Versions Packages Information History CVEs Related Badges Report

Versions for busybox

303 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux 3.8
main
busybox-static 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
ssl_client 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
busybox-extras 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
busybox-suid 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
busybox 1.28.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox-extras 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
ssl_client 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox-static 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
busybox-suid 1.29.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
ssl_client 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox-suid 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox-static 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
busybox-extras 1.30.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox-extras 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox-static 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
ssl_client 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
busybox-suid 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
ssl_client 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-static 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-doc 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-suid 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
busybox-extras 1.31.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-suid 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
ssl_client 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-doc 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-ifupdown 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-static 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
busybox-extras 1.32.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-extras 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-ifupdown 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-suid 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
ssl_client 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-doc 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
busybox-static 1.33.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
ssl_client 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-static 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-extras 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-suid 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-doc 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
busybox-ifupdown 1.34.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
busybox-suid 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.16
main
busybox-doc 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.16
main
busybox-ifupdown 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.16
main
busybox-static 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.16
main
busybox-extras 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.16
main
ssl_client 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.16
main
busybox 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-extras-openrc 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-binsh 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-suid 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-extras 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
ssl_client 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-openrc 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-ifupdown 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-mdev-openrc 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-doc 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.17
main
busybox-static 1.35.0 Potentially vulnerable - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-binsh 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-doc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-extras 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-extras-openrc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-ifupdown 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-mdev-openrc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-openrc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-static 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
busybox-suid 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux 3.18
main
ssl_client 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-binsh 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-doc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-extras 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-extras-openrc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-ifupdown 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-mdev-openrc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-openrc 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-static 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
busybox-suid 1.36.1 - soeren+alpine@soeren-tempel.net
Alpine Linux Edge
main
ssl_client 1.36.1 - soeren+alpine@soeren-tempel.net
Amazon Linux 1
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Amazon Linux 1
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Amazon Linux 1
main
busybox 1.19.3 Potentially vulnerable System Environment/Shells -
Amazon Linux 1
updates
busybox 1.19.3 Potentially vulnerable System Environment/Shells -
AOSC busybox 1.35.0 Potentially vulnerable utils fallback-mnt-aosc@repology
Apertis v2020
v2020/target
busybox 1.30.1 Potentially vulnerable main debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2021
v2021/target
busybox 1.30.1 Potentially vulnerable main debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2022
v2022/target
busybox 1.30.1 Potentially vulnerable main debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2023
v2023/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2023
v2023/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2023
v2023/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2023
v2023-updates/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2023
v2023-updates/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2024 Development
v2024dev1/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2024 Development
v2024dev1/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Apertis v2024 Development
v2024dev1/target
busybox 1.30.1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Arch
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch
extra
busybox 1.34.1 Potentially vulnerable - -
Arch Linux 32 i486
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux 32 i486
extra
busybox 1.34.1 Potentially vulnerable - -
Arch Linux 32 i686
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux 32 i686
extra
busybox 1.34.1 Potentially vulnerable - -
Arch Linux 32 pentium4
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
busybox 1.34.1 Potentially vulnerable - -
Arch Linux ARM aarch64
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux ARM aarch64
community
busybox 1.34.1 Potentially vulnerable - -
Arch Linux ARM armv7h
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Arch Linux ARM armv7h
community
busybox 1.34.1 Potentially vulnerable - -
ArchPOWER powerpc mkinitcpio-busybox 1.31.1 Potentially vulnerable - -
ArchPOWER powerpc64le mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
ArchPOWER riscv64 mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
AUR busybox-git 1.36.0.r67.g3e83699ce - chocobo1@aur
AUR busybox-custom-git 1.28.0 - endlesseden@aur
AUR busybox-norootreboot 1.25.0 Potentially vulnerable - jcjordyn120@aur
Artix
system
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Carbs Linux
core
busybox 1.36.1 - cem@carbslinux.org
CentOS 6
os
busybox 1.15.1 Potentially vulnerable System Environment/Shells -
Chocolatey BusyBox-w32 5007.0 - -
Cygwin busybox 1.23.2 Potentially vulnerable Shells christian.franke@cygwin
Cygwin busybox-debuginfo 1.23.2 Potentially vulnerable Debug christian.franke@cygwin
Cygwin busybox-doc 1.23.2 Potentially vulnerable Shells christian.franke@cygwin
Cygwin busybox-standalone 1.23.2 Potentially vulnerable Shells christian.franke@cygwin
Debian 10
buster/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Debian 11
bullseye/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Debian 12
bookworm/main
busybox 1.35.0 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
Debian Unstable
sid/main
busybox 1.35.0 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
Debian Experimental
experimental/main
busybox 1.36.0 utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
Deepin
main
busybox 1.30.1.3 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Deepin
main
busybox 1.30.1.2 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Deepin
main
busybox 1 Potentially vulnerable - debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Devuan 3.0
beowulf/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Devuan 4.0
chimaera/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Devuan Unstable
unstable/main
busybox 1.35.0 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
distri busybox 1.31.1 Potentially vulnerable - -
DistroWatch.com busybox 1.36.1 - -
DPorts sysutils/busybox 1.26.2 Potentially vulnerable sysutils ports@freebsd.org
Entware
mipselsf-k3.4
busybox 1.36.1 base nbd@nbd.name
Entware
mipssf-k3.4
busybox 1.36.1 base nbd@nbd.name
Entware
x64-k3.2
busybox 1.36.1 base nbd@nbd.name
Entware
aarch64-k3.10
busybox 1.36.1 base nbd@nbd.name
Entware
armv5sf-k3.2
busybox 1.36.1 base nbd@nbd.name
Entware
armv7sf-k2.6
busybox 1.36.1 base nbd@nbd.name
Entware
armv7sf-k3.2
busybox 1.36.1 base nbd@nbd.name
EPEL 9 busybox 1.35.0 Potentially vulnerable Unspecified -
Exherbo
arbor
sys-apps/busybox 1.36.1 sys-apps fallback-mnt-exherbo@repology
F-Droid BusyBox 1.34.1 Potentially vulnerable System -
F-Droid BusyBox 1.31.1 Potentially vulnerable System -
F-Droid BusyBox 1.30.1 Potentially vulnerable System -
Fedora 26
release
busybox 1.22.1 Potentially vulnerable System Environment/Shells -
Fedora 27
release
busybox 1.26.2 Potentially vulnerable System Environment/Shells -
Fedora 28
release
busybox 1.26.2 Potentially vulnerable System Environment/Shells -
Fedora 29
release
busybox 1.28.3 Potentially vulnerable System Environment/Shells -
Fedora 30
release
busybox 1.28.3 Potentially vulnerable Unspecified -
Fedora 31
release
busybox 1.30.1 Potentially vulnerable Unspecified -
Fedora 32
updates
busybox 1.32.1 Potentially vulnerable Unspecified -
Fedora 32
release
busybox 1.31.1 Potentially vulnerable Unspecified -
Fedora 33
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Fedora 33
release
busybox 1.32.0 Potentially vulnerable Unspecified -
Fedora 34
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Fedora 34
release
busybox 1.33.0 Potentially vulnerable Unspecified -
Fedora 35
updates
busybox 1.34.1 Potentially vulnerable Unspecified -
Fedora 35
release
busybox 1.34.0 Potentially vulnerable Unspecified -
Fedora 36
updates
busybox 1.36.0 Unspecified -
Fedora 36
release
busybox 1.35.0 Potentially vulnerable Unspecified -
Fedora 37
updates
busybox 1.36.0 Unspecified -
Fedora 37
release
busybox 1.35.0 Potentially vulnerable Unspecified -
Fedora 38
release
busybox 1.36.0 Unspecified -
Fedora Rawhide
development
busybox 1.36.1 Unspecified -
FreeBSD Ports sysutils/busybox 1.34.1 Potentially vulnerable sysutils samm@freebsd.org
Gentoo sys-apps/busybox 9999 sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.36.1 sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.35.0 Potentially vulnerable sys-apps embedded@gentoo.org
Gentoo sys-apps/busybox 1.34.1 Potentially vulnerable sys-apps embedded@gentoo.org
GNU Guix busybox 1.36.1 - -
GoboLinux BusyBox 1.31.1 Potentially vulnerable - -
Kali Linux Rolling
main
busybox 1.35.0 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
KaOS
core
busybox 1.36.1 - demm@kaosx.us
LiGurOS stable sys-apps/busybox 9999 sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.35.0 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.35.0 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.34.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS stable sys-apps/busybox 1.34.1 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 9999 sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.36.1 sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.35.0 Potentially vulnerable sys-apps embedded@gentoo.org
LiGurOS develop sys-apps/busybox 1.34.1 Potentially vulnerable sys-apps embedded@gentoo.org
Mageia 7
core/updates
busybox 1.30.1 Potentially vulnerable Shells -
Mageia 7
core/updates
busybox 1.30.1 Potentially vulnerable Shells -
Mageia 7
core/release
busybox 1.30.1 Potentially vulnerable Shells -
Mageia 8
core/updates
busybox 1.34.1 Potentially vulnerable Shells -
Mageia 8
core/updates
busybox 1.34.1 Potentially vulnerable Shells -
Mageia 8
core/updates
busybox 1.34.1 Potentially vulnerable Shells -
Mageia 8
core/updates
busybox 1.32.1 Potentially vulnerable Shells -
Mageia 8
core/release
busybox 1.32.1 Potentially vulnerable Shells -
Mageia Cauldron
core/release
busybox 1.36.1 Shells -
Manjaro Stable
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Manjaro Stable
community
busybox 1.34.1 Potentially vulnerable - -
Manjaro Testing
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Manjaro Testing
community
busybox 1.34.1 Potentially vulnerable - -
Manjaro Unstable
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Manjaro Unstable
extra
busybox 1.34.1 Potentially vulnerable - -
MSYS2 msys2
x86_64
busybox 1.31.1 Potentially vulnerable - alexpux@gmail.com
nixpkgs stable 21.11 busybox 1.34.1 Potentially vulnerable - freaken@freaken.dk, hi@alyssa.is
nixpkgs stable 22.05 busybox 1.35.0 Potentially vulnerable - freaken@freaken.dk, hi@alyssa.is
nixpkgs stable 22.11 busybox 1.35.0 Potentially vulnerable - freaken@freaken.dk, hi@alyssa.is
nixpkgs stable 23.05 busybox 1.36.1 - freaken@freaken.dk, hi@alyssa.is
nixpkgs unstable busybox 1.36.1 - freaken@freaken.dk, hi@alyssa.is
NOIR Linux Main
core
busybox 1.34.1 Potentially vulnerable - mmatongo_@hotmail.com
openEuler 20.03
source
busybox 1.31.1 Potentially vulnerable Unspecified -
openEuler 22.03
source
busybox 1.34.1 Potentially vulnerable Unspecified -
OpenMandriva 4.0
main/release
busybox 1.30.1 Potentially vulnerable Shells bero@lindev.ch
OpenMandriva 4.1
main/release
busybox 1.30.1 Potentially vulnerable Shells tpgxyz@gmail.com
OpenMandriva 4.2
main/release
busybox 1.32.0 Potentially vulnerable Shells bero@lindev.ch
OpenMandriva 4.3
main/release
busybox 1.32.1 Potentially vulnerable Shells bero+massbuild@lindev.ch
OpenMandriva Rolling
main/release
busybox 1.35.0 Potentially vulnerable Shells bero@lindev.ch
OpenMandriva Cooker
main/release
busybox 1.35.0 Potentially vulnerable Shells bero@lindev.ch
openSUSE Leap 42.3
main/oss
busybox 1.21.1 Potentially vulnerable System/Base -
openSUSE Leap 42.3
main/oss
busybox-static 1.21.1 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.3
main/oss
busybox 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.3
main/oss
busybox-static 1.26.2 Potentially vulnerable System/Base -
openSUSE Leap 15.4
main/oss
busybox 1.34.1 Potentially vulnerable System/Base -
openSUSE Leap 15.5
main/oss
busybox 1.35.0 Potentially vulnerable System/Base -
openSUSE Tumbleweed
src-oss
busybox 1.36.0 System/Base -
OpenWrt 17.01 x86_64
base
busybox 1.25.1 Potentially vulnerable base nbd@nbd.name
OpenWrt 18.06 x86_64
base
busybox 1.28.4 Potentially vulnerable base nbd@nbd.name
OpenWrt 19.07 x86_64
base
busybox 1.30.1 Potentially vulnerable base nbd@nbd.name
OpenWrt 21.02 x86_64
base
busybox-selinux 1.33.2 Potentially vulnerable base nbd@nbd.name
OpenWrt 21.02 x86_64
base
busybox 1.33.2 Potentially vulnerable base nbd@nbd.name
OpenWrt 22.03 x86_64
base
busybox-selinux 1.35.0 Potentially vulnerable base nbd@nbd.name
OpenWrt 22.03 x86_64
base
busybox 1.35.0 Potentially vulnerable base nbd@nbd.name
Parabola
core
mkinitcpio-busybox 1.35.0 Potentially vulnerable - -
Parabola
extra
busybox 1.34.1 Potentially vulnerable - -
Pardus 21
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Parrot
parrot-updates/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Parrot
parrot/main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Pisi Linux
core
busybox 1.33.1 Potentially vulnerable app:console admins@pisilinux.org
PLD Linux busybox 1.35.0 Potentially vulnerable - -
PureOS Amber busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
PureOS landing busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Raspbian Oldstable
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Raspbian Stable
main
busybox 1.30.1 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Raspbian Testing
main
busybox 1.35.0 Potentially vulnerable utils debian-boot@lists.debian.org, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
Rosa 2014.1
main/updates
busybox 1.24.2 Potentially vulnerable - -
Rosa 2014.1
main/release
busybox 1.22.1 Potentially vulnerable - -
Rosa 2016.1
main/updates
busybox 1.27.2 Potentially vulnerable - -
Rosa 2016.1
main/release
busybox 1.26.0 Potentially vulnerable - -
Rosa 2021.1
main/release
busybox 1.35.0 Potentially vulnerable Shells a.proklov@rosalinux.ru
Rosa Server 6.9
base/release
busybox 1.15.1 Potentially vulnerable System Environment/Shells andrew.lukoshko@rosalab.ru
Scoop
main
busybox 5007-g82accfc19 - -
SlackBuilds system/busybox 1.32.1 Potentially vulnerable system jfch@jagda.eu
SliTaz Cooking busybox 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking busybox-boot 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking busybox-pam 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking busybox-static 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking ssfs-busybox 1.31.1 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next busybox 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next busybox-pam 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next ssfs-busybox 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next busybox 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next busybox-pam 1.27.2 Potentially vulnerable base-system pascal.bellard@slitaz.org
Solus busybox 1.30.1 Potentially vulnerable system.boot th.solus@gmail.com
Solus busybox-dbginfo 1.30.1 Potentially vulnerable debug th.solus@gmail.com
Spack busybox 1.36.0 - fallback-mnt-spack@repology
T2 SDE busybox 1.36.1 base/system rene@t2-project.org
Termux busybox 1.36.1 - termux@github
Trisquel 10.0
nabia/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Trisquel 10.0
nabia-security/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Trisquel 10.0
nabia-updates/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Trisquel 11.0
aramo/main
busybox 1.30.1 Potentially vulnerable utils trisquel-devel@listas.trisquel.info, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Trisquel 11.0
aramo-updates/main
busybox 1.30.1 Potentially vulnerable utils trisquel-devel@listas.trisquel.info, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 14.04
trusty/main
busybox 1.21.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 14.04
trusty-updates/main
busybox 1.21.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 16.04
xenial-updates/main
busybox 1.22.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 16.04
xenial/main
busybox 1.22.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, waldi@debian.org
Ubuntu 18.04
bionic/main
busybox 1.27.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 18.04
bionic-updates/main
busybox 1.27.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 20.04
focal/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 20.04
focal-updates/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 22.04
jammy/main
busybox 1.30.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de
Ubuntu 22.10
kinetic/main
busybox 1.35.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
Ubuntu 23.04
lunar/main
busybox 1.35.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
Ubuntu 23.10
mantic/main
busybox 1.35.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, bootc@debian.org, debian.axhn@manchmal.in-ulm.de, mjt@tls.msk.ru
Void Linux x86_64
x86_64
busybox 1.34.1 Potentially vulnerable - cam@nohom.org
Void Linux x86_64
x86_64
busybox-core 1.34.1 Potentially vulnerable - cam@nohom.org
Void Linux x86_64
x86_64
busybox-huge 1.34.1 Potentially vulnerable - cam@nohom.org
Void Linux x86_64
x86_64
busybox-static 1.34.1 Potentially vulnerable - cam@nohom.org
Wikidata BusyBox 1.36.1 - -
Wikidata BusyBox 1.36.0 - -