Versions Packages Information History CVEs Related Badges Report

Versions for e2fsprogs

493 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
libcom_err 1.45.6 - awilfox@adelielinux.org
Adélie Linux current
system
e2fsprogs 1.45.6 - awilfox@adelielinux.org
Adélie Linux current
system
e2fsprogs-dev 1.45.6 - awilfox@adelielinux.org
Adélie Linux current
system
e2fsprogs-doc 1.45.6 - awilfox@adelielinux.org
Adélie Linux current
system
e2fsprogs-dbg 1.45.6 - awilfox@adelielinux.org
Adélie Linux current
system
e2fsprogs-libs 1.45.6 - awilfox@adelielinux.org
Adélie Linux current
system
e2fsprogs-lang 1.45.6 - awilfox@adelielinux.org
AlmaLinux 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base packager@almalinux.org
Alpine Linux 3.8
main
e2fsprogs 1.44.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
e2fsprogs-dev 1.44.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
e2fsprogs-libs 1.44.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
libcom_err 1.44.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
e2fsprogs-extra 1.44.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
e2fsprogs-doc 1.44.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
e2fsprogs-libs 1.44.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
e2fsprogs 1.44.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
e2fsprogs-dev 1.44.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
e2fsprogs-extra 1.44.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
e2fsprogs-doc 1.44.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
libcom_err 1.44.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
e2fsprogs 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
e2fsprogs-dev 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
e2fsprogs-extra 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
libcom_err 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
e2fsprogs-static 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
e2fsprogs-libs 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
e2fsprogs-doc 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
e2fsprogs 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
e2fsprogs-static 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
e2fsprogs-libs 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
e2fsprogs-doc 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
libcom_err 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
e2fsprogs-dev 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
e2fsprogs-extra 1.45.5 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
e2fsprogs 1.45.6 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
e2fsprogs-static 1.45.6 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
e2fsprogs-extra 1.45.6 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
libcom_err 1.45.6 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
e2fsprogs-libs 1.45.6 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
e2fsprogs-doc 1.45.6 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
e2fsprogs-dev 1.45.6 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
libcom_err 1.45.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
e2fsprogs-dev 1.45.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
e2fsprogs-doc 1.45.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
e2fsprogs-static 1.45.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
e2fsprogs-libs 1.45.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
e2fsprogs-extra 1.45.7 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
e2fsprogs 1.45.7 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
e2fsprogs-static 1.46.2 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
e2fsprogs-extra 1.46.2 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
e2fsprogs-dev 1.46.2 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
e2fsprogs-doc 1.46.2 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
e2fsprogs-libs 1.46.2 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
libcom_err 1.46.2 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
e2fsprogs 1.46.2 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
e2fsprogs-static 1.46.4 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
e2fsprogs-libs 1.46.4 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
e2fsprogs 1.46.4 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
e2fsprogs-extra 1.46.4 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
libcom_err 1.46.4 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
e2fsprogs-dev 1.46.4 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
e2fsprogs-doc 1.46.4 - ncopa@alpinelinux.org
Alpine Linux Edge
main
e2fsprogs-extra 1.46.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
e2fsprogs-dev 1.46.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
libcom_err 1.46.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
e2fsprogs 1.46.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
e2fsprogs-doc 1.46.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
e2fsprogs-static 1.46.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
e2fsprogs-libs 1.46.5 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 e2fsprogs 1.44.6 Potentially vulnerable System/Kernel and hardware ldv@altlinux.org
ALT Linux p10 e2fsprogs 1.46.2.0.16.f114 System/Kernel and hardware ldv@altlinux.org
ALT Sisyphus e2fsprogs 1.46.4.0.5.4cda System/Kernel and hardware ldv@altlinux.org
Amazon Linux 1
updates
e2fsprogs 1.43.5 Potentially vulnerable System Environment/Base -
Amazon Linux 1
updates
e2fsprogs 1.43.5 Potentially vulnerable System Environment/Base -
Amazon Linux 1
updates
e2fsprogs 1.43.5 Potentially vulnerable System Environment/Base -
Amazon Linux 1
main
e2fsprogs 1.42.12 System Environment/Base -
Amazon Linux 2 e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Amazon Linux 2 e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Amazon Linux 2 e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Amazon Linux 2 e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
AOSC e2fsprogs 1.46.4 utils fallback-mnt-aosc@repology
Apertis v2020
v2020/target
e2fsprogs 1.44.5 Potentially vulnerable main tytso@mit.edu
Apertis v2021
v2021/target
e2fsprogs 1.44.5 Potentially vulnerable main tytso@mit.edu
Apertis v2022
v2022/target
e2fsprogs 1.46.2 main tytso@mit.edu
Apertis v2023 Development
v2023dev1/target
e2fsprogs 1.46.2 main tytso@mit.edu
Arch
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Arch
core
fuse2fs 1.46.5 Potentially vulnerable - -
Arch
multilib
lib32-e2fsprogs 1.46.5 Potentially vulnerable - -
Arch Linux 32 i486
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Arch Linux 32 i486
core
fuse2fs 1.46.5 Potentially vulnerable - -
Arch Linux 32 i686
core
fuse2fs 1.46.5 Potentially vulnerable - -
Arch Linux 32 i686
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Arch Linux 32 pentium4
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Arch Linux 32 pentium4
core
fuse2fs 1.46.5 Potentially vulnerable - -
Arch Linux ARM aarch64
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Arch Linux ARM aarch64
core
e2fsprogs-debug 1.46.5 Potentially vulnerable - -
Arch Linux ARM aarch64
core
fuse2fs 1.46.5 Potentially vulnerable - -
Arch Linux ARM armv7h
core
e2fsprogs-debug 1.46.5 Potentially vulnerable - -
Arch Linux ARM armv7h
core
fuse2fs 1.46.5 Potentially vulnerable - -
Arch Linux ARM armv7h
core
e2fsprogs 1.46.5 Potentially vulnerable - -
ArchPOWER powerpc e2fsprogs 1.46.5 Potentially vulnerable - -
ArchPOWER powerpc fuse2fs 1.46.5 Potentially vulnerable - -
ArchPOWER powerpc e2fsprogs-debug 1.46.5 Potentially vulnerable - -
ArchPOWER powerpc64le e2fsprogs 1.46.5 Potentially vulnerable - -
ArchPOWER powerpc64le fuse2fs 1.46.5 Potentially vulnerable - -
ArchPOWER powerpc64le e2fsprogs-debug 1.46.5 Potentially vulnerable - -
ArchPOWER riscv64 e2fsprogs 1.46.5 Potentially vulnerable - -
ArchPOWER riscv64 e2fsprogs-debug 1.46.5 Potentially vulnerable - -
ArchPOWER riscv64 fuse2fs 1.46.5 Potentially vulnerable - -
AUR e2fsprogs-git 1.46.5.r8.g8adeabee - a821@aur
Artix
system
fuse2fs 1.46.5 Potentially vulnerable - -
Artix
system
e2fsprogs 1.46.5 Potentially vulnerable - -
Astra Orel Stable
main
e2fsprogs 1.43.4 Potentially vulnerable admin tytso@mit.edu
Ataraxia GNU/Linux e2fsprogs 1.46.2 base nagakamira@gmail.com
Carbs Linux
core
e2fsprogs 1.46.5 Potentially vulnerable - cem@carbslinux.org
CentOS 6
os
e2fsprogs 1.41.12 Potentially vulnerable System Environment/Base -
CentOS 7
os
e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
CentOS 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base bugs@centos.org
CentOS Stream 9
BaseOS
e2fsprogs 1.46.5 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
e2fsprogs 1.46.2 Unspecified builder@centos.org
CRUX 3.4
core
e2fsprogs 1.45.2 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
e2fsprogs 1.45.6 - core-ports@crux.nu
CRUX 3.6
core
e2fsprogs 1.46.5 Potentially vulnerable - core-ports@crux.nu
Cygwin e2fsprogs 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin e2fsprogs-debuginfo 1.44.5 Potentially vulnerable Debug orphaned@cygwin
Cygwin libcom_err-devel 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libcom_err2 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libe2p-devel 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libe2p2 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libext2fs-devel 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libext2fs2 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libquota-devel 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libss-devel 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin libss2 1.44.5 Potentially vulnerable System orphaned@cygwin
Cygwin uuidd 1.44.5 Potentially vulnerable System orphaned@cygwin
Debian 8
jessie/main
e2fsprogs 1.42.12 admin tytso@mit.edu
Debian 8
jessie/main
e2fsprogs 1.42.12 admin tytso@mit.edu
Debian 9
stretch/main
e2fsprogs 1.43.4 Potentially vulnerable admin tytso@mit.edu
Debian 9
stretch/main
e2fsprogs 1.43.4 Potentially vulnerable admin tytso@mit.edu
Debian 9 Backports
stretch-backports/main
e2fsprogs 1.44.5 Potentially vulnerable misc tytso@mit.edu
Debian 10
buster/main
e2fsprogs 1.44.5 Potentially vulnerable admin tytso@mit.edu
Debian 10 Backports
buster-backports/main
e2fsprogs 1.46.2 misc tytso@mit.edu
Debian 11
bullseye/main
e2fsprogs 1.46.2 admin tytso@mit.edu
Debian 11 Backports
bullseye-backports/main
e2fsprogs 1.46.5 Potentially vulnerable misc tytso@mit.edu
Debian 12
bookworm/main
e2fsprogs 1.46.5 Potentially vulnerable admin tytso@mit.edu
Debian Unstable
sid/main
e2fsprogs 1.46.5 Potentially vulnerable admin tytso@mit.edu
Debian Unstable
sid/main
e2fsprogs 1.45.7 admin tytso@mit.edu
Deepin
main
e2fsprogs 1.44.5 Potentially vulnerable admin tytso@mit.edu
Devuan 1.0
jessie/main
e2fsprogs 1.42.12 admin tytso@mit.edu
Devuan 2.0
ascii/main
e2fsprogs 1.43.4 Potentially vulnerable admin tytso@mit.edu
Devuan 3.0
beowulf/main
e2fsprogs 1.44.5 Potentially vulnerable admin tytso@mit.edu
Devuan 4.0
chimaera/main
e2fsprogs 1.46.2 admin tytso@mit.edu
Devuan Unstable
unstable/main
e2fsprogs 1.46.5 Potentially vulnerable admin tytso@mit.edu
distri e2fsprogs 1.44.4 Potentially vulnerable - -
DistroWatch.com e2fsprogs 1.46.5 Potentially vulnerable - -
DPorts sysutils/e2fsprogs 1.46.5 Potentially vulnerable sysutils mandree@freebsd.org
DPorts misc/e2fsprogs-libblkid 1.46.5 Potentially vulnerable misc mandree@freebsd.org
DPorts misc/e2fsprogs-libuuid 1.46.5 Potentially vulnerable misc mandree@freebsd.org
Entware
aarch64-k3.10
dumpe2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
e2freefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
e2fsprogs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
debugfs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
filefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
libcomerr 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
libext2fs 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
libss 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
resize2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
badblocks 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
chattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
lsattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
resize2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
tune2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
badblocks 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
chattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
debugfs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
dumpe2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
e2freefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
e2fsprogs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
filefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
libcomerr 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
libext2fs 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
libss 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
lsattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
tune2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
badblocks 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
chattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
debugfs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
dumpe2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
e2freefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
e2fsprogs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
filefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
libcomerr 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
libext2fs 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
libss 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
lsattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
resize2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
tune2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
badblocks 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
chattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
debugfs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
dumpe2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
e2freefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
e2fsprogs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
filefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
libcomerr 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k3.2
libext2fs 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k3.2
libss 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k3.2
lsattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
resize2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
tune2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
badblocks 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
chattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
debugfs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
dumpe2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
e2freefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
e2fsprogs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
filefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
libcomerr 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
libext2fs 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
libss 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
lsattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
resize2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
tune2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
badblocks 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
chattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
debugfs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
dumpe2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
e2freefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
e2fsprogs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
filefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
libcomerr 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
libext2fs 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
libss 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
lsattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
resize2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
tune2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
badblocks 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
chattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
debugfs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
dumpe2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
e2freefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
e2fsprogs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
filefrag 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
libcomerr 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
x64-k3.2
libext2fs 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
x64-k3.2
libss 1.46.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
x64-k3.2
lsattr 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
resize2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
tune2fs 1.46.5 Potentially vulnerable utils fallback-mnt-entware@repology
EuroLinux 8
appstream
e2fsprogs 1.45.6 System Environment/Base -
EuroLinux 8
baseos
e2fsprogs 1.45.6 System Environment/Base -
EuroLinux 8
baseos
e2fsprogs 1.45.6 System Environment/Base -
EuroLinux 8
baseos
e2fsprogs 1.45.4 Potentially vulnerable System Environment/Base -
Exherbo
arbor
sys-fs/e2fsprogs 1.46.5 Potentially vulnerable sys-fs fallback-mnt-exherbo@repology
Fedora 26
release
e2fsprogs 1.43.4 Potentially vulnerable System Environment/Base -
Fedora 27
release
e2fsprogs 1.43.5 Potentially vulnerable System Environment/Base -
Fedora 28
updates
e2fsprogs 1.44.2 Potentially vulnerable System Environment/Base -
Fedora 28
release
e2fsprogs 1.43.8 Potentially vulnerable System Environment/Base -
Fedora 29
updates
e2fsprogs 1.44.6 Potentially vulnerable Unspecified -
Fedora 29
release
e2fsprogs 1.44.3 Potentially vulnerable System Environment/Base -
Fedora 30
release
e2fsprogs 1.44.6 Potentially vulnerable Unspecified -
Fedora 30
updates
e2fsprogs 1.44.6 Potentially vulnerable Unspecified -
Fedora 31
updates
e2fsprogs 1.45.5 Unspecified -
Fedora 31
release
e2fsprogs 1.45.3 Potentially vulnerable Unspecified -
Fedora 32
release
e2fsprogs 1.45.5 Unspecified -
Fedora 33
release
e2fsprogs 1.45.6 Unspecified -
Fedora 34
release
e2fsprogs 1.45.6 Unspecified -
Fedora 35
release
e2fsprogs 1.46.3 Unspecified -
Fedora 36
development
e2fsprogs 1.46.5 Potentially vulnerable Unspecified -
Fedora Rawhide
development
e2fsprogs 1.46.5 Potentially vulnerable Unspecified -
FreeBSD Ports misc/e2fsprogs-libblkid 1.46.5 Potentially vulnerable misc mandree@freebsd.org
FreeBSD Ports misc/e2fsprogs-libuuid 1.46.5 Potentially vulnerable misc mandree@freebsd.org
FreeBSD Ports sysutils/e2fsprogs 1.46.5 Potentially vulnerable sysutils mandree@freebsd.org
Funtoo 1.4
core-kit
sys-libs/e2fsprogs-libs 1.46.5 Potentially vulnerable sys-libs fallback-mnt-funtoo@repology
Funtoo 1.4
core-kit
sys-fs/e2fsprogs 1.46.5 Potentially vulnerable sys-fs fallback-mnt-funtoo@repology
Gentoo sys-fs/e2fsprogs 1.46.5 Potentially vulnerable sys-fs base-system@gentoo.org
GNU Guix e2fsck-static 1.46.4 - -
GNU Guix e2fsprogs 1.46.4 - -
GoboLinux E2FSProgs 1.45.5 - -
HaikuPorts master sys-fs/e2fsprogs 1.45.6 sys-fs -
Homebrew e2fsprogs 1.46.4 - -
Kali Linux Rolling
main
e2fsprogs 1.46.5 Potentially vulnerable admin tytso@mit.edu
KaOS
core
e2fsprogs 1.46.5 Potentially vulnerable - demm@kaosx.us
LiGurOS stable sys-fs/e2fsprogs 1.46.5 Potentially vulnerable sys-fs base-system@gentoo.org
LiGurOS develop sys-fs/e2fsprogs 1.46.5 Potentially vulnerable sys-fs base-system@gentoo.org
MacPorts e2fsprogs 1.45.6 sysutils ryandesign@macports, ryandesign@github
Mageia 7
core/updates
e2fsprogs 1.45.5 System/Kernel and hardware -
Mageia 7
core/updates
e2fsprogs 1.45.4 Potentially vulnerable System/Kernel and hardware -
Mageia 7
core/release
e2fsprogs 1.45.2 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/release
e2fsprogs 1.45.6 System/Kernel and hardware -
Mageia Cauldron
core/release
e2fsprogs 1.46.5 Potentially vulnerable System/Kernel and hardware -
Manjaro Stable
multilib
lib32-e2fsprogs 1.46.5 Potentially vulnerable - -
Manjaro Stable
core
fuse2fs 1.46.5 Potentially vulnerable - -
Manjaro Stable
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Manjaro Testing
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Manjaro Testing
core
fuse2fs 1.46.5 Potentially vulnerable - -
Manjaro Testing
multilib
lib32-e2fsprogs 1.46.5 Potentially vulnerable - -
Manjaro Unstable
multilib
lib32-e2fsprogs 1.46.5 Potentially vulnerable - -
Manjaro Unstable
core
fuse2fs 1.46.5 Potentially vulnerable - -
Manjaro Unstable
core
e2fsprogs 1.46.5 Potentially vulnerable - -
MidnightBSD mports sysutils/e2fsprogs 1.45.5 sysutils -
MidnightBSD mports misc/e2fsprogs-libblkid 1.45.5 devel -
MidnightBSD mports misc/e2fsprogs-libuuid 1.45.5 devel -
MidnightBSD mports devel/e2fsprogs-libss 1.45.5 devel -
nixpkgs stable 21.05 e2fsprogs 1.46.2 - edolstra+nixpkgs@gmail.com
nixpkgs stable 21.11 e2fsprogs 1.46.5 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable e2fsprogs 1.46.5 Potentially vulnerable - edolstra+nixpkgs@gmail.com
NOIR Linux Main
extra
e2fsprogs 1.46.5 Potentially vulnerable - m_matongo@icloud.com
OpenBSD Ports sysutils/e2fsprogs 1.46.2 sysutils ports@openbsd.org
openEuler 20.03
source
e2fsprogs 1.45.3 Potentially vulnerable Unspecified -
openmamba
devel
e2fsprogs 1.46.5 Potentially vulnerable System/Tools silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
e2fsprogs 1.45.2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.0
main/release
e2fsprogs 1.45.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.1
main/release
e2fsprogs 1.45.5 System/Kernel and hardware tpgxyz@gmail.com
OpenMandriva 4.2
main/release
e2fsprogs 1.45.6 System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
e2fsprogs 1.46.5 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Cooker
main/release
e2fsprogs 1.46.5 Potentially vulnerable System/Kernel and hardware bero+massbuild@lindev.ch
openSUSE Leap 42.3
main/oss
e2fsprogs 1.42.11 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.0
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.0
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.0
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.0
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.0
main/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.1
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.1
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.1
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.1
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.1
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.1
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.1
main/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.2
main/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.2
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.2
updates/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.3
main/oss
e2fsprogs 1.43.8 Potentially vulnerable System/Filesystems -
openSUSE Leap 15.4
main/oss
e2fsprogs 1.46.4 System/Filesystems -
openSUSE Tumbleweed
src-oss
e2fsprogs 1.46.5 Potentially vulnerable System/Filesystems -
OpenWrt 17.01 x86_64
base
badblocks 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
chattr 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
debugfs 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
dumpe2fs 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
e2freefrag 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
e2fsprogs 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
filefrag 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
libext2fs 1.43.3 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
lsattr 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
resize2fs 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
tune2fs 1.43.3 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
badblocks 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
chattr 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
debugfs 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
dumpe2fs 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
e2freefrag 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
e2fsprogs 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
filefrag 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
libcomerr 1.44.1 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
libext2fs 1.44.1 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
libss 1.44.1 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
lsattr 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
resize2fs 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
tune2fs 1.44.1 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
badblocks 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
chattr 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
debugfs 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
dumpe2fs 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
e2freefrag 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
e2fsprogs 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
e4crypt 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
filefrag 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
libcomerr0 1.44.5 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
libext2fs2 1.44.5 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
libss2 1.44.5 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
lsattr 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
resize2fs 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
tune2fs 1.44.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
badblocks 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
chattr 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
debugfs 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
dumpe2fs 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
e2freefrag 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
e2fsprogs 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
e4crypt 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
filefrag 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
libcomerr0 1.45.6 libs fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
libext2fs2 1.45.6 libs fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
libss2 1.45.6 libs fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
lsattr 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
resize2fs 1.45.6 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
tune2fs 1.45.6 utils fallback-mnt-openwrt@repology
Parabola
core
fuse2fs 1.46.5 Potentially vulnerable - -
Parabola
core
e2fsprogs 1.46.5 Potentially vulnerable - -
Pardus 17
main
e2fsprogs 1.43.4 Potentially vulnerable admin tytso@mit.edu
Pardus 19
updates/main
e2fsprogs 1.44.5 Potentially vulnerable admin tytso@mit.edu
Pardus 19
updates/main
e2fsprogs 1.44.5 Potentially vulnerable admin tytso@mit.edu
Pardus 19
main
e2fsprogs 1.44.5 Potentially vulnerable admin tytso@mit.edu
Pardus 21
updates/main
e2fsprogs 1.46.2 admin tytso@mit.edu
Pardus 21
main
e2fsprogs 1.46.2 admin tytso@mit.edu
Parrot
parrot-updates/main
e2fsprogs 1.46.2 admin tytso@mit.edu
Parrot
parrot/main
e2fsprogs 1.46.2 admin tytso@mit.edu
PCLinuxOS e2fsprogs 1.46.5 Potentially vulnerable System/Kernel and hardware -
Pisi Linux
core
e2fsprogs 1.46.3 app:console admins@pisilinux.org
pkgsrc current sysutils/e2fsprogs 1.46.4 sysutils pkgsrc-users@netbsd.org
PLD Linux e2fsprogs 1.46.5 Potentially vulnerable - -
PureOS Amber e2fsprogs 1.44.5 Potentially vulnerable misc tytso@mit.edu
PureOS landing e2fsprogs 1.46.2 misc tytso@mit.edu
PureOS landing e2fsprogs 1.45.7 misc tytso@mit.edu
Raspbian Oldstable
main
e2fsprogs 1.44.5 Potentially vulnerable admin tytso@mit.edu
Raspbian Oldstable
main
e2fsprogs1.41 1.41.14 Potentially vulnerable misc milan@debian.org
Raspbian Stable
main
e2fsprogs 1.46.2 admin tytso@mit.edu
Raspbian Stable
main
e2fsprogs1.41 1.41.14 Potentially vulnerable misc milan@debian.org
Raspbian Testing
main
e2fsprogs 1.46.5 Potentially vulnerable admin tytso@mit.edu
Raspbian Testing
main
e2fsprogs1.41 1.41.14 Potentially vulnerable misc milan@debian.org
Rocky Linux 8
BaseOS
e2fsprogs 1.45.6 System Environment/Base infrastructure@rockylinux.org
Rosa 2014.1
main/updates
e2fsprogs 1.42.13 - -
Rosa 2014.1
main/release
e2fsprogs 1.42.5 Potentially vulnerable - -
Rosa 2016.1
main/updates
e2fsprogs 1.45.4 Potentially vulnerable - -
Rosa 2016.1
main/release
e2fsprogs 1.43.3 Potentially vulnerable - -
Rosa 2019.1
main/release
e2fsprogs 1.46.5 Potentially vulnerable System/Kernel and hardware alexander@mezon.ru
Rosa Server 6.9
base/release
e2fsprogs 1.41.12 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
e2fsprogs 1.41.12 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base alex2048@mail.ru
Rosa Server 7.5
base/release
e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base alex2048@mail.ru
Rosa Server 7.5
base/release
e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base alex2048@mail.ru
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.9 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x e2fsprogs 1.42.8 Potentially vulnerable System Environment/Base -
Slackware 14.2
slackware
e2fsprogs 1.43.1 - volkerdi@slackware.com
Slackware 15.0
slackware
e2fsprogs 1.46.5 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
e2fsprogs 1.46.5 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
e2fsprogs 1.43.1 - volkerdi@slackware.com
Slackware64 15.0
slackware64
e2fsprogs 1.46.5 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
e2fsprogs 1.46.5 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
e2fsprogs 1.43.1 - volkerdi@slackware.com
Slackwarearm 15.0
slackware
e2fsprogs 1.46.5 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking e2fsprogs 1.45.5 base-system pankso@slitaz.org
SliTaz Cooking e2fsprogs-dev 1.45.5 development pankso@slitaz.org
SliTaz Cooking libcomerr 1.45.5 base-system pankso@slitaz.org
SliTaz Cooking libcomerr-dev 1.45.5 development pankso@slitaz.org
SliTaz Next libcomerr-dev 1.44.4 Potentially vulnerable development devel@slitaz.org
SliTaz Next e2fsprogs-dev 1.44.4 Potentially vulnerable development devel@slitaz.org
SliTaz Next e2fsprogs-fsck 1.44.4 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next libcomerr 1.44.4 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next e2fsprogs 1.44.4 Potentially vulnerable base-system devel@slitaz.org
Solus e2fsprogs 1.45.6 system.base joshua@streambits.io
Solus e2fsprogs-32bit 1.45.6 emul32 joshua@streambits.io
Solus e2fsprogs-32bit-dbginfo 1.45.6 debug joshua@streambits.io
Solus e2fsprogs-32bit-devel 1.45.6 programming.devel joshua@streambits.io
Solus e2fsprogs-dbginfo 1.45.6 debug joshua@streambits.io
Solus e2fsprogs-devel 1.45.6 programming.devel joshua@streambits.io
Spack e2fsprogs 1.45.6 - fallback-mnt-spack@repology
T2 SDE e2fsprogs 1.45.6 base/system extra/filesystem rene@t2-project.org
Termux e2fsprogs 1.46.5 Potentially vulnerable - termux@github
Trisquel 6.0
toutatis/main
e2fsprogs 1.42 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 6.0
toutatis-updates/main
e2fsprogs 1.42 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
e2fsprogs 1.42.9 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos/main
e2fsprogs 1.42.9 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
e2fsprogs 1.42.13 admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
e2fsprogs 1.42.13 admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
e2fsprogs1.41 1.41.14 Potentially vulnerable universe/misc milan@debian.org
Trisquel 9.0
etiona-updates/main
e2fsprogs 1.44.1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona/main
e2fsprogs 1.44.1 Potentially vulnerable admin tytso@mit.edu
Trisquel 9.0
etiona/main
e2fsprogs1.41 1.41.14 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
e2fsprogs 1.45.5 admin ubuntu-devel-discuss@lists.ubuntu.com
UBI 8
baseos
e2fsprogs 1.45.6 System Environment/Base -
Ubuntu 14.04
trusty-updates/main
e2fsprogs 1.42.9 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/main
e2fsprogs 1.42.9 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial-updates/main
e2fsprogs 1.42.13 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
e2fsprogs 1.42.13 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/universe
e2fsprogs1.41 1.41.14 Potentially vulnerable universe/misc milan@debian.org
Ubuntu 18.04
bionic/main
e2fsprogs 1.44.1 Potentially vulnerable admin tytso@mit.edu
Ubuntu 18.04
bionic-updates/main
e2fsprogs 1.44.1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/universe
e2fsprogs1.41 1.41.14 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
e2fsprogs 1.45.5 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 21.04
hirsute/main
e2fsprogs 1.45.7 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 21.10
impish/main
e2fsprogs 1.46.3 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/main
e2fsprogs 1.46.5 Potentially vulnerable admin tytso@mit.edu
Void Linux x86_64
x86_64
e2fsprogs 1.46.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
e2fsprogs-devel 1.46.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
e2fsprogs-libs 1.46.5 Potentially vulnerable - gottox@voidlinux.org
Wikidata e2fsprogs 1.46.5 Potentially vulnerable - -
yiffOS Knot e2fsprogs 1.46.5 Potentially vulnerable - evie@uwueviee.live