Versions Packages Information History CVEs Related Badges Report

Versions for docker

239 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux 3.8
community
docker-bash-completion 18.06.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
community
docker-vim 18.06.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
community
docker-fish-completion 18.06.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
community
docker 18.06.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
community
docker-doc 18.06.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
community
docker-openrc 18.06.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
community
docker-zsh-completion 18.06.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
docker-fish-completion 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.9
community
docker-doc 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.9
community
docker-vim 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.9
community
docker 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.9
community
docker-bash-completion 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.9
community
docker-zsh-completion 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.9
community
docker-openrc 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-vim 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-openrc 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-cli 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-fish-completion 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-bash-completion 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-doc 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-zsh-completion 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.10
community
docker-engine 18.09.8 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-engine 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-vim 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-doc 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-cli 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-fish-completion 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-bash-completion 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-zsh-completion 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.11
community
docker-openrc 19.03.5 Potentially vulnerable - tomalok@gmail.com
Alpine Linux 3.12
community
docker-doc 20.10.3 - tomalok@gmail.com
Alpine Linux 3.12
community
docker-openrc 20.10.3 - tomalok@gmail.com
Alpine Linux 3.12
community
docker 20.10.3 - tomalok@gmail.com
Alpine Linux 3.12
community
docker-bash-completion 20.10.3 - tomalok@gmail.com
Alpine Linux 3.12
community
docker-fish-completion 20.10.3 - tomalok@gmail.com
Alpine Linux 3.12
community
docker-cli 20.10.3 - tomalok@gmail.com
Alpine Linux 3.12
community
docker-engine 20.10.3 - tomalok@gmail.com
Alpine Linux 3.12
community
docker-zsh-completion 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker-engine 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker-cli 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker-openrc 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker-bash-completion 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker-doc 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker-zsh-completion 20.10.3 - tomalok@gmail.com
Alpine Linux 3.13
community
docker-fish-completion 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker-fish-completion 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker-zsh-completion 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker-bash-completion 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker-cli 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker-doc 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker-engine 20.10.3 - tomalok@gmail.com
Alpine Linux Edge
community
docker-openrc 20.10.3 - tomalok@gmail.com
Amazon Linux 1
updates
docker 19.03.13ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 19.03.6ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 19.03.6ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 19.03.6ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.09.9ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.09.9ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.06.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.03.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
updates
docker 18.03.1ce Potentially vulnerable Unspecified -
Amazon Linux 1
main
docker 17.12.1ce Potentially vulnerable Unspecified -
Apertis v2020
v2020/development
docker.io 18.09.1 Potentially vulnerable main onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Apertis v2020
v2020-updates/development
docker.io 18.09.1 Potentially vulnerable main onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Apertis v2021 Development
v2021dev3/development
docker.io 18.09.1 Potentially vulnerable main onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Arch
community
docker 20.10.3 - -
AUR docker-git r39078.b5ea9abf25 - flaccid@aur
AUR docker-bin 20.10.3 - javmorin@aur
Artix
galaxy
docker 20.10.3 - -
Astra Orel Stable
main
docker.io 18.09.7 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Astra Orel Current
main
docker.io 18.09.7 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ataraxia Linux docker 20.10.3 virt nagakamira@gmail.com
CentOS 7
extras
docker 1.13.1 Potentially vulnerable Unspecified -
CentOS 7
extras
docker 1.13.1 Potentially vulnerable Unspecified -
CentOS 7
extras
docker 1.13.1 Potentially vulnerable Unspecified -
CentOS 7
extras
docker 1.13.1 Potentially vulnerable Unspecified -
CentOS 7
extras
docker 1.13.1 Potentially vulnerable Unspecified -
CentOS 7
extras
docker 1.13.1 Potentially vulnerable Unspecified -
Chakra
desktop
docker 18.09.9 Potentially vulnerable - -
Chakra Testing
testing
docker 19.03.8 Potentially vulnerable - -
Chaotic-AUR docker-git r39309.bc6f4cc703 - -
Chocolatey [Deprecated] Docker CLI 99.0.0 - -
CRUX 3.4
contrib
docker 18.09.6 Potentially vulnerable - jaeger@crux.ninja
CRUX 3.5
contrib
docker 19.03.14 Potentially vulnerable - jaeger@crux.ninja
CRUX 3.6
contrib
docker 20.10.2 Potentially vulnerable - jaeger@crux.ninja
Debian Stable
stable/main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Debian Testing
testing/main
docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Debian Testing
testing/main
docker.io 20.10.2 Potentially vulnerable misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Debian Unstable
main
docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Debian Unstable
main
docker.io 20.10.2 Potentially vulnerable misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Debian Unstable
main
docker.io 19.03.13 Potentially vulnerable misc elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Debian Unstable
main
docker.io 19.03.4 Potentially vulnerable misc arnaud.rebillout@collabora.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Deepin
main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Devuan 3.0 (Beowulf)
beowulf/main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Devuan 4.0 (Chimaera)
chimaera/main
docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Devuan Unstable
unstable/main
docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
distri docker 19.03.8 Potentially vulnerable - -
DistroWatch.com docker 19.03.15 - -
Fedora 26
release
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 26
updates
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 27
release
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 27
updates
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 28
release
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 28
updates
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 29
release
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 29
updates
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 30
release
docker 1.13.1 Potentially vulnerable Unspecified -
Fedora 30
updates
docker 1.13.1 Potentially vulnerable Unspecified -
FreeBSD Ports sysutils/docker 18.09.5 Potentially vulnerable sysutils lifanov@freebsd.org
freshcode.club docker 17.05.0-ce Potentially vulnerable - -
Funtoo 1.4
core-kit
app-emulation/docker 19.03.14 Potentially vulnerable app-emulation fallback-mnt-funtoo@repology
Funtoo 1.4
core-kit
app-emulation/docker 19.03.8 Potentially vulnerable app-emulation fallback-mnt-funtoo@repology
Gentoo app-emulation/docker 20.10.3 app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
Gentoo app-emulation/docker 19.03.15 app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
GNU Guix docker 19.03.13 Potentially vulnerable - -
Homebrew docker 20.10.3 - -
Homebrew Casks Docker Desktop 3.1.0 Potentially vulnerable - -
Kali Linux Rolling
main
docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
KaOS
apps
docker 20.10.3 - demm@kaosx.us
Kwort 4.3.3 docker 18.09.1 Potentially vulnerable - -
Kwort 4.3.4 docker 19.03.13 Potentially vulnerable - -
LiGurOS stable app-emulation/docker 20.10.3 app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
LiGurOS stable app-emulation/docker 20.10.2 Potentially vulnerable app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
LiGurOS stable app-emulation/docker 19.03.15 app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
LiGurOS stable app-emulation/docker 19.03.14 Potentially vulnerable app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
LiGurOS stable app-emulation/docker 19.03.13 Potentially vulnerable app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
LiGurOS develop app-emulation/docker 20.10.3 app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
LiGurOS develop app-emulation/docker 19.03.15 app-emulation williamh@gentoo.org, gyakovlev@gentoo.org
Linuxbrew docker 20.10.3 - -
MacPorts docker 20.10.0 Potentially vulnerable devel emcrisostomo@macports, emcrisostomo@github
Mageia 6
core/updates
docker 18.06.3 Potentially vulnerable System/Configuration -
Mageia 6
core/updates
docker 18.06.1 Potentially vulnerable System/Configuration -
Mageia 6
core/updates
docker 18.06.1 Potentially vulnerable System/Configuration -
Mageia 6
core/release
docker 17.03.1 Potentially vulnerable System/Configuration -
Mageia 7
core/updates
docker 18.09.9 Potentially vulnerable System/Configuration -
Mageia 7
core/updates
docker 18.09.9 Potentially vulnerable System/Configuration -
Mageia 7
core/updates
docker 18.09.9 Potentially vulnerable System/Configuration -
Mageia 7
core/updates
docker 18.09.8 Potentially vulnerable System/Configuration -
Mageia 7
core/release
docker 18.09.3 Potentially vulnerable System/Configuration -
Mageia Cauldron
core/release
docker 19.03.15 System/Configuration -
Manjaro Stable
community
docker 20.10.3 - -
Manjaro Testing
community
docker 20.10.3 - -
Manjaro Unstable
community
docker 20.10.3 - -
nixpkgs stable docker 19.03.12 Potentially vulnerable - tim@nequissimus.com, jaka@x-truder.net, paul@colomiets.name, vincent@sbr.pm, theopompos@gmail.com
nixpkgs stable docker 18.09.9 Potentially vulnerable - tim@nequissimus.com, jaka@x-truder.net, paul@colomiets.name, vincent@sbr.pm, theopompos@gmail.com
nixpkgs unstable docker 20.10.2 Potentially vulnerable - jaka@x-truder.net, paul@colomiets.name, vincent@sbr.pm, theopompos@gmail.com
openmamba
devel
docker 19.03.15 System/Servers silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
docker 18.09.6 Potentially vulnerable System/Configuration/Other bero@lindev.ch
OpenMandriva 4.1
main/release
docker 19.03.5 Potentially vulnerable System/Configuration/Other nobodydead@gmail.com
OpenMandriva Rolling
main/release
docker 20.10.2 Potentially vulnerable System/Configuration/Other bero@lindev.ch
OpenMandriva Cooker
main/release
docker 20.10.2 Potentially vulnerable System/Configuration/Other bero@lindev.ch
OpenPKG docker 20.10.1.20210102 Potentially vulnerable Filesystem -
openSUSE Leap 42.3
updates/oss
docker 18.09.1_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
docker 18.06.1_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
docker 18.06.1_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
docker 17.09.1_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
docker 17.09.1_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
docker 17.09.1_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
docker 17.09.1_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
docker 17.04.0_ce Potentially vulnerable System/Management -
openSUSE Leap 42.3
main/oss
docker 1.12.6 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
docker 19.03.1_ce Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
docker 18.09.6_ce Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
docker 18.09.6_ce Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
docker 18.09.6_ce Potentially vulnerable System/Management -
openSUSE Leap 15.0
main/oss
docker 17.09.1_ce Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
docker 19.03.11_ce Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
docker 19.03.5_ce Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
docker 19.03.1_ce Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
docker 18.09.6_ce Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
docker 18.09.6_ce Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
docker 18.09.6_ce Potentially vulnerable System/Management -
openSUSE Leap 15.1
main/oss
docker 18.09.1_ce Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
docker 19.03.15_ce Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
docker 19.03.15_ce Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
docker 19.03.15_ce Potentially vulnerable System/Management -
openSUSE Leap 15.2
main/oss
docker 19.03.11_ce Potentially vulnerable System/Management -
openSUSE Tumbleweed docker 20.10.3_ce Potentially vulnerable System/Management -
Parabola
community
docker 20.10.3 - -
Pardus 19
main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Pardus 19
main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Pardus 19
main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Pardus 19
main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Pardus 19
main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Pardus 19
updates/main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Pardus 19
updates/main
docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Parrot
main
docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Pisi Linux
main
docker 18.05.0 Potentially vulnerable app:console ertugrulerata@gmail.com
PureOS Amber docker.io 18.09.1 Potentially vulnerable misc onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
PureOS Amber docker 1.5 Potentially vulnerable misc paultag@debian.org, ari@debian.org, tianon@debian.org
PureOS landing docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
PureOS landing docker 1.5 Potentially vulnerable misc paultag@debian.org, ari@debian.org, tianon@debian.org
Raspbian Oldstable
main
docker.io 1.8.3 Potentially vulnerable misc paultag@debian.org, docker-maint@lists.alioth.debian.org, proppy@google.com, tianon@debian.org
Raspbian Stable
main
docker.io 18.09.1 Potentially vulnerable admin onlyjob@debian.org, arnaud.rebillout@collabora.com, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Raspbian Testing
main
docker.io 20.10.3 misc team+pkg-go@tracker.debian.org, elboulangero@gmail.com, onlyjob@debian.org, paultag@debian.org, tianon@debian.org, tpot@hpe.com
Rosa 2014.1
main/updates
docker 1.11.2 Potentially vulnerable - -
Rosa 2016.1
main/updates
docker 19.03.13 Potentially vulnerable - -
Rosa 2016.1
main/testing
docker 19.03.7 Potentially vulnerable - -
Rosa 2016.1
main/release
docker 1.11.2 Potentially vulnerable - -
Rosa 2019.1
main/release
docker 19.03.15 System/Kernel and hardware alexander@mezon.ru
Rosa Server 6.9
extra/updates
docker-io 1.7.1 Potentially vulnerable Unspecified andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
docker 1.8.2 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
docker 1.8.2 Potentially vulnerable Unspecified alex2048@mail.ru
Salix 14.2 docker 19.03.13 Potentially vulnerable - -
Scientific Linux 7.x docker 0.11.1 Potentially vulnerable Unspecified -
Scoop
main
docker 19.03.1 Potentially vulnerable - -
SlackBuilds system/docker 20.10.2 Potentially vulnerable system audrius@neutrino.lt
Solus docker 19.03.14 Potentially vulnerable virt joshua@streambits.io
Solus docker-dbginfo 19.03.14 Potentially vulnerable debug joshua@streambits.io
Termux docker 20.10.2 Potentially vulnerable - termux@termux
Trisquel 7.0
belenos-updates/main
docker.io 1.6.2 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, admwiggin@gmail.com, docker-maint@lists.alioth.debian.org, proppy@google.com
Trisquel 7.0
belenos/main
docker.io 0.9.1 Potentially vulnerable universe/misc paultag@debian.org, admwiggin@gmail.com, daniel@docker.com, proppy@google.com
Trisquel 8.0
flidas-updates/main
docker.io 18.09.7 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Trisquel 8.0
flidas/main
docker.io 1.10.3 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, proppy@google.com, tianon@debian.org
Trisquel 9.0
etiona-updates/main
docker.io 19.03.6 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Trisquel 9.0
etiona/main
docker.io 17.12.1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ubuntu 14.04
trusty-updates/universe
docker.io 1.6.2 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, admwiggin@gmail.com, docker-maint@lists.alioth.debian.org, proppy@google.com
Ubuntu 14.04
trusty/universe
docker.io 0.9.1 Potentially vulnerable universe/misc paultag@debian.org, admwiggin@gmail.com, daniel@docker.com, proppy@google.com
Ubuntu 16.04
xenial-updates/universe
docker.io 18.09.7 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ubuntu 16.04
xenial/universe
docker.io 1.10.3 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, proppy@google.com, tianon@debian.org
Ubuntu 18.04
bionic-updates/universe
docker.io 19.03.6 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ubuntu 18.04
bionic/universe
docker.io 17.12.1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ubuntu 20.04
focal/universe
docker.io 19.03.8 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ubuntu 20.04
focal-updates/universe
docker.io 19.03.8 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ubuntu 20.10
groovy/universe
docker.io 19.03.13 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Ubuntu 20.10
groovy-updates/universe
docker.io 19.03.13 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, docker-maint@lists.alioth.debian.org, tianon@debian.org
Void Linux x86_64
x86_64
docker 19.03.15 - abc@pompel.me
Wikidata Docker 20.10.3 - -

Absent in repositories

  • Adélie Linux current
  • AIX Open Source Packages
  • AIX Toolbox
  • ALT Linux p9
  • ALT Sisyphus
  • Amazon Linux 2
  • antiX-16
  • antiX-17
  • antiX-19
  • AOSC
  • AppGet
  • Arch Testing
  • BackBox 6
  • BackBox 7
  • BlackArch
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Carbs Linux
  • CentOS 6
  • CentOS 8
  • Chakra Staging
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Cygwin
  • Deb Multimedia Unstable
  • Debian Oldstable
  • Debian Stable Backports
  • Debian Experimental
  • Devuan 1.0 (Jessie)
  • Devuan 2.0 (ASCII)
  • DPorts
  • ELRepo el7
  • ELRepo el7 Testing
  • Entware
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • Exherbo
  • F-Droid
  • Fedora 31
  • Fedora 32
  • Fedora 33
  • Fedora Rawhide
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • Gentoo Science overlay
  • GNU Elpa
  • GoboLinux
  • Hackage
  • HaikuPorts master
  • Homebrew tap Brewsci/bio
  • HP-UX 11.31
  • Hyperbola
  • IBM i
  • just-install
  • KaOS Build
  • KaOS kde-next
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • KISS Linux Games
  • KISS Linux Main
  • Kwort 4.3.2
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • Linux Mint 20.1
  • LMDE 4
  • LuaRocks
  • Maemo Fremantle
  • MELPA
  • MidnightBSD mports
  • MSYS2 mingw
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • OpenBSD Ports
  • openEuler 20.03
  • OpenIndiana packages
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OpenWrt 17.01 x86_64
  • OpenWrt 18.06 x86_64
  • OpenWrt 19.07 x86_64
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pardus 17
  • PCLinuxOS
  • Pisi Linux Contrib
  • pkgsrc current
  • PLD Linux
  • PyPI
  • Ravenports
  • ReactOS rapps
  • RebornOS
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora 32
  • RPM Fusion Fedora 33
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Siduction
  • Siduction Experimental
  • Slackware 14.2
  • Slackware current
  • Slackware64 14.2
  • Slackware64 current
  • Slackwarearm 14.2
  • Slackwarearm current
  • SliTaz Cooking
  • SliTaz Next
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • T2 SDE
  • Tails stable
  • Tails devel
  • Trisquel 6.0
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Trisquel 9.0 backports
  • Ubuntu 12.04
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • winget
  • YACP