Versions Packages Information History CVEs Related Badges Report

Versions for gnupg

414 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
gnupg 2.2.23 - awilfox@adelielinux.org
Adélie Linux current
user
gnupg-dbg 2.2.23 - awilfox@adelielinux.org
Adélie Linux current
user
gnupg-doc 2.2.23 - awilfox@adelielinux.org
Adélie Linux current
user
gnupg-lang 2.2.23 - awilfox@adelielinux.org
AIX Open Source Packages gnupg2 2.0.26 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.25 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.24 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.23 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.22 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.21 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.20 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.19 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.18 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.17 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.16 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.15 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.15 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.14 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.13 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.12 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.11 Potentially vulnerable - -
AIX Open Source Packages gnupg2 2.0.9 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.22 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.21 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.20 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.19 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.18 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.17 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.16 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.15 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.14 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.13 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.12 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.11 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.11 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.10 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.10 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.9 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.8 Potentially vulnerable - -
AIX Open Source Packages gnupg 1.4.7 Potentially vulnerable - -
Alpine Linux 3.8
main
gnupg-scdaemon 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
gnupg-doc 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
gnupg 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
gnupg1-doc 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
gnupg1 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
gnupg-doc 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
gnupg 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
gnupg-scdaemon 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
gnupg1-doc 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
gnupg1 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
gnupg 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
gnupg-scdaemon 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
gnupg-doc 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
gnupg1-doc 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
gnupg1 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
gnupg 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
gnupg-doc 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
gnupg-scdaemon 2.2.19 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
gnupg1-doc 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
gnupg1 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
gnupg-scdaemon 2.2.23 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
gnupg-doc 2.2.23 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
gnupg 2.2.23 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
gnupg1-doc 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
gnupg1 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
gnupg-scdaemon 2.2.23 - ncopa@alpinelinux.org
Alpine Linux Edge
main
gnupg-doc 2.2.23 - ncopa@alpinelinux.org
Alpine Linux Edge
main
gnupg 2.2.23 - ncopa@alpinelinux.org
Alpine Linux Edge
main
gnupg1 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
gnupg1-doc 1.4.23 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 gnupg2 2.2.17 Potentially vulnerable Text tools manowar@altlinux.org
ALT Linux p9 gnupg 1.4.23 Potentially vulnerable File tools ldv@altlinux.org
ALT Sisyphus gnupg2 2.2.19 Potentially vulnerable Text tools manowar@altlinux.org
ALT Sisyphus gnupg 1.4.23 Potentially vulnerable File tools ldv@altlinux.org
Amazon Linux 1
updates
gnupg2 2.0.28 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
gnupg2 2.0.28 Potentially vulnerable Applications/System -
Amazon Linux 1
main
gnupg2 2.0.28 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
gnupg2 2.0.28 Potentially vulnerable Applications/System -
Amazon Linux 1
main
gnupg 1.4.19 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
gnupg 1.4.19 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
gnupg 1.4.19 Potentially vulnerable Applications/System -
Amazon Linux 2 gnupg2 2.0.22 Potentially vulnerable Applications/System -
Amazon Linux 2 gnupg2 2.0.22 Potentially vulnerable Applications/System -
Amazon Linux 2 gnupg2 2.0.22 Potentially vulnerable Applications/System -
Amazon Linux 2 gnupg2 2.0.22 Potentially vulnerable Applications/System -
AOSC gnupg 2.2.23 libs fallback-mnt-aosc@repology
AOSC gnupg-1 1.4.23 Potentially vulnerable libs fallback-mnt-aosc@repology
Arch
core
gnupg 2.2.23 - -
AUR gnupg-git 2.2.0 Potentially vulnerable - fallback-mnt-aur@repology
AUR gnupg-scdaemon-shared-access 2.2.23 - arti@aur
AUR gnupg-large-secmem 2.2.23 - arjan5@aur
AUR gnupg-largekeys 2.2.21 Potentially vulnerable - thegoliath@aur
AUR gnupg-large-rsa 2.2.17 Potentially vulnerable - reki@aur
AUR gnupg-clavator 2.1.16 Potentially vulnerable - fastandfearless@aur
AUR gnupg1 1.4.23 Potentially vulnerable - xyne@aur
Ataraxia Linux gnupg 2.2.23 utils nagakamira@gmail.com
Carbs Linux
extra
gnupg2 2.2.23 - cem@ckyln.com
CentOS 6
os
gnupg2 2.0.14 Potentially vulnerable Applications/System -
CentOS 6
updates
gnupg2 2.0.14 Potentially vulnerable Applications/System -
CentOS 7
os
gnupg2 2.0.22 Potentially vulnerable Applications/System -
CentOS 8
BaseOS
gnupg2 2.2.9 Potentially vulnerable Applications/System bugs@centos.org
Chakra
core
gnupg 2.2.21 Potentially vulnerable - -
Chocolatey GnuPG 2.2.23 - -
Chocolatey [Deprecated] GnuPG modern (Install) 2.2.17 Potentially vulnerable - -
CRUX 3.4
opt
gnupg 2.2.15 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
gnupg 2.2.23 - tek@serverop.de
Cygwin gnupg2 2.2.21 Potentially vulnerable Utils marco.atzeri@cygwin
Cygwin gnupg2-debuginfo 2.2.21 Potentially vulnerable Debug marco.atzeri@cygwin
Cygwin gnupg 1.4.23 Potentially vulnerable Utils marco.atzeri@cygwin
Cygwin gnupg-debuginfo 1.4.23 Potentially vulnerable Debug marco.atzeri@cygwin
Debian Oldstable
oldstable/main
gnupg2 2.1.18 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Oldstable
oldstable/main
gnupg2 2.1.18 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Oldstable
oldstable/main
gnupg1 1.4.21 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Debian Stable
stable/main
gnupg2 2.2.12 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Stable
stable/main
gnupg2 2.2.12 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Stable
stable/main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Debian Stable Backports
main
gnupg2 2.2.20 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Testing
testing/main
gnupg2 2.2.20 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Testing
testing/main
gnupg2 2.2.19 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Testing
testing/main
gnupg2 2.2.12 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Testing
testing/main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Debian Unstable
main
gnupg2 2.2.20 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Unstable
main
gnupg2 2.2.19 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Unstable
main
gnupg2 2.2.12 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Debian Unstable
main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Deepin
main
gnupg2 2.2.7 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Deepin
main
gnupg1 1.4.22 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Deepin
main
gnupg 1.4.20 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Devuan 1.0 (Jessie)
jessie/main
gnupg2 2.0.26 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Devuan 1.0 (Jessie)
jessie/main
gnupg 1.4.18 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org, thijs@debian.org
Devuan 2.0 (ASCII)
ascii/main
gnupg2 2.1.18 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Devuan 2.0 (ASCII)
ascii/main
gnupg1 1.4.21 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
gnupg2 2.2.12 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
gnupg2 2.2.12 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Devuan Unstable
unstable/main
gnupg2 2.2.20 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Devuan Unstable
unstable/main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
distri gnupg 2.2.20 Potentially vulnerable - -
DistroWatch.com gnupg 2.2.23 - -
DPorts security/gnupg 2.2.21 Potentially vulnerable security adamw@freebsd.org
DPorts security/gnupg1 1.4.23 Potentially vulnerable security adamw@freebsd.org
Entware
x64-k3.2
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-entware@repology
Exherbo
arbor
app-crypt/gnupg 2.2.23 app-crypt fallback-mnt-exherbo@repology
Exherbo
arbor
app-crypt/gnupg 2.1.23 Potentially vulnerable app-crypt fallback-mnt-exherbo@repology
Fedora 26
updates
gnupg2 2.2.6 Potentially vulnerable Applications/System -
Fedora 26
release
gnupg2 2.1.21 Potentially vulnerable Applications/System -
Fedora 26
updates
gnupg 1.4.22 Potentially vulnerable Applications/System -
Fedora 26
release
gnupg 1.4.21 Potentially vulnerable Applications/System -
Fedora 27
updates
gnupg2 2.2.8 Potentially vulnerable Applications/System -
Fedora 27
release
gnupg2 2.2.0 Potentially vulnerable Applications/System -
Fedora 27
updates
gnupg 1.4.23 Potentially vulnerable Applications/System -
Fedora 27
release
gnupg 1.4.22 Potentially vulnerable Applications/System -
Fedora 28
updates
gnupg2 2.2.12 Potentially vulnerable Applications/System -
Fedora 28
release
gnupg2 2.2.6 Potentially vulnerable Applications/System -
Fedora 28
updates
gnupg 1.4.23 Potentially vulnerable Applications/System -
Fedora 28
release
gnupg 1.4.22 Potentially vulnerable Applications/System -
Fedora 29
updates
gnupg2 2.2.17 Potentially vulnerable Unspecified -
Fedora 29
release
gnupg2 2.2.9 Potentially vulnerable Applications/System -
Fedora 29
release
gnupg 1.4.23 Potentially vulnerable Applications/System -
Fedora 30
updates
gnupg2 2.2.20 Potentially vulnerable Unspecified -
Fedora 30
release
gnupg2 2.2.13 Potentially vulnerable Unspecified -
Fedora 30
release
gnupg1 1.4.23 Potentially vulnerable Unspecified -
Fedora 31
updates
gnupg2 2.2.20 Potentially vulnerable Unspecified -
Fedora 31
release
gnupg2 2.2.17 Potentially vulnerable Unspecified -
Fedora 31
release
gnupg1 1.4.23 Potentially vulnerable Unspecified -
Fedora 32
updates
gnupg2 2.2.20 Potentially vulnerable Unspecified -
Fedora 32
release
gnupg2 2.2.19 Potentially vulnerable Unspecified -
Fedora 32
release
gnupg1 1.4.23 Potentially vulnerable Unspecified -
Fedora 33
development
gnupg2 2.2.23 Unspecified -
Fedora 33
development
gnupg1 1.4.23 Potentially vulnerable Unspecified -
Fedora Rawhide gnupg2 2.2.23 Unspecified -
Fedora Rawhide gnupg1 1.4.23 Potentially vulnerable Unspecified -
FreeBSD Ports security/gnupg 2.2.23 security adamw@freebsd.org
FreeBSD Ports security/gnupg1 1.4.23 Potentially vulnerable security adamw@freebsd.org
freshcode.club gnupg 2.2.0 Potentially vulnerable - -
Funtoo 1.4
core-kit
app-crypt/gnupg 2.2.16 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Funtoo 1.4
core-kit
app-crypt/gnupg 2.2.16 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Funtoo 1.4
core-kit
app-crypt/gnupg 2.2.15 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Funtoo 1.4
core-kit
app-crypt/gnupg 2.2.15 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Funtoo 1.4
core-kit
app-crypt/gnupg 2.2.14 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Funtoo 1.4
core-kit
app-crypt/gnupg 2.2.12 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Funtoo 1.4
core-kit
app-crypt/gnupg 2.2.10 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Funtoo 1.4
core-kit
app-crypt/gnupg 1.4.21 Potentially vulnerable app-crypt k_f@gentoo.org, crypto@gentoo.org
Gentoo app-crypt/gnupg 2.2.23 app-crypt zlogene@gentoo.org, polynomial-c@gentoo.org
Gentoo app-crypt/gnupg 2.2.20 Potentially vulnerable app-crypt zlogene@gentoo.org, polynomial-c@gentoo.org
GNU Guix gnupg 2.2.23 - -
GNU Guix gnupg 1.4.23 Potentially vulnerable - -
GoboLinux GnuPG 2.2.19 Potentially vulnerable - -
GoboLinux GPG-Agent 2.0.18 Potentially vulnerable - -
HaikuPorts master app-crypt/gnupg 2.2.21 Potentially vulnerable app-crypt -
HaikuPorts master app-crypt/gnupg 1.4.23 Potentially vulnerable app-crypt -
Homebrew gnupg 2.2.23 - -
Homebrew gnupg@1.4 1.4.23 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gnupg 2.0.31 Potentially vulnerable - -
HP-UX 11.31
ia64_64
gnupg 2.0.31 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gnupg 2.0.30 Potentially vulnerable - -
HP-UX 11.31
ia64_32
gnupg 2.0.30 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gnupg 2.0.22 Potentially vulnerable - -
Hyperbola
core
gnupg-stable 2.2.12 Potentially vulnerable - -
IBM i gnupg2 2.2.19 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
gnupg2 2.2.20 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Kali Linux Rolling
main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
KaOS
core
gnupg 2.2.23 - demm@kaosx.us
KISS Linux Community
community
gnupg2 2.2.23 - cem@ckyln.com
KISS Linux Main
extra
gnupg1 1.4.23 Potentially vulnerable - dylan.araps@gmail.com
Kwort 4.3.3 gnupg 2.2.15 Potentially vulnerable - -
Kwort 4.3.4 gnupg 2.2.23 - -
LiGurOS 20.7
core-kit
app-crypt/gnupg 2.2.23 app-crypt zlogene@gentoo.org, polynomial-c@gentoo.org
LiGurOS 20.7
core-kit
app-crypt/gnupg 2.2.20 Potentially vulnerable app-crypt zlogene@gentoo.org, polynomial-c@gentoo.org
LiGurOS 21.1
core-kit
app-crypt/gnupg 2.2.23 app-crypt zlogene@gentoo.org, polynomial-c@gentoo.org
LiGurOS 21.1
core-kit
app-crypt/gnupg 2.2.20 Potentially vulnerable app-crypt zlogene@gentoo.org, polynomial-c@gentoo.org
Linuxbrew gnupg 2.2.23 - -
Linuxbrew gnupg@1.4 1.4.23 Potentially vulnerable - -
MacPorts gnupg2 2.2.23 mail jann@macports, roederja@github, ionic@macports, ionic@github
MacPorts gnupg1 1.4.23 Potentially vulnerable mail ionic@macports, ionic@github
Maemo Fremantle gnupg2 2.0.16 Potentially vulnerable - bjoern.ricks@intevation.de
Mageia 6
core/release
gnupg2 2.1.21 Potentially vulnerable File tools -
Mageia 6
core/updates
gnupg2 2.1.21 Potentially vulnerable File tools -
Mageia 6
core/updates
gnupg2 2.1.21 Potentially vulnerable File tools -
Mageia 6
core/updates
gnupg2 2.1.21 Potentially vulnerable File tools -
Mageia 6
core/updates
gnupg 1.4.23 Potentially vulnerable File tools -
Mageia 6
core/updates
gnupg 1.4.22 Potentially vulnerable File tools -
Mageia 6
core/release
gnupg 1.4.21 Potentially vulnerable File tools -
Mageia 7
core/updates
gnupg2 2.2.19 Potentially vulnerable File tools -
Mageia 7
core/updates
gnupg2 2.2.18 Potentially vulnerable File tools -
Mageia 7
core/updates
gnupg2 2.2.17 Potentially vulnerable File tools -
Mageia 7
core/release
gnupg2 2.2.15 Potentially vulnerable File tools -
Mageia Cauldron
core/release
gnupg2 2.2.23 File tools -
Manjaro Stable
core
gnupg 2.2.23 - -
Manjaro Testing
core
gnupg 2.2.23 - -
Manjaro Unstable
core
gnupg 2.2.23 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-gnupg 2.2.23 - -
MSYS2 mingw
i686
mingw-w64-i686-gnupg 2.2.23 - -
MSYS2 msys2
x86_64
gnupg 2.2.23 - -
MSYS2 msys2
i686
gnupg 2.2.23 - alexpux@gmail.com
nixpkgs stable gnupg 2.2.19 Potentially vulnerable - simons@cryp.to, fpletz@fnordicwalking.de, rahul@gopinath.org
nixpkgs stable gnupg1compat 2.2.19 Potentially vulnerable - simons@cryp.to, fpletz@fnordicwalking.de, rahul@gopinath.org
nixpkgs stable gnupg 2.0.30 Potentially vulnerable - roconnor@theorem.ca
nixpkgs stable gnupg 1.4.23 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable gnupg 2.2.23 - simons@cryp.to, fpletz@fnordicwalking.de, rahul@gopinath.org
nixpkgs unstable gnupg1compat 2.2.23 - simons@cryp.to, fpletz@fnordicwalking.de, rahul@gopinath.org
nixpkgs unstable gnupg 1.4.23 Potentially vulnerable - fallback-mnt-nix@repology
OpenBSD Ports security/gnupg2 2.2.23 security edd@openbsd.org
OpenBSD Ports security/gnupg 1.4.23 Potentially vulnerable security ports@openbsd.org
OpenBSD Ports security/gnupg 1.4.23 Potentially vulnerable security ports@openbsd.org
openEuler 20.03
source
gnupg2 2.2.17 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
gnupg 2.2.19 Potentially vulnerable Applications/System Utilities -
OpenMandriva 3.0
main/updates
gnupg 2.2.6 Potentially vulnerable File tools tpgxyz@gmail.com
OpenMandriva 3.0
main/release
gnupg 2.1.9 Potentially vulnerable File tools tpgxyz@gmail.com
OpenMandriva 4.0
main/release
gnupg 2.2.16 Potentially vulnerable File tools bero@lindev.ch
OpenMandriva 4.0
main/release
gnupg 2.2.15 Potentially vulnerable File tools bero@lindev.ch
OpenMandriva 4.1
main/release
gnupg 2.2.19 Potentially vulnerable File tools nobodydead@gmail.com
OpenMandriva Rolling
main/release
gnupg 2.2.23 File tools nobodydead@gmail.com
OpenMandriva Cooker
main/release
gnupg 2.2.23 File tools tpgxyz@gmail.com
OpenPKG gnupg 2.2.23 PGP -
OpenPKG gnupg1 1.4.23 Potentially vulnerable PGP -
openSUSE Leap 42.3
main/oss
gpg2 2.0.24 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
gpg2 2.0.24 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
main/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
main/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.2
main/oss
gpg2 2.2.5 Potentially vulnerable Productivity/Networking/Security -
openSUSE Tumbleweed gpg2 2.2.23 Productivity/Networking/Security -
OpenWrt 17.01 x86_64
packages
gnupg-utils 1.4.21 Potentially vulnerable utils lede@cshore.thecshore.com
OpenWrt 17.01 x86_64
packages
gnupg 1.4.21 Potentially vulnerable utils lede@cshore.thecshore.com
OpenWrt 17.01 x86_64
packages
gpgv 1.4.21 Potentially vulnerable utils lede@cshore.thecshore.com
OpenWrt 18.06 x86_64
packages
gnupg-utils 1.4.21 Potentially vulnerable utils lede@cshore.thecshore.com
OpenWrt 18.06 x86_64
packages
gnupg 1.4.21 Potentially vulnerable utils lede@cshore.thecshore.com
OpenWrt 18.06 x86_64
packages
gpgv 1.4.21 Potentially vulnerable utils lede@cshore.thecshore.com
OpenWrt 19.07 x86_64
packages
gnupg-utils 1.4.23 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
gnupg 1.4.23 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
gpgv 1.4.23 Potentially vulnerable utils fallback-mnt-openwrt@repology
Parabola
core
gnupg 2.2.23 - -
Parabola
pcr
gnupg1 1.4.21 Potentially vulnerable - -
Pardus
main
gnupg2 2.1.18 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Pardus
main
gnupg2 2.1.18 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Pardus
updates/main
gnupg2 2.1.18 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Pardus
main
gnupg1 1.4.21 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Pardus
updates/main
gnupg1 1.4.21 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Parrot
main
gnupg2 2.2.20 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Parrot
main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
PCLinuxOS gnupg2 2.2.23 File tools -
PCLinuxOS gnupg 1.4.23 Potentially vulnerable File tools -
Pisi Linux
main
gnupg 2.2.20 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current security/gnupg2 2.2.23 security ada@netbsdfr.org
pkgsrc current security/gnupg 1.4.23 Potentially vulnerable security pkgsrc-users@netbsd.org
PLD Linux gnupg2 2.2.21 Potentially vulnerable - -
PLD Linux gnupg 1.4.23 Potentially vulnerable - -
PureOS Amber gnupg2 2.2.12 Potentially vulnerable misc pureos-project@lists.puri.sm, dkg@fifthhorseman.net, eric@debian.org
PureOS Amber gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
PureOS landing gnupg2 2.2.20 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
PureOS landing gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Raspbian Oldstable
main
gnupg2 2.1.18 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Raspbian Oldstable
main
gnupg1 1.4.21 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Raspbian Oldstable
main
gnupg 1.4.20 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Raspbian Stable
main
gnupg2 2.2.12 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Raspbian Stable
main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Raspbian Stable
main
gnupg 1.4.20 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Raspbian Testing
main
gnupg2 2.2.20 Potentially vulnerable oldlibs pkg-gnupg-maint@lists.alioth.debian.org, dkg@fifthhorseman.net, eric@debian.org
Raspbian Testing
main
gnupg1 1.4.23 Potentially vulnerable misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Raspbian Testing
main
gnupg 1.4.20 Potentially vulnerable utils pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Ravenports gnupg 2.2.23 security fallback-mnt-ravenports@repology
Rosa 2014.1
main/updates
gnupg2 2.0.27 Potentially vulnerable - -
Rosa 2014.1
main/release
gnupg2 2.0.26 Potentially vulnerable - -
Rosa 2014.1
main/updates
gnupg 1.4.21 Potentially vulnerable - -
Rosa 2014.1
main/release
gnupg 1.4.18 Potentially vulnerable - -
Rosa 2016.1
main/testing
gnupg2 2.2.17 Potentially vulnerable - -
Rosa 2016.1
main/updates
gnupg2 2.2.17 Potentially vulnerable - -
Rosa 2016.1
main/release
gnupg2 2.1.16 Potentially vulnerable - -
Rosa 2016.1
main/testing
gnupg 1.4.23 Potentially vulnerable - -
Rosa 2016.1
main/updates
gnupg 1.4.23 Potentially vulnerable - -
Rosa 2016.1
main/release
gnupg 1.4.21 Potentially vulnerable - -
Rosa 2019.1
main/release
gnupg2 2.2.17 Potentially vulnerable File tools alexander@mezon.ru
Rosa 2019.1
main/release
gnupg 1.4.23 Potentially vulnerable File tools alexander@mezon.ru
Rosa Server 6.9
base/release
gnupg2 2.0.14 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
gnupg2 2.0.22 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
gnupg2 2.0.22 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x gnupg2 2.0.22 Potentially vulnerable Applications/System -
Scientific Linux 7.x gnupg2 2.0.22 Potentially vulnerable Applications/System -
Scientific Linux 7.x gnupg2 2.0.22 Potentially vulnerable Applications/System -
Scientific Linux 7.x gnupg2 2.0.22 Potentially vulnerable Applications/System -
Scoop
main
gnupg 2.2.23 - -
Scoop
main
gpg 2.2.23 - -
Scoop
main
gnupg1 1.4.23 Potentially vulnerable - -
Slackware 14.2
patches
gnupg2 2.0.31 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
gnupg2 2.0.30 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
patches
gnupg 1.4.23 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
gnupg 1.4.20 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
gnupg2 2.2.23 - volkerdi@slackware.com
Slackware current
slackware
gnupg 1.4.23 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
gnupg2 2.0.31 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
gnupg2 2.0.30 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
gnupg 1.4.23 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
gnupg 1.4.20 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
gnupg2 2.2.23 - volkerdi@slackware.com
Slackware64 current
slackware64
gnupg 1.4.23 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
gnupg2 2.0.31 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
gnupg2 2.0.30 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
gnupg 1.4.23 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
gnupg 1.4.20 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
gnupg2 2.2.23 - volkerdi@slackware.com
Slackwarearm current
slackware
gnupg 1.4.23 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking gnupg 2.2.19 Potentially vulnerable security pankso@slitaz.org
SliTaz Next gnupg 2.2.10 Potentially vulnerable security devel@slitaz.org
Solus gnupg 2.2.23 security pyu@riseup.net
Solus gnupg-dbginfo 2.2.23 debug pyu@riseup.net
T2 SDE gnupg2 2.2.23 extra/crypto jsaw@gmx.net
T2 SDE gnupg 1.4.23 Potentially vulnerable base/tool rene@t2-project.org
Termux gnupg 2.2.23 - termux@termux
Trisquel 6.0
toutatis/main
gnupg2 2.0.17 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 6.0
toutatis-updates/main
gnupg2 2.0.17 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 6.0
toutatis/main
gnupg 1.4.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, daniel.leidert@wgdd.de, debian@pusling.com, thijs@debian.org
Trisquel 6.0
toutatis-updates/main
gnupg 1.4.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, daniel.leidert@wgdd.de, debian@pusling.com, thijs@debian.org
Trisquel 7.0
belenos/main
gnupg2 2.0.22 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
gnupg2 2.0.22 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos/main
gnupg 1.4.16 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dleidert@debian.org, thijs@debian.org
Trisquel 7.0
belenos-updates/main
gnupg 1.4.16 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dleidert@debian.org, thijs@debian.org
Trisquel 8.0
flidas/main
gnupg2 2.1.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Trisquel 8.0
flidas-updates/main
gnupg2 2.1.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Trisquel 8.0
flidas-updates/main
gnupg 1.4.20 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org, thijs@debian.org
Trisquel 8.0
flidas/main
gnupg 1.4.20 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org, thijs@debian.org
Ubuntu 12.04
precise/main
gnupg2 2.0.17 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 12.04
precise-updates/main
gnupg2 2.0.17 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 12.04
precise/main
gnupg 1.4.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, daniel.leidert@wgdd.de, debian@pusling.com, thijs@debian.org
Ubuntu 12.04
precise-updates/main
gnupg 1.4.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, daniel.leidert@wgdd.de, debian@pusling.com, thijs@debian.org
Ubuntu 14.04
trusty/main
gnupg2 2.0.22 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
gnupg2 2.0.22 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/main
gnupg 1.4.16 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dleidert@debian.org, thijs@debian.org
Ubuntu 14.04
trusty-updates/main
gnupg 1.4.16 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dleidert@debian.org, thijs@debian.org
Ubuntu 16.04
xenial/main
gnupg2 2.1.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 16.04
xenial-updates/main
gnupg2 2.1.11 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 16.04
xenial/main
gnupg 1.4.20 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org, thijs@debian.org
Ubuntu 16.04
xenial-updates/main
gnupg 1.4.20 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org, thijs@debian.org
Ubuntu 18.04
bionic/main
gnupg2 2.2.4 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 18.04
bionic-updates/main
gnupg2 2.2.4 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 18.04
bionic/universe
gnupg1 1.4.22 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 19.10
eoan/main
gnupg2 2.2.12 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 19.10
eoan/universe
gnupg1 1.4.23 Potentially vulnerable universe/misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 20.04
focal/main
gnupg2 2.2.19 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 20.04
focal/universe
gnupg1 1.4.23 Potentially vulnerable universe/misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 20.10
groovy/main
gnupg2 2.2.20 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, dkg@fifthhorseman.net, eric@debian.org
Ubuntu 20.10
groovy/universe
gnupg1 1.4.23 Potentially vulnerable universe/misc pkg-gnupg-maint@lists.alioth.debian.org, debian@pusling.com, dkg@fifthhorseman.net, eric@debian.org
Void Linux x86_64
x86_64
gnupg2 2.2.23 - orphan@voidlinux.org
Void Linux x86_64
x86_64
gnupg2-scdaemon 2.2.23 - orphan@voidlinux.org
Void Linux x86_64
x86_64
gnupg 1.4.23 Potentially vulnerable - orphan@voidlinux.org
Wikidata GNU Privacy Guard 2.2.23 - -
winget GnuPG 2.2.23 pgp crypto OpenPGP S/MIME X.509 cryptography sign -
winget GnuPG 2.2.20 Potentially vulnerable pgp crypto OpenPGP S/MIME X.509 cryptography sign -

Absent in repositories

  • antiX-16
  • antiX-17
  • antiX-19
  • AppGet
  • Arch Testing
  • Astra Orel Stable
  • Astra Orel Current
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Chakra Staging
  • Chakra Testing
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Deb Multimedia Unstable
  • Debian Experimental
  • ELRepo el7
  • ELRepo el7 Testing
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • F-Droid
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • Gentoo Science overlay
  • GNU Elpa
  • Hackage
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • just-install
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Games
  • Kwort 4.3.2
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • LuaRocks
  • MELPA
  • MidnightBSD mports
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pisi Linux Contrib
  • ReactOS rapps
  • RebornOS
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • YACP