Versions Packages Information History CVEs Related Badges Report

Versions for cpio

237 package(s) known

Repository Package name Version Category Maintainer(s)
AIX Open Source Packages cpio 2.13 Potentially vulnerable - -
AIX Open Source Packages cpio 2.12 Potentially vulnerable - -
AIX Open Source Packages cpio 2.11 Potentially vulnerable - -
AIX Open Source Packages cpio 2.11 Potentially vulnerable - -
AIX Open Source Packages cpio 2.10 Potentially vulnerable - -
AIX Open Source Packages cpio 2.9 Potentially vulnerable - -
AIX Toolbox cpio 2.13 Potentially vulnerable Applications/Archiving -
AIX Toolbox cpio 2.12 Potentially vulnerable Applications/Archiving -
AlmaLinux 8
BaseOS
cpio 2.12 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
cpio 2.13 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
community
cpio-doc 2.12 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.8
community
cpio 2.12 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.9
community
cpio 2.12 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.9
community
cpio-doc 2.12 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.10
community
cpio 2.12 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.10
community
cpio-doc 2.12 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.11
community
cpio-doc 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.11
community
cpio 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.12
community
cpio-doc 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.12
community
cpio 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.13
community
cpio 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.13
community
cpio-doc 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.14
community
cpio-doc 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.14
community
cpio 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.15
community
cpio 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.15
community
cpio-doc 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.16
community
cpio-doc 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.16
community
cpio 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.17
community
cpio-doc 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.17
community
cpio 2.13 Potentially vulnerable - developer@it-offshore.co.uk
Alpine Linux 3.18
community
cpio 2.14 - developer@it-offshore.co.uk
Alpine Linux 3.18
community
cpio-doc 2.14 - developer@it-offshore.co.uk
Alpine Linux Edge
community
cpio 2.14 - developer@it-offshore.co.uk
Alpine Linux Edge
community
cpio-doc 2.14 - developer@it-offshore.co.uk
ALT Linux p9 cpio 2.12 Potentially vulnerable Archiving/Backup ldv@altlinux.org
ALT Linux p10 cpio 2.12 Potentially vulnerable Archiving/Backup ptrnine@altlinux.org
ALT Sisyphus cpio 2.13 Potentially vulnerable Archiving/Backup glebfm@altlinux.org
Amazon Linux 1
main
cpio 2.10 Potentially vulnerable Applications/Archiving -
Amazon Linux 2 cpio 2.12 Potentially vulnerable Unspecified -
Amazon Linux 2 cpio 2.11 Potentially vulnerable Applications/Archiving -
Amazon Linux 2 cpio 2.11 Potentially vulnerable Applications/Archiving -
Amazon Linux 2 cpio 2.11 Potentially vulnerable Applications/Archiving -
AOSC cpio 2.13 Potentially vulnerable utils fallback-mnt-aosc@repology
Apertis v2020
v2020/development
cpio 2.12 Potentially vulnerable main anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Apertis v2020
v2020/target
cpio-gplv2 2.8 Potentially vulnerable main andrew.lee@collabora.co.uk
Apertis v2021
v2021/development
cpio 2.12 Potentially vulnerable main anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Apertis v2021
v2021/target
cpio-gplv2 2.8 Potentially vulnerable main andrew.lee@collabora.co.uk
Apertis v2022
v2022/development
cpio 2.13 Potentially vulnerable main anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Apertis v2022
v2022/target
cpio-gplv2 2.8 Potentially vulnerable main andrew.lee@collabora.co.uk
Apertis v2023
v2023/development
cpio 2.13 Potentially vulnerable - anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Apertis v2024 Development
v2024dev1/development
cpio 2.13 Potentially vulnerable - anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Arch
extra
cpio 2.14 - -
Arch Linux 32 i486
extra
cpio 2.13 Potentially vulnerable - -
Arch Linux 32 i686
extra
cpio 2.13 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
cpio 2.13 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
cpio 2.14 - -
Arch Linux ARM armv7h
extra
cpio 2.14 - -
ArchPOWER powerpc cpio 2.13 Potentially vulnerable - -
ArchPOWER powerpc64le cpio 2.13 Potentially vulnerable - -
ArchPOWER riscv64 cpio 2.13 Potentially vulnerable - -
AUR cpio-git 2.14.r0.g4a41909 - chocobo1@aur
Artix
world
cpio 2.14 - -
CentOS 6
os
cpio 2.10 Potentially vulnerable Applications/Archiving -
CentOS 7
os
cpio 2.11 Potentially vulnerable Applications/Archiving -
CentOS 8
BaseOS
cpio 2.12 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
BaseOS
cpio 2.12 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
BaseOS
cpio 2.12 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 9
BaseOS
cpio 2.13 Potentially vulnerable Unspecified builder@centos.org
CRUX 3.4
core
cpio 2.12 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
cpio 2.13 Potentially vulnerable - core-ports@crux.nu
CRUX 3.6
core
cpio 2.13 Potentially vulnerable - core-ports@crux.nu
CRUX 3.7
core
cpio 2.14 - core-ports@crux.nu
Cygwin cpio-debuginfo 2.13 Potentially vulnerable Debug corinna.vinschen@cygwin
Cygwin cpio 2.13 Potentially vulnerable Utils corinna.vinschen@cygwin
Debian 10
buster/main
cpio 2.12 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Debian 11
bullseye/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Debian 12
bookworm/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Debian Unstable
sid/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Deepin
main
cpio 2.12 Potentially vulnerable - anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Deepin
main
cpio 2.12 Potentially vulnerable - anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Devuan 3.0
beowulf/main
cpio 2.12 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Devuan 4.0
chimaera/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Devuan Unstable
unstable/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
distri cpio 2.13 Potentially vulnerable - -
DPorts archivers/gcpio 2.13 Potentially vulnerable archivers naddy@freebsd.org
Entware
mipselsf-k3.4
cpio 2.13 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
cpio 2.13 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
cpio 2.13 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
cpio 2.13 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
cpio 2.13 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
cpio 2.13 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
cpio 2.13 Potentially vulnerable utils fallback-mnt-entware@repology
EuroLinux 8
baseos
cpio 2.12 Potentially vulnerable Unspecified -
EuroLinux 8
baseos
cpio 2.12 Potentially vulnerable Unspecified -
EuroLinux 8
baseos
cpio 2.12 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
cpio 2.13 Potentially vulnerable Unspecified -
Exherbo
arbor
app-arch/cpio 2.14 app-arch fallback-mnt-exherbo@repology
Fedora 26
release
cpio 2.12 Potentially vulnerable Applications/Archiving -
Fedora 27
release
cpio 2.12 Potentially vulnerable Applications/Archiving -
Fedora 28
release
cpio 2.12 Potentially vulnerable Applications/Archiving -
Fedora 29
release
cpio 2.12 Potentially vulnerable Unspecified -
Fedora 30
release
cpio 2.12 Potentially vulnerable Unspecified -
Fedora 31
release
cpio 2.12 Potentially vulnerable Unspecified -
Fedora 32
updates
cpio 2.13 Potentially vulnerable Unspecified -
Fedora 32
release
cpio 2.13 Potentially vulnerable Unspecified -
Fedora 33
release
cpio 2.13 Potentially vulnerable Unspecified -
Fedora 34
release
cpio 2.13 Potentially vulnerable Unspecified -
Fedora 35
release
cpio 2.13 Potentially vulnerable Unspecified -
Fedora 36
release
cpio 2.13 Potentially vulnerable Unspecified -
Fedora 37
release
cpio 2.13 Potentially vulnerable Unspecified -
Fedora 38
release
cpio 2.13 Potentially vulnerable Unspecified -
Fedora Rawhide
development
cpio 2.13 Potentially vulnerable Unspecified -
FreeBSD Ports archivers/gcpio 2.14 archivers naddy@freebsd.org
Gentoo app-arch/cpio 2.14 app-arch base-system@gentoo.org
Gentoo app-arch/cpio 2.13 Potentially vulnerable app-arch base-system@gentoo.org
GNU Guix cpio 2.13 Potentially vulnerable - -
GoboLinux Cpio 2.13 Potentially vulnerable - -
HaikuPorts master app-arch/cpio 2.13 Potentially vulnerable app-arch -
Homebrew cpio 2.14 - -
HP-UX 11.31
ia64_64
cpio 2.14 - -
HP-UX 11.31
hppa_32
cpio 2.13 Potentially vulnerable - -
HP-UX 11.31
ia64_64
cpio 2.13 Potentially vulnerable - -
HP-UX 11.31
hppa_32
cpio 2.12 Potentially vulnerable - -
HP-UX 11.31
ia64_32
cpio 2.12 Potentially vulnerable - -
HP-UX 11.31
ia64_64
cpio 2.12 Potentially vulnerable - -
HP-UX 11.31
hppa_32
cpio 2.11 Potentially vulnerable - -
IBM i cpio-gnu 2.12 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
KaOS
core
cpio 2.14 - demm@kaosx.us
LiGurOS stable app-arch/cpio 2.13 Potentially vulnerable app-arch base-system@gentoo.org
LiGurOS stable app-arch/cpio 2.13 Potentially vulnerable app-arch base-system@gentoo.org
LiGurOS stable app-arch/cpio 2.12 Potentially vulnerable app-arch base-system@gentoo.org
LiGurOS develop app-arch/cpio 2.13 Potentially vulnerable app-arch base-system@gentoo.org
LiGurOS develop app-arch/cpio 2.13 Potentially vulnerable app-arch base-system@gentoo.org
LiGurOS develop app-arch/cpio 2.12 Potentially vulnerable app-arch base-system@gentoo.org
MacPorts cpio 2.14 archivers chenguokai@github
Mageia 7
core/updates
cpio 2.13 Potentially vulnerable Archiving/Backup -
Mageia 7
core/updates
cpio 2.13 Potentially vulnerable Archiving/Backup -
Mageia 7
core/release
cpio 2.12 Potentially vulnerable Archiving/Backup -
Mageia 8
core/release
cpio 2.13 Potentially vulnerable Archiving/Backup -
Mageia 8
core/updates
cpio 2.13 Potentially vulnerable Archiving/Backup -
Mageia Cauldron
core/release
cpio 2.14 Archiving/Backup -
Manjaro Stable
extra
cpio 2.13 Potentially vulnerable - -
Manjaro Testing
extra
cpio 2.14 - -
Manjaro Unstable
extra
cpio 2.14 - -
MidnightBSD mports archivers/gcpio 2.13 Potentially vulnerable sysutils -
MSYS2 msys2
x86_64
cpio 2.14 - -
nixpkgs stable 21.11 cpio 2.13 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.05 cpio 2.13 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.11 cpio 2.13 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable cpio 2.14 - fallback-mnt-nix@repology
OpenBSD Ports archivers/gcpio 2.14 archivers naddy@openbsd.org
openEuler 20.03
source
cpio 2.12 Potentially vulnerable Unspecified -
openEuler 22.03
source
cpio 2.13 Potentially vulnerable Unspecified -
openmamba
devel
cpio 2.14 Applications/Archiving silvan.calarco@mambasoft.it
OpenPKG cpio 2.14 Archiver -
openSUSE Leap 42.3
main/oss
cpio 2.11 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 42.3
updates/oss
cpio 2.11 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.0
updates/oss
cpio 2.12 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.0
main/oss
cpio 2.12 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.1
main/oss
cpio 2.12 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.1
updates/oss
cpio 2.12 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.2
main/oss
cpio 2.12 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.2
updates/oss
cpio 2.12 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.3
main/oss
cpio 2.12 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.4
main/oss
cpio 2.13 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Leap 15.5
main/oss
cpio 2.13 Potentially vulnerable Productivity/Archiving/Backup -
openSUSE Tumbleweed
src-oss
cpio 2.13 Potentially vulnerable Productivity/Archiving/Backup -
Parabola
extra
cpio 2.14 - -
Pardus 21
main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Parrot
parrot/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Parrot
parrot-updates/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
PCLinuxOS cpio 2.12 Potentially vulnerable Archiving/Backup -
Pisi Linux
core
cpio 2.12 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current archivers/gcpio 2.13 Potentially vulnerable archivers pkgsrc-users@netbsd.org
PLD Linux cpio 2.13 Potentially vulnerable - -
PureOS Amber cpio 2.12 Potentially vulnerable misc anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
PureOS landing cpio 2.13 Potentially vulnerable misc anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Raspbian Oldstable
main
cpio 2.12 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Raspbian Stable
main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Raspbian Testing
main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Ravenports cpio 2.14 archivers fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
cpio 2.12 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rocky Linux 9
BaseOS
cpio 2.13 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
main/release
cpio 2.11 Potentially vulnerable - -
Rosa 2016.1
main/release
cpio 2.11 Potentially vulnerable - -
Rosa 2016.1
main/updates
cpio 2.11 Potentially vulnerable - -
Rosa 2021.1
main/release
cpio 2.13 Potentially vulnerable Archiving/Backup a.proklov@rosalinux.ru
Rosa Server 6.9
base/release
cpio 2.10 Potentially vulnerable Applications/Archiving andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
cpio 2.10 Potentially vulnerable Applications/Archiving andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
cpio 2.11 Potentially vulnerable Applications/Archiving alex2048@mail.ru
Rosa Server 7.5
base/release
cpio 2.11 Potentially vulnerable Applications/Archiving alex2048@mail.ru
Rosa Server 7.5
base/release
cpio 2.11 Potentially vulnerable Applications/Archiving alex2048@mail.ru
Scientific Linux 7.x cpio 2.11 Potentially vulnerable Applications/Archiving -
Scientific Linux 7.x cpio 2.11 Potentially vulnerable Applications/Archiving -
Scientific Linux 7.x cpio 2.11 Potentially vulnerable Applications/Archiving -
Scientific Linux 7.x cpio 2.11 Potentially vulnerable Applications/Archiving -
Scientific Linux 7.x cpio 2.11 Potentially vulnerable Applications/Archiving -
Scientific Linux 7.x cpio 2.11 Potentially vulnerable Applications/Archiving -
Slackware 14.2
slackware
cpio 2.12 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
cpio 2.13 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
cpio 2.14 - volkerdi@slackware.com
Slackware64 14.2
slackware64
cpio 2.12 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
cpio 2.13 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
cpio 2.14 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
cpio 2.12 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
cpio 2.13 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking cpio 2.13 Potentially vulnerable base-system pankso@slitaz.org
SliTaz Next cpio 2.12 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next cpio 2.12 Potentially vulnerable base-system devel@slitaz.org
Solus cpio 2.14 system.base algent@protonmail.com
Solus cpio-dbginfo 2.14 debug algent@protonmail.com
Spack cpio 2.13 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE cpio 2.14 base/tool rene@t2-project.org
Termux cpio 2.14 - termux@github
Trisquel 9.0
etiona/main
cpio 2.12 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Trisquel 9.0
etiona-security/main
cpio 2.12 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, lamby@debian.org, rmolina@udea.edu.co
Trisquel 9.0
etiona-updates/main
cpio 2.12 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, lamby@debian.org, rmolina@udea.edu.co
Trisquel 10.0
nabia/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Trisquel 10.0
nabia-security/main
cpio 2.13 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, lamby@debian.org, rmolina@udea.edu.co
Trisquel 10.0
nabia-updates/main
cpio 2.13 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, lamby@debian.org, rmolina@udea.edu.co
Trisquel 11.0
aramo/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
UBI 8
baseos
cpio 2.12 Potentially vulnerable Unspecified -
Ubuntu 14.04
trusty/main
cpio 2.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, anibal@debian.org
Ubuntu 14.04
trusty-updates/main
cpio 2.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, anibal@debian.org
Ubuntu 16.04
xenial/main
cpio 2.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, rmolina@udea.edu.co
Ubuntu 16.04
xenial-updates/main
cpio 2.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, rmolina@udea.edu.co
Ubuntu 18.04
bionic-updates/main
cpio 2.12 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, lamby@debian.org, rmolina@udea.edu.co
Ubuntu 18.04
bionic/main
cpio 2.12 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Ubuntu 20.04
focal/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Ubuntu 20.04
focal-updates/main
cpio 2.13 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, lamby@debian.org, rmolina@udea.edu.co
Ubuntu 22.04
jammy/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Ubuntu 22.10
kinetic/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Ubuntu 23.04
lunar/main
cpio 2.13 Potentially vulnerable utils anibal@debian.org, lamby@debian.org, rmolina@udea.edu.co
Void Linux x86_64
x86_64
cpio 2.14 - orphan@voidlinux.org
Wikidata GNU cpio 2.14 - -
yiffOS Knot cpio 2.13 Potentially vulnerable - evie@eviee.gay