrew.lukoshko@rosalab.ru
Scoop
main
busybox 4621-gf3c5e8bc3 - -
SlackBuilds system/busybox 1.32.1 Potentially vulnerable system jfch@jagda.eu
SliTaz Cooking ssfs-busybox 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking busybox 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking busybox-boot 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking busybox-pam 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking busybox-static 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next busybox 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next busybox-pam 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next ssfs-busybox 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
Solus busybox 1.30.1 Potentially vulnerable system.boot th.solus@gmail.com
Solus busybox-dbginfo 1.30.1 Potentially vulnerable debug th.solus@gmail.com
Spack busybox 1.31.1 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE busybox 1.35.0 Potentially vulnerable base/system rene@t2-project.org
Termux busybox 1.35.0 Potentially vulnerable - termux@github
Trisquel 6.0
toutatis-updates/main
busybox 1.18.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, waldi@debian.org
Trisquel 6.0
toutatis/main
busybox 1.18.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, waldi@debian.org
Trisquel 7.0
belenos-updates/main
busybox 1.21.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Trisquel 7.0
belenos/main
busybox 1.21.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Trisquel 8.0
flidas/main
busybox 1.22.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Trisquel 8.0
flidas-updates/main
busybox 1.22.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Trisquel 9.0
etiona-updates/main
busybox 1.27.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Trisquel 9.0
etiona/main
busybox 1.27.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Trisquel 10.0
nabia/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Trisquel 10.0
nabia-updates/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 14.04
trusty/main
busybox 1.21.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 14.04
trusty-updates/main
busybox 1.21.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 16.04
xenial-updates/main
busybox 1.22.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 16.04
xenial/main
busybox 1.22.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 18.04
bionic-updates/main
busybox 1.27.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 18.04
bionic/main
busybox 1.27.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 20.04
focal/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 20.04
focal-updates/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 21.04
hirsute-updates/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 21.04
hirsute/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 21.10
impish-updates/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 21.10
impish/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 22.04
jammy/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 22.10
kinetic/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Void Linux x86_64
x86_64
busybox 1.34.1 Potentially vulnerable - cnemo@tutanota.com
Void Linux x86_64
x86_64
busybox-core 1.34.1 Potentially vulnerable - cnemo@tutanota.com
Void Linux x86_64
x86_64
busybox-huge 1.34.1 Potentially vulnerable - cnemo@tutanota.com
Void Linux x86_64
x86_64
busybox-static 1.34.1 Potentially vulnerable - cnemo@tutanota.com
Wikidata BusyBox 1.35.0 Potentially vulnerable - -
Wikidata BusyBox 1.34.1 Potentially vulnerable - -