Versions Packages Information History CVEs Related Badges Report

Versions for edk2

218 package(s) known

Repository Package name Version Category Maintainer(s)
AlmaLinux 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators packager@almalinux.org
AlmaLinux 9
AppStream
edk2 20230524 Unspecified packager@almalinux.org
AlmaLinux 9
AppStream
edk2 20230524 Unspecified packager@almalinux.org
Alpine Linux 3.8
community
edk2 0.0.20170624 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
community
ovmf 0.0.20170624 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
edk2 0.0.20170624 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
ovmf 0.0.20170624 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
ovmf 0.0.20170624 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
edk2 0.0.20170624 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
ovmf 0.0.201908 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
edk2 0.0.201908 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
edk2 0.0.201908 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
ovmf 0.0.201908 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
ovmf 0.0.201908 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
edk2 0.0.201908 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
ovmf 0.0.202011 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
edk2 0.0.202011 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
edk2 0.0.202011 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
ovmf 0.0.202011 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
edk2 0.0.202202 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
ovmf 0.0.202202 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
edk2 0.0.202208 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
ovmf 0.0.202208 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
edk2 0.0.202302 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
edk2-pyc 0.0.202302 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
ovmf 0.0.202302 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
edk2 0.0.202308 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
edk2-pyc 0.0.202308 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
ovmf 0.0.202308 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
ovmf-xen 0.0.202308 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 edk2 20201127 Potentially vulnerable Emulators shaba@altlinux.org
ALT Linux p10 edk2 20221117 Emulators shaba@altlinux.org
ALT Sisyphus edk2 20221117 Emulators shaba@altlinux.org
Amazon Linux 2 edk2 20200801stable Potentially vulnerable Unspecified -
Amazon Linux 2 edk2 20200801stable Potentially vulnerable Unspecified -
Amazon Linux 2 edk2 20190501stable Potentially vulnerable Unspecified -
Amazon Linux 2 edk2 20190308stable Potentially vulnerable Unspecified -
Amazon Linux 2 edk2 20180529gitee3198e672e2 Potentially vulnerable Applications/Emulators -
Arch
extra
edk2-shell 202311 - -
Arch
extra
edk2-aarch64 202311 - -
Arch
extra
edk2-ovmf 202311 - -
Arch
extra
edk2-arm 202311 - -
Arch Linux 32 i486
extra
edk2-ovmf 202208 - -
Arch Linux 32 i486
extra
edk2-shell 202208 - -
Arch Linux 32 i686
extra
edk2-shell 202208 - -
Arch Linux 32 i686
extra
edk2-ovmf 202208 - -
Arch Linux 32 pentium4
extra
edk2-shell 202208 - -
Arch Linux 32 pentium4
extra
edk2-ovmf 202208 - -
ArchPOWER powerpc edk2-aarch64 202211 - -
ArchPOWER powerpc edk2-shell 202211 - -
ArchPOWER powerpc edk2-arm 202211 - -
ArchPOWER powerpc edk2-ovmf 202211 - -
ArchPOWER powerpc edk2-armvirt 202202 Potentially vulnerable - -
ArchPOWER powerpc64le edk2-arm 202211 - -
ArchPOWER powerpc64le edk2-shell 202211 - -
ArchPOWER powerpc64le edk2-ovmf 202211 - -
ArchPOWER powerpc64le edk2-aarch64 202211 - -
ArchPOWER powerpc64le edk2-armvirt 202202 Potentially vulnerable - -
ArchPOWER riscv64 edk2-arm 202211 - -
ArchPOWER riscv64 edk2-ovmf 202211 - -
ArchPOWER riscv64 edk2-shell 202211 - -
ArchPOWER riscv64 edk2-aarch64 202211 - -
ArchPOWER riscv64 edk2-armvirt 202202 Potentially vulnerable - -
AUR edk2-armvirt-git r29698.6062002bd5 - markzz@aur
AUR edk2-shell-git r29698.6062002bd5 - markzz@aur
AUR edk2-ovmf-git r29698.6062002bd5 - markzz@aur
Artix
world
edk2-shell 202311 - -
Artix
world
edk2-ovmf 202311 - -
Buildroot 2023.02.x edk2 edk2-stable202208 Potentially vulnerable - -
Buildroot 2023.05.x edk2 edk2-stable202208 Potentially vulnerable - -
Buildroot master edk2 edk2-stable202308 Potentially vulnerable - -
CentOS 8
AppStream
edk2 20210527gite1999b264f1f Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators builder@centos.org
CentOS Stream 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators builder@centos.org
CentOS Stream 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators builder@centos.org
CentOS Stream 8
AppStream
edk2 20210527gite1999b264f1f Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20210527gite1999b264f1f Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20200602gitca407c7246bf Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20200602gitca407c7246bf Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 8
AppStream
edk2 20200602gitca407c7246bf Potentially vulnerable Applications/Emulators bugs@centos.org
CentOS Stream 9
AppStream
edk2 20230524 Unspecified builder@centos.org
CentOS Stream 9
AppStream
edk2 20230524 Unspecified builder@centos.org
CentOS Stream 9
AppStream
edk2 20230524 Unspecified builder@centos.org
CentOS Stream 9
AppStream
edk2 20230524 Unspecified builder@centos.org
CentOS Stream 9
AppStream
edk2 20230301gitf80f052277c8 Unspecified builder@centos.org
Debian 10
buster/main
edk2 0~20181115.85588389 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Debian 10 Backports
buster-backports/main
edk2 2020.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Debian 11
bullseye/main
edk2 2020.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Debian 12
bookworm/main
edk2 2022.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Debian 13
trixie/main
edk2 2023.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Debian Unstable
sid/main
edk2 2023.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Debian Unstable
sid/main
edk2 2023.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Debian Experimental
experimental/main
edk2 2023.08 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Deepin
main
edk2 0~20181115.85588389.1 Potentially vulnerable - pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Devuan 3.0
beowulf/main
edk2 0~20181115.85588389 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Devuan 4.0
chimaera/main
edk2 2020.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Devuan Unstable
unstable/main
edk2 2023.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
EPEL 6 edk2 20140724svn2670 Potentially vulnerable Applications/Emulators -
EPEL 7 edk2 20140724svn2670 Potentially vulnerable Applications/Emulators -
EuroLinux 8
appstream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators -
EuroLinux 8
appstream
edk2 20210527gite1999b264f1f Potentially vulnerable Applications/Emulators -
EuroLinux 8
appstream
edk2 20200602gitca407c7246bf Potentially vulnerable Applications/Emulators -
EuroLinux 8
appstream
edk2 20200602gitca407c7246bf Potentially vulnerable Applications/Emulators -
EuroLinux 8
appstream
edk2 20200602gitca407c7246bf Potentially vulnerable Applications/Emulators -
EuroLinux 8
appstream
edk2 20200602gitca407c7246bf Potentially vulnerable Applications/Emulators -
EuroLinux 9
appstream
edk2 20230524 Unspecified -
EuroLinux 9
appstream
edk2 20221207gitfff6d81270b5 Unspecified -
EuroLinux 9
appstream
edk2 20221207gitfff6d81270b5 Unspecified -
EuroLinux 9
powertools
edk2 20221207gitfff6d81270b5 Unspecified -
EuroLinux 9
appstream
edk2 20220526git16779ede2d36 Unspecified -
EuroLinux 9
appstream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
edk2 20220126gitbb1bba3d77 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
edk2 20210527gite1999b264f1f Potentially vulnerable Unspecified -
Exherbo
CleverCloud
app-virtualization/edk2-ovmf 20221126 app-virtualization fallback-mnt-exherbo@repology
Fedora 26
release
edk2 20170209git296153c5 Potentially vulnerable Applications/Emulators -
Fedora 27
updates
edk2 20180815gitcb5f4f45ce Potentially vulnerable Applications/Emulators -
Fedora 27
release
edk2 20170209git296153c5 Potentially vulnerable Applications/Emulators -
Fedora 28
updates
edk2 20180815gitcb5f4f45ce Potentially vulnerable Applications/Emulators -
Fedora 28
release
edk2 20171011git92d07e4 Potentially vulnerable Applications/Emulators -
Fedora 29
updates
edk2 20190308stable Potentially vulnerable Unspecified -
Fedora 29
release
edk2 20180815gitcb5f4f45ce Potentially vulnerable Applications/Emulators -
Fedora 30
updates
edk2 20190501stable Potentially vulnerable Unspecified -
Fedora 30
release
edk2 20190308stable Potentially vulnerable Unspecified -
Fedora 31
release
edk2 20190501stable Potentially vulnerable Unspecified -
Fedora 32
updates
edk2 20200801stable Potentially vulnerable Unspecified -
Fedora 32
release
edk2 20190501stable Potentially vulnerable Unspecified -
Fedora 33
updates
edk2 20200801stable Potentially vulnerable Unspecified -
Fedora 33
release
edk2 20200801stable Potentially vulnerable Unspecified -
Fedora 34
release
edk2 20200801stable Potentially vulnerable Unspecified -
Fedora 35
updates
edk2 20211126gitbb1bba3d7767 Potentially vulnerable Unspecified -
Fedora 35
release
edk2 20210527gite1999b264f1f Potentially vulnerable Unspecified -
Fedora 36
updates
edk2 20221117gitfff6d81270b5 Unspecified -
Fedora 36
release
edk2 20220221gitb24306f15daa Potentially vulnerable Unspecified -
Fedora 37
updates
edk2 20230524 Unspecified -
Fedora 37
release
edk2 20220826gitba0e0e4c6a17 Unspecified -
Fedora 38
updates
edk2 20230524 Unspecified -
Fedora 38
release
edk2 20230301gitf80f052277c8 Unspecified -
Fedora 39
updates
edk2 20230825 Unspecified -
Fedora 39
development
edk2 20230524 Unspecified -
Fedora Rawhide
development
edk2 20231122 Unspecified -
Gentoo sys-firmware/edk2-ovmf-bin 202202 Potentially vulnerable sys-firmware virtualization@gentoo.org
Gentoo sys-firmware/edk2-ovmf 202202 Potentially vulnerable sys-firmware tamiko@gentoo.org, virtualization@gentoo.org
Gentoo sys-firmware/edk2-ovmf 202105 Potentially vulnerable sys-firmware tamiko@gentoo.org, virtualization@gentoo.org
HaikuPorts master sys-boot/edk2 2018 Potentially vulnerable sys-boot -
Kali Linux Rolling
main
edk2 2023.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
LiGurOS stable sys-firmware/edk2-ovmf 202202 Potentially vulnerable sys-firmware tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS stable sys-firmware/edk2-ovmf-bin 202202 Potentially vulnerable sys-firmware virtualization@gentoo.org
LiGurOS stable sys-firmware/edk2-ovmf 202105 Potentially vulnerable sys-firmware tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS develop sys-firmware/edk2-ovmf-bin 202202 Potentially vulnerable sys-firmware virtualization@gentoo.org
LiGurOS develop sys-firmware/edk2-ovmf 202202 Potentially vulnerable sys-firmware tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS develop sys-firmware/edk2-ovmf 202105 Potentially vulnerable sys-firmware tamiko@gentoo.org, virtualization@gentoo.org
Mageia 8
core/release
edk2 20201127stable Potentially vulnerable Emulators -
Mageia cauldron
core/release
edk2 20221117gitfff6d81270b5 Emulators -
Manjaro Stable
extra
edk2-arm 202311 - -
Manjaro Stable
extra
edk2-shell 202311 - -
Manjaro Stable
extra
edk2-aarch64 202311 - -
Manjaro Stable
extra
edk2-ovmf 202311 - -
Manjaro Testing
extra
edk2-aarch64 202311 - -
Manjaro Testing
extra
edk2-ovmf 202311 - -
Manjaro Testing
extra
edk2-arm 202311 - -
Manjaro Testing
extra
edk2-shell 202311 - -
Manjaro Unstable
extra
edk2-aarch64 202311 - -
Manjaro Unstable
extra
edk2-shell 202311 - -
Manjaro Unstable
extra
edk2-arm 202311 - -
Manjaro Unstable
extra
edk2-ovmf 202311 - -
nixpkgs stable 21.11 edk2 202108 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.05 edk2 202202 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.11 edk2 202205 - fallback-mnt-nix@repology
nixpkgs stable 23.05 edk2 202211 - fallback-mnt-nix@repology
nixpkgs unstable edk2 202311 - fallback-mnt-nix@repology
openEuler 20.03
source
edk2 201908 Potentially vulnerable Unspecified -
openEuler 22.03
source
edk2 202011 Potentially vulnerable Unspecified -
Parabola
extra
edk2-aarch64 202311 - -
Parabola
extra
edk2-shell 202311 - -
Parabola
extra
edk2-ovmf 202311 - -
Parabola
extra
edk2-arm 202311 - -
Pardus 21
main
edk2 2020.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Parrot
parrot-updates/main
edk2 2020.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Parrot
parrot/main
edk2 2020.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
PureOS Amber edk2 0~20181115.85588389 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
PureOS landing edk2 2022.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Raspbian Oldstable
main
edk2 2020.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Raspbian Stable
main
edk2 2022.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Raspbian Testing
main
edk2 2023.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Rocky Linux 8
AppStream
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators infrastructure@rockylinux.org
Rocky Linux 8
extras
edk2 20220126gitbb1bba3d77 Potentially vulnerable Applications/Emulators infrastructure@rockylinux.org
Rocky Linux 9
AppStream
edk2 20230524 Unspecified releng@rockylinux.org
Rocky Linux 9
CRB
edk2 20230524 Unspecified releng@rockylinux.org
Rosa 2014.1
main/updates
edk2 20150807 Potentially vulnerable - -
Rosa 2016.1
main/updates
edk2 20171011 Potentially vulnerable - -
Rosa 2016.1
main/release
edk2 20150807 Potentially vulnerable - -
Rosa 2021.1
main/release
edk2 20200801stable Potentially vulnerable Emulators m.novosyolov@rosalinux.ru
SlackBuilds system/edk2-ovmf 20230524 system kvngncrlsn@gmail.com
Solus edk2-ovmf 202311 virt reilly@reillybrogan.com
Solus edk2-ovmf-aarch64 202311 virt reilly@reillybrogan.com
Solus edk2-ovmf-i386 202311 virt reilly@reillybrogan.com
Trisquel 10.0
nabia/main
edk2 0~20191122.bd85bf54 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Trisquel 10.0
nabia-security/main
edk2 0~20191122.bd85bf54 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Trisquel 10.0
nabia-updates/main
edk2 0~20191122.bd85bf54 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Trisquel 10.0
nabia-updates/main
edk2 0~20191122.bd85bf54 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Trisquel 11.0
aramo-updates/main
edk2 2022.02 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Trisquel 11.0
aramo/main
edk2 2022.02 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 14.04
trusty/multiverse
edk2 0~20131112.2590861a Potentially vulnerable multiverse/misc pkg-qemu-devel@lists.alioth.debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 16.04
xenial/universe
edk2 0~20160408.ffea0a2c Potentially vulnerable universe/misc pkg-qemu-devel@lists.alioth.debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 16.04
xenial-updates/universe
edk2 0~20160408.ffea0a2c Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 18.04
bionic/universe
edk2 0~20180205.c0d9813c Potentially vulnerable universe/misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 18.04
bionic-updates/universe
edk2 0~20180205.c0d9813c Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 20.04
focal/main
edk2 0~20191122.bd85bf54 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 20.04
focal-updates/main
edk2 0~20191122.bd85bf54 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 22.04
jammy/main
edk2 2022.02 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 22.04
jammy-updates/main
edk2 2022.02 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 23.04
lunar/main
edk2 2022.11 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org
Ubuntu 23.10
mantic/main
edk2 2023.05 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, dannf@debian.org, serge.hallyn@ubuntu.com, vorlon@debian.org